Jobs
Interviews

3399 Cyber Security Jobs - Page 33

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: AWS Security Services. Experience: 8-10 Years.

Posted 2 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Active Directory. Experience: 8-10 Years.

Posted 2 weeks ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: McAfee DLP. Experience: 3-5 Years.

Posted 2 weeks ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SAP Security. Experience: 3-5 Years.

Posted 2 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Information Protection. Experience: 8-10 Years.

Posted 2 weeks ago

Apply

5.0 - 8.0 years

3 - 7 Lacs

Pune

Work from Office

The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Palo Alto Networks - Firewalls. Experience: 5-8 Years.

Posted 2 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Entra ID. Experience: 8-10 Years.

Posted 2 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Security Information Event Management. Experience: 8-10 Years.

Posted 2 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Saviynt. Experience: 8-10 Years.

Posted 2 weeks ago

Apply

10.0 - 14.0 years

30 - 40 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: PKI - Certificate Management. Experience: 10 YEARS.

Posted 2 weeks ago

Apply

7.0 - 12.0 years

12 - 16 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails

Posted 2 weeks ago

Apply

7.0 - 12.0 years

10 - 20 Lacs

Gurugram

Work from Office

arora.rajat@Sammaancapital.com Job Description: Data Privacy Manager Grade: Manager / Senior Manager Department: Information & Cyber Security Sub Department: Data Privacy Location: Gurgaon Reporting To: CISO & DPO Role Summary We are looking for an experienced Data Privacy Manager to lead our organizations efforts toward compliance with the India Digital Personal Data Protection (DPDP) Act, 2023 and applicable RBI data privacy and security guidelines . This role will define, operationalize, and sustain a privacy compliance framework, working across legal, IT, risk, HR, and product functions. Key Responsibilities 1. Privacy Compliance Framework Lead the design and implementation of the organizational privacy framework aligned with: India DPDP Act, 2023 RBI Guidelines (including cybersecurity and outsourcing guidelines) Other relevant industry-specific laws and standards 2. Governance & Program Management Define and implement data privacy policies, SOPs, and governance structures Drive DPDP Act readiness programs including consent management, rights enablement, and breach notification mechanisms Engage with senior management and department Heads on privacy risks and posture 3. Data Protection Operations Manage the data lifecycledata collection, usage, storage, retention, and disposalwith appropriate controls Conduct Data Protection Impact Assessments (DPIAs) for high-risk processing activities Ensure data minimization, purpose limitation, and storage limitation principles are enforced 4. Third-Party & Cross-Border Data Oversight Evaluate and govern third-party processors and vendors for data privacy compliance Draft and manage Data Processing Agreements (DPAs) Ensure lawful cross-border data transfer mechanisms and data localization (where required by RBI) 5. Training, Awareness & Cultural Adoption Lead privacy training and awareness programs across the organization Embed Privacy-by-Design in product development and business operations 6. Monitoring & Incident Response Establish privacy audit controls, metrics, and KPIs Coordinate personal data breach response and regulatory notification processes Maintain breach registers and coordinate with InfoSec for threat mitigation 7. Regulatory Engagement Liaise with regulatory bodies and stay current on evolving privacy laws Support internal and external audits, including RBI inspections and supervisory reviews Requirements Education: Bachelor’s/Master’s in Law, Information Security, Compliance, or related fields Privacy certifications preferred (CIPM, CDPSE, CIPP/IT, DCPP, ISO 27701) Experience: 7–12 years of experience in privacy, information security, legal or risk functions Experience in implementing DPDP Act or GDPR programs, and/or working with RBI regulations Skills & Competencies: Strong understanding of privacy laws (DPDP, IT Act, RBI Master Directions, ISO 27701) Stakeholder management and cross-functional leadership Excellent communication and training abilities Familiarity with tools: DLP, SIEM, consent management, GRC platforms Preferred Industry Background BFSI (Banking, Fintech, NBFC) IT/ITeS Thanks Rajat Arora 98735 66771 arora.rajat@Sammaancapital.com

Posted 2 weeks ago

Apply

2.0 - 7.0 years

12 - 17 Lacs

Chennai

Work from Office

We are seeking a highly motivated Cybersecurity Senior Associate to join our team at Bahwan CyberTek, Chennai . This role requires expertise in assessing security and privacy programs, identifying risks, and developing solutions to enhance cybersecurity capabilities. The ideal candidate will have a solid foundation in cybersecurity consulting, HITRUST (e1, i1, r2) and SOC 2 Type 2 frameworks. Key Responsibilities: Assess security and privacy programs and strategies using industry frameworks (e.g., NIST CSF, ISO, CIS, HIPAA, GDPR) and conduct risk assessments. Conduct regular gap assessments and readiness checks for HITRUST and SOC 2 Type 2. Document and design solutions to remediate security gaps and enhance privacy maturity. Act as a Cybersecurity Consultant , evaluating security processes, advising on security strategies, and presenting solutions for complex security and privacy issues. Review and assess client documentation to understand their security environment. Lead client meetings to establish assessment scope and gather necessary information. Provide well-documented deliverables with accuracy and within established timelines. Ideal Candidate Profile: Bachelors degree in information technology , Security, Systems, Assurance, or a related field. 6 months+ of cybersecurity consulting experience in client-facing roles. Basic understanding of regulatory compliance and security frameworks (NIST, GDPR, ISO 27001/27002, NIST 800 series). Familiarity with key security domains such as IAM, PAM, Logging & Monitoring, Vulnerability & Patch Management, Incident Response, Asset Management, and Vendor Risk Management . Strong analytical, presentation, documentation, and collaboration skills.

Posted 2 weeks ago

Apply

2.0 - 7.0 years

1 - 5 Lacs

Kolkata, Hyderabad, Pune

Work from Office

Security Trust Analyst1 Job Title: Security Trust Analyst Location: Bangalore, India Work Mode: Hybrid (Minimum 2 days/week from office) About the Role We are seeking a Security Trust Analyst to join our Global Trust Office as an individual contributor. In this hands-on role, you will work closely with sales teams and internal security functions to demonstrate that our security and compliance controls meet industry-leading standards. You will also engage with cross-functional stakeholders across Compliance, Legal, Privacy, Product, and Engineering teams. The ideal candidate is detail-oriented, collaborative, and passionate about cybersecurity and compliance, with a strong understanding of industry frameworks such as ISO 27001, PCI DSS, and AICPA SOC . Key Responsibilities Perform first-line review of incoming Trust Office cases in Salesforce, validate case accuracy, and assign for further action. Respond to requests from internal sales teams regarding security and compliance inquiries from customers and prospects. Prepare and distribute weekly reports from Salesforce. Manage distribution of Security and Trust Assurance Packets (STAP) to customers and prospects. Collaborate with internal teams (Security, Product, Engineering, etc.) to communicate and support DocuSigns compliance posture. Contribute to continuous improvement initiatives within the Global Trust Office. Perform additional tasks and responsibilities as assigned. Support after-hours requests on an as-needed basis. What Youll Bring Basic Qualifications: Bachelors degree or equivalent work experience in Computer Science, Cybersecurity, GRC (Governance, Risk & Compliance), or related field. Minimum 2 years of relevant experience in cybersecurity or compliance-related roles. Familiarity with security and compliance frameworks such as:SSAE16, ISO 27001, NIST, PCI DSS, SOC, SIG, CSA, HIPAA, HITRUST, FedRAMP. Experience working in a SaaS or cloud solutions environment. Proficiency with Salesforce and Google Workspace tools. Strong analytical, communication, and presentation skills. Detail-oriented with excellent organizational and time management skills. Comfortable working across cross-functional teams and stakeholders. Strong passion for continuous learning and improvement. Understanding of the role of supply chain security in customer assurance. Work Environment Hybrid Work Model: This is a hybrid position requiring a presence in the Bangalore office a minimum of 2 days per week , with flexibility for remote work based on team and business needs. Location - Pune,Hyderabad,Kolkata,Jaipur,Chandigarh

Posted 2 weeks ago

Apply

8.0 - 13.0 years

0 - 1 Lacs

Gurugram

Work from Office

ABOUT JOB Designation: Associate Professor for subject specialization Computer Science/IT. Job Purpose & Role: To teach, research and serve the institution for academic, institutional & students growth & development. A. Knowledge To have strong command on subject knowledge – Computer Science/IT and have hands on experience in programming Have an ability to stay abreast on the latest trends and development in the subject area like machine learning, artificial intelligence, data science, cloud computing, blockchain technology, cyber security. Have an ability to stay abreast on the latest trends and development in the subject area. To make best use of technology in teaching learning methodology. Proven experience of excellent delivery of the subject for the students and achieve the best results /awards/positions in the university. To fulfill responsibility concerning students in respect of instruction, progress, and examination. To design, develop and deliver a range of programmes of study at various levels To lead the development and clarification of academic standards and quality for the subject area. To work with the leadership team to lead the development & implementation of student learning strategy & innovative assessment methods Meaningfully engaging students in class, seminars, workshops, conferences , events, applied subject knowledge projects. To conduct courses as per syllabus and ordinance issued by the university from time to time. To provide opportunity to students to work on live projects. To connect industry with academia for providing hands on experience leading to skill development of students. To guide junior faculty members to prepare / maintain lesson plans, lecture notes, model question papers, attendance register, manual etc. To ensure discipline and welfare of the students . To ensure Quality (NBA, ISO, NAAC) and innovative education to students by continuous monitoring of subject, books, and journals, teaching aids , Laboratory facilities To do quality research, have good academic record and books/research paper publications/IPR/patents record. To continue to develop one’s position as a leading researcher, including publication, external funding and the pursuit of other relevant indicators of standing in the field. To promote and represent the Institution at National & International level facilitate in branding. To lead and coordinate research activity in the subject area. To manage research and other collaborative partnerships with other Institutions and external bodies. To write publications of an internationally recognised standard or disseminate research findings using media appropriate to the discipline. To liaison and network to contribute to the enhancement of research quality in the subject field by being involved in quality assurance, external bodies, research councils, group and subject associations, research funding & sponsoring bodies B. Functional Skills Seasoned Academician/Researcher/Strategy Thinker Competency of Nurturing & engaging Students constructively Excellent interpersonal & content delivery skills. Ability to engage students constructively. Academic domain knowledge – National (UGC/NBA/NAAC/NIRF/AICTE etc.)/International Competency of Institution Building C. Attributes Dynamic, energetic, team player, thrives among strong colleagues. Ability to work in fast paced evolving environment . Be willing and able to exercise judgment and take risks. Accept criticism and constructive feedback , while being extremely adaptable and flexible. Reflection of an impeccable persona in walk-talk while dealing with academia High spiritual quotient (Social quotient -SQ, Intelligence quotient - IQ, Emotional Quotient - EQ) D. Qualification & Years of Experience as per AICTE/UGC norms: ME/M.Tech and BE/B.Tech in Computer Science /Information Technology from IITs, IISc., IIITs, NITs, reputed university & throughout first class PhD Degree in the relevant field of subject from the Top Tier, reputed university Minimum of 8 years of experience in teaching / research / industry out of which at least 2 years shall be Post Ph.D. experience. Minimum 6 research publications in SCI journals / UGC / AICTE approved list of journals. Post PhD publications and guiding PhD students is desirable. Industry and Global Experience is desirable. E. Salary as per current norms F. Location: Greater Noida, Delhi/NCR G. Apply for the position by sending your CV at careers@glbitm.ac.in H. Visit our website’s career page at www.glbitm.ac.in

Posted 2 weeks ago

Apply

8.0 - 13.0 years

0 - 1 Lacs

Gautam Buddha Nagar

Work from Office

ABOUT JOB Designation: Associate Professor for subject specialization Computer Science/IT. Job Purpose & Role: To teach, research and serve the institution for academic, institutional & students growth & development. A. Knowledge To have strong command on subject knowledge – Computer Science/IT and have hands on experience in programming Have an ability to stay abreast on the latest trends and development in the subject area like machine learning, artificial intelligence, data science, cloud computing, blockchain technology, cyber security. Have an ability to stay abreast on the latest trends and development in the subject area. To make best use of technology in teaching learning methodology. Proven experience of excellent delivery of the subject for the students and achieve the best results /awards/positions in the university. To fulfill responsibility concerning students in respect of instruction, progress, and examination. To design, develop and deliver a range of programmes of study at various levels To lead the development and clarification of academic standards and quality for the subject area. To work with the leadership team to lead the development & implementation of student learning strategy & innovative assessment methods Meaningfully engaging students in class, seminars, workshops, conferences , events, applied subject knowledge projects. To conduct courses as per syllabus and ordinance issued by the university from time to time. To provide opportunity to students to work on live projects. To connect industry with academia for providing hands on experience leading to skill development of students. To guide junior faculty members to prepare / maintain lesson plans, lecture notes, model question papers, attendance register, manual etc. To ensure discipline and welfare of the students . To ensure Quality (NBA, ISO, NAAC) and innovative education to students by continuous monitoring of subject, books, and journals, teaching aids , Laboratory facilities To do quality research, have good academic record and books/research paper publications/IPR/patents record. To continue to develop one’s position as a leading researcher, including publication, external funding and the pursuit of other relevant indicators of standing in the field. To promote and represent the Institution at National & International level facilitate in branding. To lead and coordinate research activity in the subject area. To manage research and other collaborative partnerships with other Institutions and external bodies. To write publications of an internationally recognised standard or disseminate research findings using media appropriate to the discipline. To liaison and network to contribute to the enhancement of research quality in the subject field by being involved in quality assurance, external bodies, research councils, group and subject associations, research funding & sponsoring bodies B. Functional Skills Seasoned Academician/Researcher/Strategy Thinker Competency of Nurturing & engaging Students constructively Excellent interpersonal & content delivery skills. Ability to engage students constructively. Academic domain knowledge – National (UGC/NBA/NAAC/NIRF/AICTE etc.)/International Competency of Institution Building C. Attributes Dynamic, energetic, team player, thrives among strong colleagues. Ability to work in fast paced evolving environment . Be willing and able to exercise judgment and take risks. Accept criticism and constructive feedback , while being extremely adaptable and flexible. Reflection of an impeccable persona in walk-talk while dealing with academia High spiritual quotient (Social quotient -SQ, Intelligence quotient - IQ, Emotional Quotient - EQ) D. Qualification & Years of Experience as per AICTE/UGC norms: ME/M.Tech and BE/B.Tech in Computer Science /Information Technology from IITs, IISc., IIITs, NITs, reputed university & throughout first class PhD Degree in the relevant field of subject from the Top Tier, reputed university Minimum of 8 years of experience in teaching / research / industry out of which at least 2 years shall be Post Ph.D. experience. Minimum 6 research publications in SCI journals / UGC / AICTE approved list of journals. Post PhD publications and guiding PhD students is desirable. Industry and Global Experience is desirable. E. Salary as per current norms F. Location: Greater Noida, Delhi/NCR G. Apply for the position by sending your CV at careers@glbitm.ac.in H. Visit our website’s career page at www.glbitm.ac.in

Posted 2 weeks ago

Apply

2.0 - 4.0 years

2 - 4 Lacs

Mumbai

Work from Office

Minimum 2-4 years of experience in Security Operations Centre Experience across SOC domains use case creation, incident management, threat hunting, threat intelligence etc. Solid understanding of cyber security, network security, end point security concepts Good understanding of recent cyber threats, latest attack vectors Must have experience in any one SIEM (Splunk), EDR and SOAR solution Must have experience in leading/managing SOC shifts Experience in shift roster creation, resource management etc. Will be responsible for critical incident investigation, use case review, mentoring Shift Leads, SLA management etc.

Posted 2 weeks ago

Apply

7.0 - 12.0 years

9 - 17 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails

Posted 2 weeks ago

Apply

8.0 - 10.0 years

22 - 27 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Threat Protection Experience: 8-10 Years

Posted 2 weeks ago

Apply

8.0 - 10.0 years

22 - 27 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: ServiceNow SecOps Experience: 8-10 Years

Posted 2 weeks ago

Apply

8.0 - 10.0 years

22 - 27 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Palo Alto Networks - Firewall Experience: 8-10 Years

Posted 2 weeks ago

Apply

8.0 - 10.0 years

22 - 27 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Data Security Consulting Experience: 8-10 Years

Posted 2 weeks ago

Apply

3.0 - 8.0 years

5 - 10 Lacs

Bengaluru

Work from Office

Job Title : Data Privacy Manager (C1) - India Legal Compliance This position demands a global perspective, focusing on compliance with data privacy laws across regions, including GDPR in Europe, DPDP in India, CCPA in California, and other international mandates. The Data Privacy Manager must ensure the protection of Personally Identifiable Information (PII) and Sensitive Personal Information (SPI), fostering a robust framework that mitigates risks and strengthens the organizations security posture. Position Overview The Data Privacy Manager is responsible for overseeing the organizations efforts to ensure the protection of sensitive data, compliance with data privacy regulations, and alignment with industry best practices. This role plays a crucial part in maintaining trust with customers, partners, and employees by protecting personal and confidential information. Key Responsibilities Compliance and Regulation Management Monitor and ensure adherence to data protection regulations such as GDPR, DPDP (India), CCPA, HIPAA, or other applicable laws. Creating, maintaining, and updating data privacy policies, procedures, and guidelines to align with legal requirements and industry best practices. Conducting privacy impact assessments (PIAs) and data protection impact assessments (DPIAs) to identify and mitigate potential risks associated with data processing activities. Stay updated on changes in data privacy laws and advise the organization accordingly. Conduct regular audits and risk assessments to identify failure modes and areas of improvement. Strategic Leadership Lead initiatives to promote a culture of data privacy and protection within the organization. Collaborate with cross-functional teams, including IT, legal, and HR, to ensure data privacy compliance across all departments. Develop strategies for data governance and ensure alignment with organizational goals. Privacy by Design Ensuring privacy is embedded into the design and development of new products and services. Incident Response and Prevention Managing data breach incidents, including investigation, remediation, and reporting to relevant authorities. Training and Awareness Organize training sessions and workshops to educate employees on data privacy standards and practices. Ensure that all parties handling sensitive data are aware of their responsibilities under relevant laws and company policies. Vendor Management Overseeing the privacy practices of third-party vendors and ensuring they meet the organization's data protection standards. Educational Requirements A bachelor's degree or higher in fields like Law, Information Technology and Computer Science or a similar field is preferred. Technical Skills: Familiarity with data security concepts like encryption, data masking, anonymization, and pseudonymization is necessary, as well as knowledge of IT systems and data management. Analytical and Problem-Solving Skills: The ability to identify and address data privacy risks and challenges. Communication Skills: Being able to clearly explain complex privacy concepts and policies to various audiences. Certifications: Privacy certifications like CIPP, CIPM, or CIPT can demonstrate expertise in data privacy principles and practices. Soft Skills: Collaboration: Working effectively with various teams across the organization, including IT, Legal, HR, and Marketing. Attention to Detail: Meticulousness is essential when dealing with sensitive data and regulatory compliance. Leadership and Organizational Skills: Overseeing privacy program implementation and managing teams effectively. Ethical Mindset: Handling sensitive information responsibly and upholding privacy rights

Posted 2 weeks ago

Apply

1.0 - 3.0 years

0 - 0 Lacs

hyderabad, bangalore, chennai

On-site

Industrial IoT Engineer Role Summary: Designs and implements IoT solutions to optimize manufacturing processes and enable smart factory operations. Key Responsibilities: Develop and deploy IoT sensors and edge devices. Integrate data from machines into cloud platforms. Ensure cybersecurity and data integrity. Analyze real-time data for predictive insights. Skills Required: IoT protocols (MQTT, CoAP), cloud platforms (AWS, Azure). Embedded systems and microcontrollers. Networking and cybersecurity fundamentals. Data analytics and visualization tools. Qualifications: Bachelors in Electronics, Computer Science, or related field. 2+ years in IoT or industrial automation.

Posted 2 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

pune, maharashtra

On-site

You will be responsible for conducting application security reviews for Web, Mobile (Android and iOS), and API technologies. Your role will involve assessing and identifying potential vulnerabilities in the technology being developed before implementation. You should have expertise in application security testing methodologies such as SAST, DAST, and MAST, with experience in web application, API security, and mobile application security testing according to industry standards like OWASP top 10, SANS top 25, etc. It would be beneficial to have knowledge of programming and scripting languages such as Java, JavaScript, Angular, Spring Boot, Kotlin, and Swift. Familiarity with tools like Burp Suite, Postman, SoapUI, Checkmarx, Netsparker, Nexus IQ, Kryptowire for security testing and analyzing scanned reports is essential. Moreover, a strong understanding of application security tooling and experience in driving automation within the delivery environment is required. You must hold industry-recognized Information Security and Cyber Security qualifications such as CISSP, CISA, OSCP, GIAC GPEN, GIAC GMOB. A deep understanding of security industry trends, major vulnerabilities, and security threat landscape is crucial. Knowledge of Zero Trust security principles and practical implementations is necessary. While a degree is desirable, it is not mandatory. Experience in supporting major programs, security architecture, creating security designs, and displaying positive leadership behaviors related to risk management and mitigation is expected. Proficiency in collaboration tools like SharePoint, Teams, Confluence, and JIRA is advantageous. Hands-on experience in working with DevOps and Agile teams to incorporate security in the software development lifecycle is a key requirement. Additionally, experience in application risk assessment, threat modeling, and working closely with delivery teams for security risk remediation is important. About the Company: Purview is a leading Digital Cloud & Data Engineering company with headquarters in Edinburgh, United Kingdom and a presence in 14 countries including India, Poland, Germany, USA, UAE, Singapore, Australia, among others. The company provides services to Captive Clients and top-tier IT organizations, delivering solutions and resources to clients worldwide. Company Information: Purview Services 3rd Floor, Sonthalia Mind Space Near Westin Hotel, Gafoor Nagar, Hitechcity, Hyderabad Phone: +91 40 48549120 / +91 8790177967 Gyleview House, 3 Redheughs Rigg South Gyle, Edinburgh, EH12 9DQ Phone: +44 7590230910 Email: careers@purviewservices.com Login to Apply!,

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies