Jobs
Interviews

2957 Cyber Security Jobs - Page 26

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 8.0 years

30 - 35 Lacs

Pune

Work from Office

: Job Title Information Security Specialist Corporate Title Assistant Vice President LocationPune, India Role Description Everyday DB observes thousands of cyber security intrusion attempts. Deutsche Banks COO Chief Security Office (CSO) integrates both Corporate Security (CS) and Information Security (CISO) as both teams are responsible for mitigating these risks. The CSO team enables the business of Deutsche Bank by providing agile security operational capabilities. With their expertise in Threat Intelligence, Cyber Threat Analytics, Malware Response & Research, Security Monitoring, Incident Response, Forensics and Vulnerability Management, they provide global services from key locations in Frankfurt, Jacksonville and Singapore while leveraging offshore capabilities in Pune and Bucharest. Deutsche Bank AG is looking for Cyber Security professional to support the banks global security monitoring and threat detection capabilities. This role requires a heavy focus on all areas of security monitoring, risk management on privileged access management and familiarity with regulations impacting technology (e.g. MAS TRM Guidelines), requiring at least 5 to 8 years of experience. Candidate will be responsible to provide an oversight of the various security monitoring process to manage security risks and to drive the organizations compliance to regulatory and audit requirements including facilitation of audit activities, address process related queries and drive automation and audit remediation projects. The candidate will need to drive process improvements, procedure document updates, KPI monitoring and operations team management. Candidate will engage across all functional areas of business, operations, and global technologies working in a dynamic, multi-OS environment. This role will play a vital role in present organizations compliance to regulators and managing interactions with auditors. The chosen candidate will be required to provide a degree of strategic, tactical, and day-to-day operational experience to enhance the overall security monitoring, detection, and mitigation process. Candidate must also possess excellent soft skills and verbal communications dealing with senior executive management, customers, clients, auditors, and third-party vendors. What well offer you , 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities Oversee the performance, efficiency, and accuracy of security monitoring operations team ensuring SLAs are met. Proactively review, propose, and implement process changes and monitoring improvements to remediate most significant risks including audit findings, self-identified issues, compliance issues, control gaps and regulatory requirements. Identify opportunities for streamlining of control processes, develop and socialize potential risk mitigation strategies particularly in privileged access management (e.g., bypass monitoring, session log review), and work with various divisions to execute. Improve the delivery of effective control process through technical review and process quality checks. Provide support in the delivery of effective governance including tracking and reporting. Ensure proper training of monitoring teams on new coverage and use cases. Offer subject-matter expertise and act as escalation point when required. Prepare and present monthly functional and operational report. Manage stakeholder queries, facilitate audit activities, and address data requests in a timely manner. Collaborate across CSO and technology teams to respond to internal and external audits, and regulatory inquiries and assessments. Drive automation projects and manage audit remediation deliverables to closure. Practice and promote good risk culture and risk management to manage the risks within banks appetite. Act as primary point-of-contact for regulatory inquiries and engagements. Collaborate with internal and external auditors and stakeholders, providing necessary evidence and artefacts, to facilitate audit processes. Your skills and experience Minimum 5 to 7 years of working Experience with security monitoring platforms and workflows. Proven Experience in area of privileged access management specifically in session log review and bypass monitoring. Proven experience and In-depth knowledge of technology regulations and understanding of regulatory risk management specially of MAS requirements and guidelines. Proven experience and strong understanding of audit process and compliance monitoring and reporting. Analytical mindset and ability to identify, assess and address compliance gaps and security risks. Strong operational background in risk analysis and risk identification. Degree from a university or major course work in computer science, networking, engineering, or other computer-related field of study. One of the following certifications will be an advantageCISSP, CISM, CISA, CRISC Expectations It is the Banks expectation that employees hired into this role will work in the office at least 2-3 days a week in accordance with the Banks hybrid working model. How well support you . . . .

Posted 1 week ago

Apply

8.0 - 13.0 years

30 - 35 Lacs

Bengaluru

Work from Office

: Job TitleApplication Security Specialist Corporate TitleAssistant Vice President LocationPune/Bangalore India Role Description DWS is evolving and expanding its internal information security team. In the CSO Information Security Assurance division, your role will involve assessing the implementation of controls to ensure adherence to Information Security Policies and Procedures. This verification process utilizes the most advanced compliance data sources (i.e., compliance evaluation based on operational data, self-assessment, and independent reviews) to determine whether the necessary information security controls have been established in DWSs applications, infrastructure, and IT processes, including EUDA/EUMA. In this context, it evaluates associated risks and identifies vulnerabilities related to unimplemented controls. The service also offers guidance on training and the application of security controls. What well offer you 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities Your main responsibility will be to adhere to the Information Security roadmap for the applications (ensuring information security compliance) based on IS principles (confidentiality, integrity, and availability), and to verify their alignment with DWS/DB policies. Assist application team with the applications that are scheduled for migration/re-migration projects ensuring that its IS Criticality ratings are updated according to the DWS/DB IS criticality methodology. Take part in CSO assurance meetings associated with secure architecture design, new product approvals or other risk review discussions to prevent any delays or escalations arising from non-compliance. Assist the DWS CSO in executing the hybrid model as outlined for decisions related to the Aurora Operating Model, ensuring proper alignment with DB CSO ORR controls. Perform security assurance tasks on DWS CSO solutions, business applications, and IT infrastructure located within the Proteus environment. Conduct a security assessment when retiring business applications or IT applications in the Proteus environment. Aid in resolving regulatory findings and guarantee that there are no outstanding audit issues. Act as a liaison among key role holders such as ITAOs and TISOs to create a secure environment by assessing the Information Security needs. Provide support for the governance of EUDA within a DWS Unit. Contribute to the creation, testing, and management of IS Security Compliance campaigns in accordance with business needs (including documentation and training). Oversee Assurance processes and evidence evaluations throughout DWSs application portfolio to aid in reducing risks linked to non-compliant controls for all DWS entities. Assist in ensuring consistency with all other Control Functions for Operational Readiness. Security compliance reporting is a crucial aspect of the security assurance team. Therefore, you are required to work on the promptness of reporting, the precision of the content, and the comprehensiveness of risk and controls. Ensure automation in reporting and delivering value. Your skills and experience Clear understanding of information security risk and compliance framework. Experience in application security assessment activities. Minimum 8-14 years experience in Information security management area. Understanding on how application security policies, standards, requirements and controlsare defined. Strong Microsoft office (excel macro), automation and analytics experience. Experience in working with information security governance solutions. Experience in CISO Application Security Governance process design Proven experience with Information Security Standards implementation (e.g. ISO27001, ) Proven experience in implementing Risk management standards Any globally recognized information security certification (highly preferred) Graduation and above (preferably IT, Computer science) Understanding of current industry and agency standards, best practices, and/or frameworks i.e.MITRE ATT&CK, NIST, DORA, ENISA, ISO27001, SOC2, SoX, PCI, etc. Dedicated to undertaking any assigned tasks or projects related to CSO. Ability to explain, document and present Information Security risks in a clear, concise and understandable manner, ability to present a big picture and connect the dots Detailed oriented, collaborative and team oriented, ability to manage conflicts with Senior stakeholders Must work independently and can collaborate comfortably in a matrix organization with international teams. Excellent verbal and written communication skills, including the ability to effectively participate in and sometimes lead discussions and meetings with internal and/or executive management and other groups involved in Physical Security/technology control assessments. Structured and reliable work style How well support you About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htm

Posted 1 week ago

Apply

3.0 - 5.0 years

7 - 12 Lacs

Coimbatore

Work from Office

Role is SAP subject matter expert/architect role for Security. Key responsibilities will involve working with Business Stakeholders, understanding requirements, translating user requirements into SAP IT scope, assessing impact on application & connected systems, estimating high level schedule and efforts to implement solution and ensure successful technical delivery Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Candidate must have min. 3-5 years of solid SAP Security Implementation experience with focus on Role authorizations. Solid implementation and hands-on experience in ECC 6.0 role build. Experience in working with stakeholders and leading SAP security projects. Sound understanding of SOD - segregation of duties. Support technical requirement gathering, develop prototypes/PoCs/recommend solutions with limited information from the business, delivery quality technical specifications and documentation Preferred technical and professional experience SOX/GRC Control experience

Posted 1 week ago

Apply

8.0 - 13.0 years

8 - 12 Lacs

Bengaluru

Work from Office

The IBM Cloud Object Storage team is seeking an experienced Security Developer As a Security developer, you will be part of a highly focused, self-managed team that designs, develops and tests secure solutions created for IBM Cloud Object Storage workloads. Responsible for all aspects of security and compliance activities. Provide feedback to architects regarding any issues that can cause any security and complinace Gaps. Manage projects with various priority levels and timelines from start to finish. Demonstrate best practices in all aspects of administration. Leverage various security tools to secure the offerings and make sure offering is adhered to the best security and compliance priniciples. Continuously stay abreast of new security and complinace guidelines to ensure more secure offering. Must collaborate with other departments to resolve complex issues and be detail oriented. Ability to automate security and complinace solutions to repetitive problems/tasks. Required education Bachelor's Degree Required technical and professional expertise Upto 8+ Years of working experience with Security and Compliance activities Programming Skills: Python Shell Scripting Other Skills: In depth Knowledge of end to end Security and Complinace activities such as Threat Models, Security Privacy by Design. Knowledge of Security scanning tools such as Nessus scanner, SonarQube, NMap. In depth Security concepts (Includes deep understanding of identity mgmt/authentication, authorization, firewall, auditing, secure communication, managing certificates, password management) Excellent presentation and soft skills Security Domain ExpertizeUnderstand of cryptographic key management and it's lifecycle and also security architecture. In depth knowledge of Hardware Security Modules, PKCS #11 APIs, Trusted Execution Environments, Quantum Safe Algorithms Strong English communication skills both written and verbal Preferred technical and professional experience General understanding of private /public / hybrid cloud concepts In depth understanding of HW servers and server components General understanding of open source projects; experience with open source community contribution can be an added advantage Indepth Security concepts and hands on experience on Certificate management/authentication, authorization, firewall, auditing, secure communication, password management)

Posted 1 week ago

Apply

4.0 - 8.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Vulnerability Identification & Assessment: Manage and oversee vulnerability scanning tools (Qualys, Tenable, Rapid7, etc.). Analyze vulnerability data from multiple sources and assess the impact on business operations. Perform risk assessments and categorize vulnerabilities based on severity and exploitability. Remediation & Risk Mitigation:Collaborate with IT and development teams to ensure timely remediation of identified vulnerabilities. Prioritize vulnerabilities based on risk to the business and potential exploitability. Track remediation efforts and ensure proper closure of security gaps. Process & Policy Development:Define and maintain vulnerability management policies, standards, and procedures. Establish workflows for vulnerability detection, reporting, remediation, and validation. Ensure compliance with security frameworks such as NIST, CIS, ISO 27001, and regulatory standards like GDPR, HIPAA, and PCI-DSS. Security Monitoring & Threat Intelligence Integration:Work with threat intelligence teams to understand emerging threats and vulnerabilities. Ensure vulnerability management aligns with incident response and threat-hunting processes. Continuously enhance detection mechanisms to improve vulnerability discovery and response. Compliance & Audit Readiness:Ensure that vulnerability management practices align with regulatory and compliance requirements. Maintain records of assessments, remediation efforts, and compliance reports for audits. Support internal and external audits related to vulnerability management. Reporting & Metrics: Develop and present vulnerability status reports to security leadership and executive teams. Track key performance indicators (KPIs) related to vulnerability remediation SLAs and risk reduction Provide insights on security posture improvements based on trend analysis. Security Awareness & Collaboration:Conduct training sessions to educate teams on vulnerability risks and remediation best practices. Work closely with DevSecOps, SOC, and infrastructure teams to integrate security best practices into the development lifecycle Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Vulnerability Management Preferred technical and professional experience Qualys

Posted 1 week ago

Apply

2.0 - 7.0 years

6 - 10 Lacs

Bengaluru

Work from Office

Roles & Responsibilities: 1.Handling alerts and incident on XDR platform 2.Alert & incident triage and analysis 3.Proactively investigating suspicious activities 4.Log all findings, actions taken, and escalations clearly in the XDR and ITSM platform 5.Execute predefined actions such as isolating blocking IPs or disabling user accounts, based on set protocols. 6.Adhere to established policies, procedures, and security practices. 7.Follow-up with tech team for incident closure 8.Participating in daily standup and review meeting 9.L1 Analyst has responsibility to closely track the incidents and support for closure. 10.Escalate more complex incidents to L2 analysts for deeper analysis. 11.Work & support on multiple cybersecurity tool (DLP, GRC, Cloudsec tool, DAM) 12.Handle XDR alerts and followup with customer team for agent updates Key Responsibilities: Security Monitoring & Incident Response Governance Define and maintain security monitoring, threat detection, and incident response policies and procedures.Establish and mature a threat intelligence program, incorporating tactical and strategic threat feeds.Align SOC operations with evolving business risk priorities and regulatory frameworks.Platform & Toolset Management Evaluate, implement, and enhance SIEM platforms, ensuring optimal log ingestion, correlation, and rule effectiveness.Assess and manage deployment of EDR, XDR, SOAR, and Threat Intelligence solutions.Maintain and update incident response playbooks and automation workflows.Ensure consistent platform hygiene and technology stack effectiveness across SOC tooling.SOC Operations & Threat Detection Oversee 24x7 monitoring of security events and alerts across enterprise assets.Lead and coordinate proactive threat hunting across networks, endpoints, and cloud.Manage and support forensic investigations to identify root cause and recovery paths.Govern use case development, log source onboarding, and alert/event triage processes.Regulatory Compliance & Incident Management Ensure timely and accurate incident reporting in compliance with RBI, CERT-In, and other authorities.Retain logs in accordance with regulatory data retention mandates.Enforce and monitor security baselines for endpoints, in line with internal and regulatory standards.Advanced Threat Management & Reporting Plan, conduct, and report on Red Teaming and Purple Teaming exercises to test detection and response capabilities.Participate in and contribute to the Risk Operations Committee (ROC) meetings and initiatives.Review and track SOC effectiveness through KPIs, metrics, and regular reporting dashboards. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Required Qualifications: Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or related field.2 years of experience in SOC management, incident response, or cyber threat detection roles.Hands-on expertise with SIEM (e.g., Splunk, QRadar, Sentinel), EDR/XDR tools, and SOAR platforms.Proven experience in playbook development, forensics, and threat hunting methodologies.Strong understanding of RBI/CERT-In incident reporting guidelines and log retention requirements.Familiarity with MITRE ATT&CK, threat modeling, and adversary emulation techniques. Preferred technical and professional experience Preferred Certifications: GCIA, GCIH, GCFA, CISSP, OSCP, CEH, CHFI, or similar certifications

Posted 1 week ago

Apply

2.0 - 5.0 years

4 - 8 Lacs

Bengaluru

Work from Office

CyRAACS is a leading technology and AI-led consulting firm specializing in Governance, Risk, and Compliance (GRC) and Vulnerability Assessment services. A key product offering of CyRAACS is an innovative AI-enabled SaaS platform tailored for GRC and CyberSecurity, designed to empower our clients with self-service capabilities. We are looking for a highly skilled and motivated Full Stack Developer to join our growing technology team and contribute to the development of a high-quality, robust, and user-friendly platform. Job Description Role Overview As a Full Stack Developer at CyRAACS, you will play a crucial role in the design, development, and deployment of our GRC & CyberSecurity SaaS platform. Youll be responsible for building robust and scalable features across the entire stack , ensuring seamless integration and optimal performance. This is an exciting opportunity for someone who thrives in a fast-paced environment, possesses strong technical skills, and has a passion for building innovative, cloud-native applications. Key Responsibilities Contribute to the design and development of new features and enhancements for our SaaS platform, working across both front-end and back-end components. Implement high-quality, maintainable, and scalable code primarily using Java with Spring Boot and React, Angular etc. Work with and optimize data models in MySQL, MongoDB, or both , ensuring efficient data storage and retrieval. Actively participate in code reviews, contributing to a culture of technical excellence and continuous improvement. Troubleshoot and debug complex issues in production environments , ensuring the stability and reliability of our applications. Collaborate closely with Product Management and other engineering teams to understand requirements and translate them into technical solutions. Contribute to the implementation and enforcement of software development best practices, including CI/CD and DevSecOps. Comfortably leverage AI-based development tools to enhance productivity and code quality. Stay current with emerging technologies and industry trends, especially in cloud-native development and full-stack best practices. What You Bring 2-5 years of experience in full-stack software development , with a strong focus on web-based SaaS application development. Expertise in Java and the Spring Boot framework for back-end development. Have proven ability to build Unit and Integration tests that can be hooked into a CI/CD platform. Expertise with at least 1-2 years in a Web UI framework like React, Angular etc. Proven experience with database technologies, specifically MySQL, MongoDB, or both. Strong troubleshooting experience in applications running in production environments , with a demonstrated ability to diagnose and resolve complex issues efficiently. Excellent data structure and design skills , proven through contributions to a complex product or an enterprise application at scale. Proven experience with using AI for development (e.g., code generation, intelligent refactoring, debugging assistance) will be highly desirable. Understanding of building cloud-native applications (AWS, Azure, or GCP experience is a plus). Excellent problem-solving, analytical, and communication skills. A passion for delivering high-quality, impactful software. Transform your business and manage risk with your trusted cyber security partner CYRAAC Services Private Limited 3rd floor, 22, Gopalan Innovation Mall, Bannerghatta Main Road, JP Nagar Phase 3, Bengaluru, Karnataka-560076

Posted 1 week ago

Apply

2.0 - 6.0 years

6 - 11 Lacs

Pune

Work from Office

Some careers shine brighter than others. If you re looking for a career that will help you stand out, join HSBC and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further. HSBC is one of the largest banking and financial services organisations in the world, with operations in 64 countries and territories. We aim to be where the growth is, enabling businesses to thrive and economies to prosper, and, ultimately, helping people to fulfil their hopes and realise their ambitions. We are currently seeking an experienced professional to join our team in the role of Consultant Specialist. The full stack Engineering job is responsible for delivering across the Technology delivery lifecycle including inception, construction, testing, release and ongoing management of a product or service in a pod within a Technology team. They will be required to continually enhance their skills within a number of specialisms which include front end, development, security, testing, and operational support. In this role, you will: Provide support across the end-to-end delivery and run lifecycle, utilizing their skills and expertise to carry out software development, testing and operational support activities with the ability to move between these according to demand. End to end accountability for a product or service, identifying and developing the most appropriate Technology solutions to meet customer needs as part of the Customer Journey Liaise with other engineers, architects, and business stakeholders to understand and drive the product or service s direction. Establish a digital environment and automate processes to minimize variation and ensure predictable high-quality code and data. Create technical test plans and records, including unit and integration tests, within automated test environments to ensure code quality. Provide support to DevOps teams working at all stages of a product or service release/change with a strong customer focus and end to end journeys, ensuring they have an excellent domain knowledge. Working with Ops, Dev and Test Engineers to ensure operational issues (performance, operator intervention, alerting, design defect related issues, etc. ) are identified and addressed at all stages of a product or service release / change. Provide support in identification and resolution of all incidents associated with the IT service, as directed by leadership of the DevOps team, Ensure service resilience, service sustainability and recovery time objectives are met for all the software solutions delivered. Responsible for automating the continuous integration / continuous delivery pipeline within a DevOps Product/Service team driving a culture of continuous improvement. Keep up to date and have expertise on current tools, technologies and areas like cyber security and regulations pertaining to aspects like data privacy, consent, data residency etc. that are applicable Requirements To be successful in this role, you should meet the following requirements: Must Have: Java 8 or above, Spring framework along with high experience in 1. Handling multi thread applications, 2. Concurrency Programming, 3. Distributed Transaction, like 2PC/3PC/TCC/Saga, State Machine experience before Some of the behaviours we expect from our engineers: Expertise in governance such as: Production governance Monitoring Risk & Control Support Deeper understanding of component delivery in areas such as: Security Accessibility Leading retros at a pod level. Broader knowledge of cross component dependencies and ownership. Actively improving the system stability and monitoring Understanding of underlying infrastructure components Understanding of tech debt. You ll achieve more when you join HSBC. .

Posted 1 week ago

Apply

3.0 - 7.0 years

9 - 13 Lacs

Pune

Work from Office

Some careers shine brighter than others. If you re looking for a career that will help you stand out, join HSBC and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further. HSBC is one of the largest banking and financial services organisations in the world, with operations in 64 countries and territories. We aim to be where the growth is, enabling businesses to thrive and economies to prosper, and, ultimately, helping people to fulfil their hopes and realise their ambitions. We are currently seeking an experienced professional to join our team in the role of Consultant Specialist. The full stack Engineering job is responsible for delivering across the Technology delivery lifecycle including inception, construction, testing, release and ongoing management of a product or service in a pod within a Technology team. They will be required to continually enhance their skills within a number of specialisms which include front end, development, security, testing, and operational support. In this role, you will: Provide support across the end-to-end delivery and run lifecycle, utilizing their skills and expertise to carry out software development, testing and operational support activities with the ability to move between these according to demand. End to end accountability for a product or service, identifying and developing the most appropriate Technology solutions to meet customer needs as part of the Customer Journey Liaise with other engineers, architects, and business stakeholders to understand and drive the product or service s direction. Establish a digital environment and automate processes to minimize variation and ensure predictable high-quality code and data. Create technical test plans and records, including unit and integration tests, within automated test environments to ensure code quality. Provide support to DevOps teams working at all stages of a product or service release/change with a strong customer focus and end to end journeys, ensuring they have an excellent domain knowledge. Working with Ops, Dev and Test Engineers to ensure operational issues (performance, operator intervention, alerting, design defect related issues, etc. ) are identified and addressed at all stages of a product or service release / change. Provide support in identification and resolution of all incidents associated with the IT service, as directed by leadership of the DevOps team, Ensure service resilience, service sustainability and recovery time objectives are met for all the software solutions delivered. Responsible for automating the continuous integration / continuous delivery pipeline within a DevOps Product/Service team driving a culture of continuous improvement. Keep up to date and have expertise on current tools, technologies and areas like cyber security and regulations pertaining to aspects like data privacy, consent, data residency etc. that are applicable Requirements To be successful in this role, you should meet the following requirements: Must Have: Java 8 or above, Spring framework along with high experience in 1. Handling multi thread applications, 2. Concurrency Programming, 3. Distributed Transaction, like 2PC/3PC/TCC/Saga, State Machine experience before Some of the behaviours we expect from our engineers: Expertise in governance such as: Production governance Monitoring Risk & Control Support Deeper understanding of component delivery in areas such as: Security Accessibility Leading retros at a pod level. Broader knowledge of cross component dependencies and ownership. Actively improving the system stability and monitoring Understanding of underlying infrastructure components Understanding of tech debt. You ll achieve more when you join HSBC. .

Posted 1 week ago

Apply

5.0 - 10.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Educational Bachelor of Engineering Service Line Quality Responsibilities In this role, you will help architect, deploy security solutions, tools for Application, DevSecOps & SSDLC, and Public Cloud Security. You need to learn about Infosys business initiatives, products and business needs to drive clients' security projects. Develop technical solutions and advisesecurity controls to mitigate security vulnerabilities. Partner with Security Engineers, Architects, and clients to drive security initiatives in technology and policy governance. Technical and Professional : Azure, AWS, GCP, Sentinel, GRC, Threat Analyst, NIST, MITRE ATT&CK, SOC2, ISO27001, ISO27002, Identity, Access management, Security Engineering, Security Automation, Resiliency, DevSecOps, SSDLC, SDLC, Threat Modelling, Risk Assessor, Security Audit, zero trust, ZTNA, conditional access Preferred Skills: Foundational-Cybersecurity Competency Management-Cyber Competency Strategy Planning

Posted 1 week ago

Apply

2.0 - 5.0 years

5 - 8 Lacs

Bengaluru

Work from Office

Educational Bachelor of Engineering,BTech,BSc,BCA,Master Of Engineering,MTech,MSc,MCA Service Line Cyber Security Responsibilities As part of the Infosys consulting team, your primary role would be to actively aid the consulting team in different phases of the project including problem definition, effort estimation, diagnosis, solution generation and design and deployment Technical and Professional : Primary skills:AWS DevOps,Cloud Security-AWS Security,Cloud Security-Azure Security,Devops-Google Cloud Ptatform (GCP),GRC,GRC-RSA Archer(e-GRC),IDAM-Cyberark,IDAM-IBM Security Identity manager(ISIM),IDAM-Okta,IDAM-Oracle Identity Manager(OIM),IDAM-Ping/Federate,IDAM-Sailpoint,Infrastructure Security-Email Security,Network Security,Network Security-Firewalls-Checkpoint,Network Security-Firewalls-Juniper-Firewalls,Network Security-Firewalls-Palo Alto,Network Security-Firewalls-Web Application Firewall(WAF),Network Security-Load Balancer-F5,Technology-Identity Management-IDAM-Design , work flow , Implementation,Technology-Identity Management-Identity Governance Framework, Attestation,Access Cert, Role Mgmt,Auditing,Entitlement Mgmt, XACML,Technology-Identity Management-Identity,Account Provisioning and Reconciliation, SPML,Tools-Splunk Preferred Skills: Technology-Identity Management-Identity Management - ALL Technology-Identity Management-Privileged User Management-Novell NetIQ Privilege User Manager Technology-Enterprise Mobility Solution-MS Azure AD MS Azure RMS MS Intune

Posted 1 week ago

Apply

2.0 - 7.0 years

4 - 8 Lacs

Bengaluru

Work from Office

Educational Bachelor of Engineering,Bachelor Of Technology,Master Of Engineering,Master Of Technology,Bachelor Of Computer Science,Master of Computer Science Service Line Cyber Security Responsibilities A day in the life of an Infoscion As part of the Infosys consulting team, your primary role would be to actively aid the consulting team in different phases of the project including problem definition, effort estimation, diagnosis, solution generation and design and deployment You will explore the alternatives to the recommended solutions based on research that includes literature surveys, information available in public domains, vendor evaluation information, etc. and build POCs You will create requirement specifications from the business needs, define the to-be-processes and detailed functional designs based on requirements. You will support configuring solution requirements on the products; understand if any issues, diagnose the root-cause of such issues, seek clarifications, and then identify and shortlist solution alternatives You will also contribute to unit-level and organizational initiatives with an objective of providing high quality value adding solutions to customers. If you think you fit right in to help our clients navigate their next in their digital transformation journey, this is the place for you! Additional Responsibilities: Ability to work with clients to identify business challenges and contribute to client deliverables by refining, analyzing, and structuring relevant data Awareness of latest technologies and trends Logical thinking and problem solving skills along with an ability to collaborate Ability to assess the current processes, identify improvement areas and suggest the technology solutions One or two industry domain knowledge Technical and Professional : Primary skills:Technology-Finacle-Core-Payments-Real Time Gross Settlement-Master,Technology-Infrastructure Security-Security Incident and Event Management (SIEM),Technology-Infrastructure Security-Virtual Private Network, Firewall,Technology-Network-Firewall_and_Media-Check Point,Technology-Network-Firewall_and_Media-Juniper-Firewall,Technology-Network-Firewall_and_Media-Palo Alto Preferred Skills: Technology-Infrastructure Security-Security Incident and Event Management (SIEM)-IBM Qradar Technology-Infrastructure Security-Virtual Private Network Firewall-Zscaler ZPA Technology-Network-Firewall_and_Media-Check Point-firewall Technology-Network-Firewall_and_Media-Juniper-Firewall-firewall Technology-Network-Firewall_and_Media-Palo Alto Technology-Infrastructure Security-Secure Web Gateway-Zscaler ZIA

Posted 1 week ago

Apply

3.0 - 6.0 years

5 - 8 Lacs

Bengaluru

Work from Office

Total Yrs. of Experience* 3-6 Relevant Yrs. of experience in PP * 3 Job Description We are seeking a detail-oriented and analytical SOX audit profile for our communication client based out of USA. The ideal candidate will be responsible for evaluating various controls, identifying control gaps, and ensuring compliance with SOX requirements. This role involves working closely with clients, including business, IT, and external auditors. Key Responsibilities: Plan, execute, and document SOX testing procedures for key business and IT controls. Evaluate the design and operating effectiveness of internal controls over financial reporting. Identify control deficiencies and work with process owners to develop remediation plans. Assist in the development and maintenance of process documentation, including narratives, flowcharts, and risk-control matrices (RCMs). Coordinate with external auditors to support their reliance on internal testing. Monitor and report on the status of remediation efforts and control improvements. Stay current on changes in SOX regulations and industry best practices. Support special projects and continuous improvement initiatives related to internal controls and compliance. Qualifications: BTECH/BE 3 6 years of experience in SOX compliance, internal audit, or external audit. Strong understanding of SOX requirements like 404 and COSO framework. Excellent analytical, communication, and interpersonal skills. Ability to manage multiple priorities and meet deadlines in a dynamic environment. Mandatory skill SOX Audit - Plan, execute, and document SOX testing procedures for key business and IT controls. Evaluate the design and operating effectiveness of internal controls over financial reporting. Identify control deficiencies and work with process owners to develop remediation plans. Desired skills* Development and documentation of policies, procedures and guidelines related to SOX controls. Able to implement the organizations global strategies and initiatives to enhance Information Technology plans, operations, and procedures. Domain* Cyber-Security

Posted 1 week ago

Apply

2.0 - 7.0 years

7 - 10 Lacs

Hubli

Work from Office

Educational Bachelor of Engineering,BTech,BCA,Bachelor Of Computer Science,MCA,Master of Computer Science Service Line Cyber Security Responsibilities A day in the life of an Infoscion As part of the Infosys consulting team, your primary role would be to actively aid the consulting team in different phases of the project including problem definition, effort estimation, diagnosis, solution generation and design and deployment You will explore the alternatives to the recommended solutions based on research that includes literature surveys, information available in public domains, vendor evaluation information, etc. and build POCs You will create requirement specifications from the business needs, define the to-be-processes and detailed functional designs based on requirements. You will support configuring solution requirements on the products; understand if any issues, diagnose the root-cause of such issues, seek clarifications, and then identify and shortlist solution alternatives You will also contribute to unit-level and organizational initiatives with an objective of providing high quality value adding solutions to customers. If you think you fit right in to help our clients navigate their next in their digital transformation journey, this is the place for you! Additional Responsibilities: Ability to work with clients to identify business challenges and contribute to client deliverables by refining, analyzing, and structuring relevant data Awareness of latest technologies and trends Logical thinking and problem solving skills along with an ability to collaborate Ability to assess the current processes, identify improvement areas and suggest the technology solutions One or two industry domain knowledge Technical and Professional : Primary skills:Domain-Network-Network Security Firewall & Policies,IDAM,IDAM-Cyberark,IDAM-Forgerock,IDAM-Microsoft Identity manager,IDAM-Okta,IDAM-Oracle Access Manager(OAM),IDAM-Oracle Identity Manager(OIM),IDAM-Ping/Federate,IDAM-Sailpoint,IDAM-Saviyant,Technology-Application Security-Application Security - ALL,Technology-Enterprise Mobility Solution-MS Azure AD, MS Azure RMS, MS Intune,Technology-Finacle-Core-Payments-Faster Payment Service-Advance,Technology-Infrastructure Security-Security Incident and Event Management (SIEM),Technology-Network-CISCO technologies,Technology-Network-Firewall_and_Media-Palo Alto Preferred Skills: IDAM IDAM-Oracle Identity Manager(OIM) IDAM-Oracle Access Manager(OAM) IDAM-Sailpoint IDAM-Cyberark IDAM-Ping/Federate IDAM-Forgerock IDAM-Microsoft Identity manager IDAM-Okta IDAM-Saviyant Domain-Network-Network Security Firewall & Policies Technology-Application Security-Application Security - ALL Technology-Infrastructure Security-Security Incident and Event Management (SIEM)-Splunk Technology-Network-CISCO technologies Technology-Enterprise Mobility Solution-MS Azure AD MS Azure RMS MS Intune Technology-Network-Firewall_and_Media-Palo Alto Technology-Cloud Security-AWS - GRC

Posted 1 week ago

Apply

5.0 - 10.0 years

1 - 6 Lacs

Noida

Work from Office

Were Hiring: Social Media Manager Location: Noida | Full-Time | On-Site Company: Securium Solutions Pvt. Ltd. Are you a creative strategist with a passion for digital branding? Join our growing team to lead and grow our social media presence! Requirements: • 5+ years of proven experience in Social Media Management • Strong content planning and copywriting skills • Proficient in tools like Meta Business Suite, Canva, LinkedIn Ads, Hootsuite • Hands-on experience managing multiple platforms (LinkedIn, Instagram, X, etc.) • Experience in B2B, IT, or cybersecurity domain is a plus • Data-driven mindset with a knack for trends & engagement Apply: hr@securiumsolutions.com / ekta@securiumsolutions.com +91 9266722382 www.securiumsolutions.com

Posted 1 week ago

Apply

7.0 - 12.0 years

25 - 30 Lacs

Bengaluru

Work from Office

As a Senior Security Analyst/Engineer, you will be responsible for supporting the security operations of our organization by assisting in the monitoring, detection, and response to security incidents. This role offers a blend of security analysis and engineering tasks. This position offers a progression from foundational knowledge to more advanced responsibilities, allowing you to contribute significantly to the organization's cybersecurity efforts. Qualifications and Skills: Bachelor's degree ( Bachelor of Engineering / Bachelor of Technology) in Information Technology , Computer Science, Information Security, or related field 8-12 years of experience in a cybersecurity role with progressively increasing responsibilities Strong understanding of cybersecurity principles, threat landscape, and attack methodologies Proficiency in security tools and technologies such as SIEM, EDR, IDS/IPS, firewalls, and vulnerability scanners Excellent analytical, problem-solving, and decision-making skills Effective communication and stakeholder management abilities Certifications such as CompTIA Security+, CEH (Certified Ethical Hacker), or equivalent are a plus. Experience Demonstrated experience in conducting security analysis, incident response, and vulnerability management in a complex environment Hands-on experience with security tool optimization, security assessments, and penetration testing Proven track record of incident response efforts and effectively managing security incidents from detection to resolution.

Posted 1 week ago

Apply

9.0 - 14.0 years

25 - 40 Lacs

Navi Mumbai

Hybrid

Role Overview Bank is hiring a Technical Lead AI Security to join our CISO team in Mumbai. This is a critical, hands-on role ensuring the trustworthiness, resilience, and compliance of AI/ML systems, including large language models (LLMs). You will work at the intersection of cybersecurity and AI, shaping secure testing, understanding secure MLOps/LLMOps workflows, and leading technical implementation of defenses against emerging AI threats. This role requires both strategic vision and strong engineering depth. Key Responsibilities Lead and operationalize the AI/ML and LLM security roadmap across training, validation, deployment, and runtime to enable AI Security Platform Approach. Design and implement defenses against threats like adversarial attacks, data poisoning, model inversion, prompt injection, and fine-tuning exploits using industry leading open source and commercial tools. Build hardened workflows for model security, integrity verification, and auditability in production AI environments. Leverage AI security tools for scanning, fuzzing, and penetration testing models. Apply best practices from OWASP Top 10 for ML/LLMs, MITRE ATLAS, NIST AI RMF, and ISO/IEC 42001 to test AI/ML assets. Ensure AI model security testing framework aligns with internal policy, national regulatory requirements, and global best practices. Plan and execute security tests for AI/LLM systems, including jailbreaking, RAG hardening, and bias/toxicity validation. Required Skills & Experience 8+ years in cybersecurity, with at least 3+ years hands-on in AI/ML security or secure MLOps/LLMOps Proficient in Python, TensorFlow/PyTorch, HuggingFace, LangChain, and common data science libraries Deep understanding of adversarial ML/LLM, model evaluation under threat conditions, and inference/training-time attack vectors Experience securing cloud-based AI workloads (AWS, Azure, or GCP) Familiarity with secure DevOps and CI/CD practices Strong understanding of AI-specific threat models (MITRE ATLAS) and security benchmarks (OWASP Top 10 for ML/LLMs) Ability to communicate technical risk clearly to non-technical stakeholders Ability to guide developers and data scientists to solve the AI Security risks. Certifications: CISSP, OSCP, GCP ML Security, or relevant AI/ML certificates Experience with AI security tools or platforms (e.g., model registries, lineage tracking, policy enforcement) Experience with RAG, LLM-based agents, or agentic workflows Experience in regulated sectors (finance, public sector)

Posted 1 week ago

Apply

12.0 - 20.0 years

25 - 40 Lacs

Kolkata, Hyderabad, Bengaluru

Work from Office

Strong experience in SAP implementation and management

Posted 1 week ago

Apply

4.0 - 8.0 years

9 - 14 Lacs

Bangalore Rural, Bengaluru, Delhi / NCR

Work from Office

Position 1: Web and Network PT Consultant Proposed designation Consultant Role type Individual contributor Reporting to Work timings 12 PM to 9 PM Roles & responsibilities • Perform manual application penetration tests on one or more of the following to discover and exploit vulnerabilities: web applications, internal applications, APIs, internal and external networks, and mobile applications • Plan and execute network penetration testing and Red teaming assessments to simulate real-world attack scenarios. • Perform manual network and application penetration tests on internal network, Active Directory environment, web applications. • Perform social engineering assessment to assess the security awareness and physical security controls of the organization. • Ability to independently research for new vulnerabilities in systems and software and modify and customize tools, known exploits, POCs and scripts to meet operational requirement. • Research and stay up-to-date with the latest attack techniques, tools, and emerging threats. • Present technical reports to clients, explaining the outcomes of the testing and providing detailed insights and recommendations. • Collaborate effectively with cross-functional teams, including developers, IT operations, and business stakeholders to integrate security best practices seamlessly into project workflows. • Provide mentorship and guidance to junior security staff and foster a culture of proactive security awareness within the organization. This role is for you if you have the below • We are seeking an experienced and highly skilled Consultant with over 5+ years of working experience in the field of cybersecurity, including network penetration testing, vulnerability assessment, Active directory testing, phishing assessment and web application penetration testing. The ideal candidate will possess a strong working knowledge of Network protocols, performing OSINT to identify publicly available information and testing and exploiting Microsoft services like Windows Servers, Active directory, Certificate Services. Mandatory technical & functional skills JOB DESCRIPTIONS 2 • Perform manual application penetration tests on one or more of the following to discover and exploit vulnerabilities: web applications, internal applications, APIs, internal and external networks, and mobile applications • 5+ years of professional experience in cybersecurity, with a focus on Network penetration testing and Red teaming. • Strong understanding of Network protocols, web applications, cryptography, various operating systems and security technologies. • Strong understanding of exploitation of Microsoft platform used in enterprise environment such as windows Servers, Active Directory Certificate Service, Azure, etc. • Experience in one or more of the following a plus: Web application penetration testing, mobile application penetration testing application architecture and business logic analysis. • Relevant certifications, such as GWAPT, OSCP, OSEP, CRTP, CRTO, OSWA, are strongly preferred. Other information Interview process: Please expect 2-3 rounds of interview Does the job role involve travelling: No Does the busy season apply to this role: Seasonality of the work is dependent on the projects/ deliverable timelines Working location: Bangalore/Pune/Gurugram

Posted 1 week ago

Apply

10.0 - 14.0 years

27 - 42 Lacs

Pune

Work from Office

Job Summary As a Cyber Security Specialist you will play a critical role in safeguarding our organizations digital assets. With a focus on Cyber Threat Intelligence Services you will work to identify and mitigate potential threats. Your expertise in Cyber Security and Cloud along with experience in CrowdStrike will be essential in ensuring the security of our systems. This hybrid role offers the flexibility of working both remotely and on-site during day shifts. Responsibilities Lead the development and implementation of advanced cyber threat intelligence strategies to protect organizational assets. Oversee the monitoring and analysis of security threats using CrowdStrike and other advanced tools. Provide expert guidance on cloud security best practices to ensure data integrity and confidentiality. Collaborate with cross-functional teams to design and implement robust security architectures. Conduct regular security assessments and audits to identify vulnerabilities and recommend improvements. Develop and maintain incident response plans to effectively manage and mitigate security breaches. Coordinate with external partners and stakeholders to enhance threat intelligence capabilities. Implement security policies and procedures to comply with industry standards and regulations. Analyze security incidents and provide detailed reports to senior management. Train and mentor junior security team members to build a strong security culture within the organization. Stay updated with the latest cyber security trends and technologies to proactively address emerging threats. Support the integration of security solutions into existing IT infrastructure to enhance overall protection. Drive continuous improvement initiatives to optimize security operations and reduce risk exposure. Qualifications Possess a deep understanding of cyber threat intelligence services and their application in a corporate environment. Demonstrate proficiency in using CrowdStrike for threat detection and response. Exhibit strong knowledge of cloud security principles and practices. Have a proven track record of conducting security assessments and audits. Show experience in developing and implementing incident response plans. Display excellent communication skills for effective collaboration with cross-functional teams. Hold a relevant degree in Cyber Security Information Technology or a related field. Certifications Required Certified Information Systems Security Professional (CISSP) Certified Cloud Security Professional (CCSP)

Posted 1 week ago

Apply

10.0 - 15.0 years

10 - 12 Lacs

Navi Mumbai

Work from Office

Were Hiring: System Network Administrator Company: GFG Alliance Location: Vashi, Navi Mumbai (with regular travel to BKC/Vashi as required) Division: Information Technology Experience: 10–18 years Education: Bachelor's in IT/Computer Science (Certifications like CCNA, CCNP, MCSA preferred) GFG Alliance , a global leader in sustainable industry, is seeking an experienced System Network Administrator to strengthen our IT infrastructure and ensure seamless operations across multiple locations. This is a hands-on, high-impact role covering network security, server management, cloud systems (AWS, Azure), and user support—critical to powering our business operations. Key Responsibilities: Configure and manage LAN/WAN, routers, switches, firewalls Administer cloud/on-premises servers (Windows, Linux, macOS) Handle AD, DNS, DHCP, virtualization (VMware/Hyper-V) Implement cybersecurity, data protection, and disaster recovery protocols Provide IT support for office and Director’s residence Collaborate with vendors and maintain detailed IT documentation What We’re Looking For: Deep understanding of network protocols, firewalls, VPNs, and IDS/IPS Experience in IT infrastructure management and cloud platforms (AWS, Azure) Strong problem-solving skills and ability to work independently Flexibility to travel between Vashi, BKC, and Nerul as required Be part of GFG Alliance’s journey to build a sustainable future through innovation and operational excellence. Apply Now : https://forms.gle/PUbNi5x6SjKjNGMP6

Posted 1 week ago

Apply

0.0 - 1.0 years

0 - 2 Lacs

Mumbai, Mumbai Suburban, Navi Mumbai

Work from Office

Create and deliver cyber security awareness training programs. Collaborate with IT security teams to develop and implement effective security policies and procedures, SOP and supporting documents. Timely initiation, management, closure of activities. Required Candidate profile Exp:1+Years Location - Ghansoli Np : Immediate joiner Any Queries- kanchan@peshr.com/9867762401

Posted 1 week ago

Apply

12.0 - 15.0 years

35 - 55 Lacs

Gurugram

Work from Office

Responsibilities:- Lead the IT in the organization with major verticals NOC, IT OPS, IT Security, and IT Assets with the commitment to the agreed SLA/TAT. Maintain the CAPEX/OPEX and plan the AOP of the year. Maintain the IT infrastructure and its continuity to achieve a 24/7/365 business environment. Be on edge to use cutting-edge technology and Implement as per the business requirement. Maintain the WAN/ISPs, P2P, MPLS, Cloud, and on-prem Infra. Maintain and Monitor the Network Infrastructure including all the layers of the Network and have good knowledge of OSI layers. E.g. Switching(l2+L3), Firewalls, LAN and WLAN controllers, NAC, SDWAN, etc. Maintain and Monitor the IT OPS Infrastructure including End User support and Expected technologies like Google Workspace (G-suite), AD/LDAP, NGAV, PatchMGMT, ITSM, Ticketing System, etc. Maintain Security of Onprim, DC/Cloud, Endpoint/users, and Email, to ensure a high level of security across the organization. E.g. DLP, Endpoint EDR/NGAV, Firewall, SSL, Crypto, Endpoint Encryption, and Email security. Also, help Internal and external auditors to plan the audits and related mitigations and preventions. Maintain the 70K+ IT assets across the 5K sites along with multiple IT stores across Delhivery including SAM and HAM. Involvement in regular Internal and cross-functional audits, keeping in mind ISO 9001:2013 for quality assurance and 27001:2013 for security things. Manage the on-roll/off-roll of 350 team members along with KRA/KPI and JD. Take responsibility for sudden outages and way forward improvements. Lead the Projects for Upcoming sites with the respect to IT Infrastructure and OPS. Participate in day-to-day meetings with the team, cross-functional team, and vendors to maintain the SLA/TAT. Interact with different stakeholders to understand their requirements and challenges related to OPS and IT. Update management with periodic reporting, updates, announcements, and newsletters related to IT activities.

Posted 1 week ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Bengaluru

Work from Office

FICO (NYSEFICO) is a leading global analytics software company, helping businesses in 100+ countries make better decisions. Join our world-class team today and fulfill your career potential! The Opportunity " The Security Engineer is a highly visible and critical role, collaborating on complex cloud and corporate service edge protection technologies and oversight. With your proven history of technical knowledge of identity and access management systems and services you will be working on a variety of different challenges facing the organization. You will provide both guidance and direct input to help ensure a secure, well-protected environment that complies with all applicable security standards ". Director, Cyber Security. What Youll Contribute Assist with implementation of security tools and services to enhance the oversight and governance of all company identities. Assist with implementation of identity governance and administration (IGA) solutions for the company. Implement identity security detections using next-gen Identity Threat Detection and Response (ITDR) and Non-Human Identity (NHI) platforms and tools. Create automated tooling to test identity systems to ensure detections work as designed. Create automation to produce automated policy and posture collection and reporting, to allow for identity-specific proofs managed within Infrastructure as Code. Create pipelines to deploy and manage IAM solutions and tooling. Provide engineering and technical guidance for supporting the automation of interacting with security tools and services that support the IAM program within the company. Keep current on emerging security technologies and tools and provide recommendations. Support our compliance and certification initiatives and design with those in mind. Collaborate with other engineers on design, analysis, architecture, implementation, pen-testing, security reviews and process enhancements. What Were Seeking 2-4 years in a security role, preferably in financial services or technology. Experience in securing hybrid network infrastructure services. Expertise in security, identity, architecture, and design. Hands-on experience with AWS, Azure, or other cloud platforms and IAM best practices. 2-4 years of experience with privileged access management tools (CyberArk, SailPoint, Delinea). Experience with Okta preferred. Proficiency in identity-related technologies and protocols (LDAP, SAML, OAuth, OIDC). Experience with identity provider services (Active Directory, AWS IAM, Okta). Familiarity with Zero Trust security models (Zscaler, AWS networking). Knowledge of Identity Governance Administration services. Experience with automation scripting and API integrations. Familiarity with DevOps concepts, IaC tools, and CI/CD pipelines. Proficiency in at least one high-level language (e.g., Python). Understanding of compliance frameworks (PCI-DSS, ISO 27001, NIST). Certifications like CISSP, AWS Security Specialty, or Azure SC-300 preferred. Our Offer to You An inclusive culture strongly reflecting our core valuesAct Like an Owner, Delight Our Customers and Earn the Respect of Others. The opportunity to make an impact and develop professionally by leveraging your unique strengths and participating in valuable learning experiences. Highly competitive compensation, benefits and rewards programs that encourage you to bring your best every day and be recognized for doing so. An engaging, people-first work environment offering work/life balance, employee resource groups, and social events to promote interaction and camaraderie. Why Make a Move to FICO At FICO, you can develop your career with a leading organization in one of the fastest-growing fields in technology today Big Data analytics. Youll play a part in our commitment to help businesses use data to improve every choice they make, using advances in artificial intelligence, machine learning, optimization, and much more. FICO makes a real difference in the way businesses operate worldwide Credit Scoring FICO Scores are used by 90 of the top 100 US lenders. Fraud Detection and Security 4 billion payment cards globally are protected by FICO fraud systems. Lending 3/4 of US mortgages are approved using the FICO Score. Global trends toward digital transformation have created tremendous demand for FICOs solutions, placing us among the worlds top 100 software companies by revenue. We help many of the worlds largest banks, insurers, retailers, telecommunications providers and other firms reach a new level of success. Our success is dependent on really talented people just like you who thrive on the collaboration and innovation thats nurtured by a diverse and inclusive environment. Well provide the support you need, while ensuring you have the freedom to develop your skills and grow your career. Join FICO and help change the way business thinks! Learn more about how you can fulfil your potential at www.fico.com/Careers FICO promotes a culture of inclusion and seeks to attract a diverse set of candidates for each job opportunity. We are an equal employment opportunity employer and were proud to offer employment and advancement opportunities to all candidates without regard to race, color, ancestry, religion, sex, national origin, pregnancy, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. Research has shown that women and candidates from underrepresented communities may not apply for an opportunity if they dont meet all stated qualifications. While our qualifications are clearly related to role success, each candidates profile is unique and strengths in certain skill and/or experience areas can be equally effective. If you believe you have many, but not necessarily all, of the stated qualifications we encourage you to apply. Information submitted with your application is subject to theFICO Privacy policy at https://www.fico.com/en/privacy-policy

Posted 1 week ago

Apply

4.0 - 8.0 years

6 - 10 Lacs

Bengaluru

Work from Office

About the Role : Looking for Cybersecurity Test Engineer who will be working closely with Hardware, Software and Systems engineering teams to deliver the next generation of Automotive SOC's. Ideal candidate is someone who has strong knowledge and hands on experience with Cybersecurity ISO 21434 standards. He/she should be able to Validate Cybersecurity features for Automotive SOC's and its applications. Responsibilities : - Perform penetration testing of SoC Automotive products. - Establish the Security goals and requirements. - Verification strategies in compliance with ISO 21434. - Develop test specifications, test cases, and test plans for security vulnerability testing. - Scan vulnerabilities with regards to CVSS levels and patch fixing from NIST database. - Perform code-level fuzz testing using open source tools. - Support documentation of test results and collaborate with the development team. - Participate in automating test process within CI/CD environments. - Setup and maintain traceability in compliance with Automotive SPICE requirements. - Experience in tools like OpenVAS, Nmap , wireshark, penetration testing for embedded systems. - Experience in Automotive domain is a must. - Practical experience performing TARA, security concepts and other Cybersecurity Artefacts mentioned in IS021434.

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies