Jobs
Interviews

3324 Cyber Security Jobs - Page 41

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 7.0 years

9 - 13 Lacs

Pune

Work from Office

Some careers shine brighter than others. If you re looking for a career that will help you stand out, join HSBC and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further. HSBC is one of the largest banking and financial services organisations in the world, with operations in 64 countries and territories. We aim to be where the growth is, enabling businesses to thrive and economies to prosper, and, ultimately, helping people to fulfil their hopes and realise their ambitions. We are currently seeking an experienced professional to join our team in the role of Consultant Specialist. The full stack Engineering job is responsible for delivering across the Technology delivery lifecycle including inception, construction, testing, release and ongoing management of a product or service in a pod within a Technology team. They will be required to continually enhance their skills within a number of specialisms which include front end, development, security, testing, and operational support. In this role, you will: Provide support across the end-to-end delivery and run lifecycle, utilizing their skills and expertise to carry out software development, testing and operational support activities with the ability to move between these according to demand. End to end accountability for a product or service, identifying and developing the most appropriate Technology solutions to meet customer needs as part of the Customer Journey Liaise with other engineers, architects, and business stakeholders to understand and drive the product or service s direction. Establish a digital environment and automate processes to minimize variation and ensure predictable high-quality code and data. Create technical test plans and records, including unit and integration tests, within automated test environments to ensure code quality. Provide support to DevOps teams working at all stages of a product or service release/change with a strong customer focus and end to end journeys, ensuring they have an excellent domain knowledge. Working with Ops, Dev and Test Engineers to ensure operational issues (performance, operator intervention, alerting, design defect related issues, etc. ) are identified and addressed at all stages of a product or service release / change. Provide support in identification and resolution of all incidents associated with the IT service, as directed by leadership of the DevOps team, Ensure service resilience, service sustainability and recovery time objectives are met for all the software solutions delivered. Responsible for automating the continuous integration / continuous delivery pipeline within a DevOps Product/Service team driving a culture of continuous improvement. Keep up to date and have expertise on current tools, technologies and areas like cyber security and regulations pertaining to aspects like data privacy, consent, data residency etc. that are applicable Requirements To be successful in this role, you should meet the following requirements: Must Have: Java 8 or above, Spring framework along with high experience in 1. Handling multi thread applications, 2. Concurrency Programming, 3. Distributed Transaction, like 2PC/3PC/TCC/Saga, State Machine experience before Some of the behaviours we expect from our engineers: Expertise in governance such as: Production governance Monitoring Risk & Control Support Deeper understanding of component delivery in areas such as: Security Accessibility Leading retros at a pod level. Broader knowledge of cross component dependencies and ownership. Actively improving the system stability and monitoring Understanding of underlying infrastructure components Understanding of tech debt. You ll achieve more when you join HSBC. .

Posted 2 weeks ago

Apply

5.0 - 10.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Educational Bachelor of Engineering Service Line Quality Responsibilities In this role, you will help architect, deploy security solutions, tools for Application, DevSecOps & SSDLC, and Public Cloud Security. You need to learn about Infosys business initiatives, products and business needs to drive clients' security projects. Develop technical solutions and advisesecurity controls to mitigate security vulnerabilities. Partner with Security Engineers, Architects, and clients to drive security initiatives in technology and policy governance. Technical and Professional : Azure, AWS, GCP, Sentinel, GRC, Threat Analyst, NIST, MITRE ATT&CK, SOC2, ISO27001, ISO27002, Identity, Access management, Security Engineering, Security Automation, Resiliency, DevSecOps, SSDLC, SDLC, Threat Modelling, Risk Assessor, Security Audit, zero trust, ZTNA, conditional access Preferred Skills: Foundational-Cybersecurity Competency Management-Cyber Competency Strategy Planning

Posted 2 weeks ago

Apply

2.0 - 5.0 years

5 - 8 Lacs

Bengaluru

Work from Office

Educational Bachelor of Engineering,BTech,BSc,BCA,Master Of Engineering,MTech,MSc,MCA Service Line Cyber Security Responsibilities As part of the Infosys consulting team, your primary role would be to actively aid the consulting team in different phases of the project including problem definition, effort estimation, diagnosis, solution generation and design and deployment Technical and Professional : Primary skills:AWS DevOps,Cloud Security-AWS Security,Cloud Security-Azure Security,Devops-Google Cloud Ptatform (GCP),GRC,GRC-RSA Archer(e-GRC),IDAM-Cyberark,IDAM-IBM Security Identity manager(ISIM),IDAM-Okta,IDAM-Oracle Identity Manager(OIM),IDAM-Ping/Federate,IDAM-Sailpoint,Infrastructure Security-Email Security,Network Security,Network Security-Firewalls-Checkpoint,Network Security-Firewalls-Juniper-Firewalls,Network Security-Firewalls-Palo Alto,Network Security-Firewalls-Web Application Firewall(WAF),Network Security-Load Balancer-F5,Technology-Identity Management-IDAM-Design , work flow , Implementation,Technology-Identity Management-Identity Governance Framework, Attestation,Access Cert, Role Mgmt,Auditing,Entitlement Mgmt, XACML,Technology-Identity Management-Identity,Account Provisioning and Reconciliation, SPML,Tools-Splunk Preferred Skills: Technology-Identity Management-Identity Management - ALL Technology-Identity Management-Privileged User Management-Novell NetIQ Privilege User Manager Technology-Enterprise Mobility Solution-MS Azure AD MS Azure RMS MS Intune

Posted 2 weeks ago

Apply

2.0 - 7.0 years

4 - 8 Lacs

Bengaluru

Work from Office

Educational Bachelor of Engineering,Bachelor Of Technology,Master Of Engineering,Master Of Technology,Bachelor Of Computer Science,Master of Computer Science Service Line Cyber Security Responsibilities A day in the life of an Infoscion As part of the Infosys consulting team, your primary role would be to actively aid the consulting team in different phases of the project including problem definition, effort estimation, diagnosis, solution generation and design and deployment You will explore the alternatives to the recommended solutions based on research that includes literature surveys, information available in public domains, vendor evaluation information, etc. and build POCs You will create requirement specifications from the business needs, define the to-be-processes and detailed functional designs based on requirements. You will support configuring solution requirements on the products; understand if any issues, diagnose the root-cause of such issues, seek clarifications, and then identify and shortlist solution alternatives You will also contribute to unit-level and organizational initiatives with an objective of providing high quality value adding solutions to customers. If you think you fit right in to help our clients navigate their next in their digital transformation journey, this is the place for you! Additional Responsibilities: Ability to work with clients to identify business challenges and contribute to client deliverables by refining, analyzing, and structuring relevant data Awareness of latest technologies and trends Logical thinking and problem solving skills along with an ability to collaborate Ability to assess the current processes, identify improvement areas and suggest the technology solutions One or two industry domain knowledge Technical and Professional : Primary skills:Technology-Finacle-Core-Payments-Real Time Gross Settlement-Master,Technology-Infrastructure Security-Security Incident and Event Management (SIEM),Technology-Infrastructure Security-Virtual Private Network, Firewall,Technology-Network-Firewall_and_Media-Check Point,Technology-Network-Firewall_and_Media-Juniper-Firewall,Technology-Network-Firewall_and_Media-Palo Alto Preferred Skills: Technology-Infrastructure Security-Security Incident and Event Management (SIEM)-IBM Qradar Technology-Infrastructure Security-Virtual Private Network Firewall-Zscaler ZPA Technology-Network-Firewall_and_Media-Check Point-firewall Technology-Network-Firewall_and_Media-Juniper-Firewall-firewall Technology-Network-Firewall_and_Media-Palo Alto Technology-Infrastructure Security-Secure Web Gateway-Zscaler ZIA

Posted 2 weeks ago

Apply

3.0 - 6.0 years

5 - 8 Lacs

Bengaluru

Work from Office

Total Yrs. of Experience* 3-6 Relevant Yrs. of experience in PP * 3 Job Description We are seeking a detail-oriented and analytical SOX audit profile for our communication client based out of USA. The ideal candidate will be responsible for evaluating various controls, identifying control gaps, and ensuring compliance with SOX requirements. This role involves working closely with clients, including business, IT, and external auditors. Key Responsibilities: Plan, execute, and document SOX testing procedures for key business and IT controls. Evaluate the design and operating effectiveness of internal controls over financial reporting. Identify control deficiencies and work with process owners to develop remediation plans. Assist in the development and maintenance of process documentation, including narratives, flowcharts, and risk-control matrices (RCMs). Coordinate with external auditors to support their reliance on internal testing. Monitor and report on the status of remediation efforts and control improvements. Stay current on changes in SOX regulations and industry best practices. Support special projects and continuous improvement initiatives related to internal controls and compliance. Qualifications: BTECH/BE 3 6 years of experience in SOX compliance, internal audit, or external audit. Strong understanding of SOX requirements like 404 and COSO framework. Excellent analytical, communication, and interpersonal skills. Ability to manage multiple priorities and meet deadlines in a dynamic environment. Mandatory skill SOX Audit - Plan, execute, and document SOX testing procedures for key business and IT controls. Evaluate the design and operating effectiveness of internal controls over financial reporting. Identify control deficiencies and work with process owners to develop remediation plans. Desired skills* Development and documentation of policies, procedures and guidelines related to SOX controls. Able to implement the organizations global strategies and initiatives to enhance Information Technology plans, operations, and procedures. Domain* Cyber-Security

Posted 2 weeks ago

Apply

2.0 - 7.0 years

7 - 10 Lacs

Hubli

Work from Office

Educational Bachelor of Engineering,BTech,BCA,Bachelor Of Computer Science,MCA,Master of Computer Science Service Line Cyber Security Responsibilities A day in the life of an Infoscion As part of the Infosys consulting team, your primary role would be to actively aid the consulting team in different phases of the project including problem definition, effort estimation, diagnosis, solution generation and design and deployment You will explore the alternatives to the recommended solutions based on research that includes literature surveys, information available in public domains, vendor evaluation information, etc. and build POCs You will create requirement specifications from the business needs, define the to-be-processes and detailed functional designs based on requirements. You will support configuring solution requirements on the products; understand if any issues, diagnose the root-cause of such issues, seek clarifications, and then identify and shortlist solution alternatives You will also contribute to unit-level and organizational initiatives with an objective of providing high quality value adding solutions to customers. If you think you fit right in to help our clients navigate their next in their digital transformation journey, this is the place for you! Additional Responsibilities: Ability to work with clients to identify business challenges and contribute to client deliverables by refining, analyzing, and structuring relevant data Awareness of latest technologies and trends Logical thinking and problem solving skills along with an ability to collaborate Ability to assess the current processes, identify improvement areas and suggest the technology solutions One or two industry domain knowledge Technical and Professional : Primary skills:Domain-Network-Network Security Firewall & Policies,IDAM,IDAM-Cyberark,IDAM-Forgerock,IDAM-Microsoft Identity manager,IDAM-Okta,IDAM-Oracle Access Manager(OAM),IDAM-Oracle Identity Manager(OIM),IDAM-Ping/Federate,IDAM-Sailpoint,IDAM-Saviyant,Technology-Application Security-Application Security - ALL,Technology-Enterprise Mobility Solution-MS Azure AD, MS Azure RMS, MS Intune,Technology-Finacle-Core-Payments-Faster Payment Service-Advance,Technology-Infrastructure Security-Security Incident and Event Management (SIEM),Technology-Network-CISCO technologies,Technology-Network-Firewall_and_Media-Palo Alto Preferred Skills: IDAM IDAM-Oracle Identity Manager(OIM) IDAM-Oracle Access Manager(OAM) IDAM-Sailpoint IDAM-Cyberark IDAM-Ping/Federate IDAM-Forgerock IDAM-Microsoft Identity manager IDAM-Okta IDAM-Saviyant Domain-Network-Network Security Firewall & Policies Technology-Application Security-Application Security - ALL Technology-Infrastructure Security-Security Incident and Event Management (SIEM)-Splunk Technology-Network-CISCO technologies Technology-Enterprise Mobility Solution-MS Azure AD MS Azure RMS MS Intune Technology-Network-Firewall_and_Media-Palo Alto Technology-Cloud Security-AWS - GRC

Posted 2 weeks ago

Apply

5.0 - 10.0 years

1 - 6 Lacs

Noida

Work from Office

Were Hiring: Social Media Manager Location: Noida | Full-Time | On-Site Company: Securium Solutions Pvt. Ltd. Are you a creative strategist with a passion for digital branding? Join our growing team to lead and grow our social media presence! Requirements: • 5+ years of proven experience in Social Media Management • Strong content planning and copywriting skills • Proficient in tools like Meta Business Suite, Canva, LinkedIn Ads, Hootsuite • Hands-on experience managing multiple platforms (LinkedIn, Instagram, X, etc.) • Experience in B2B, IT, or cybersecurity domain is a plus • Data-driven mindset with a knack for trends & engagement Apply: hr@securiumsolutions.com / ekta@securiumsolutions.com +91 9266722382 www.securiumsolutions.com

Posted 2 weeks ago

Apply

7.0 - 12.0 years

25 - 30 Lacs

Bengaluru

Work from Office

As a Senior Security Analyst/Engineer, you will be responsible for supporting the security operations of our organization by assisting in the monitoring, detection, and response to security incidents. This role offers a blend of security analysis and engineering tasks. This position offers a progression from foundational knowledge to more advanced responsibilities, allowing you to contribute significantly to the organization's cybersecurity efforts. Qualifications and Skills: Bachelor's degree ( Bachelor of Engineering / Bachelor of Technology) in Information Technology , Computer Science, Information Security, or related field 8-12 years of experience in a cybersecurity role with progressively increasing responsibilities Strong understanding of cybersecurity principles, threat landscape, and attack methodologies Proficiency in security tools and technologies such as SIEM, EDR, IDS/IPS, firewalls, and vulnerability scanners Excellent analytical, problem-solving, and decision-making skills Effective communication and stakeholder management abilities Certifications such as CompTIA Security+, CEH (Certified Ethical Hacker), or equivalent are a plus. Experience Demonstrated experience in conducting security analysis, incident response, and vulnerability management in a complex environment Hands-on experience with security tool optimization, security assessments, and penetration testing Proven track record of incident response efforts and effectively managing security incidents from detection to resolution.

Posted 2 weeks ago

Apply

9.0 - 14.0 years

25 - 40 Lacs

Navi Mumbai

Hybrid

Role Overview Bank is hiring a Technical Lead AI Security to join our CISO team in Mumbai. This is a critical, hands-on role ensuring the trustworthiness, resilience, and compliance of AI/ML systems, including large language models (LLMs). You will work at the intersection of cybersecurity and AI, shaping secure testing, understanding secure MLOps/LLMOps workflows, and leading technical implementation of defenses against emerging AI threats. This role requires both strategic vision and strong engineering depth. Key Responsibilities Lead and operationalize the AI/ML and LLM security roadmap across training, validation, deployment, and runtime to enable AI Security Platform Approach. Design and implement defenses against threats like adversarial attacks, data poisoning, model inversion, prompt injection, and fine-tuning exploits using industry leading open source and commercial tools. Build hardened workflows for model security, integrity verification, and auditability in production AI environments. Leverage AI security tools for scanning, fuzzing, and penetration testing models. Apply best practices from OWASP Top 10 for ML/LLMs, MITRE ATLAS, NIST AI RMF, and ISO/IEC 42001 to test AI/ML assets. Ensure AI model security testing framework aligns with internal policy, national regulatory requirements, and global best practices. Plan and execute security tests for AI/LLM systems, including jailbreaking, RAG hardening, and bias/toxicity validation. Required Skills & Experience 8+ years in cybersecurity, with at least 3+ years hands-on in AI/ML security or secure MLOps/LLMOps Proficient in Python, TensorFlow/PyTorch, HuggingFace, LangChain, and common data science libraries Deep understanding of adversarial ML/LLM, model evaluation under threat conditions, and inference/training-time attack vectors Experience securing cloud-based AI workloads (AWS, Azure, or GCP) Familiarity with secure DevOps and CI/CD practices Strong understanding of AI-specific threat models (MITRE ATLAS) and security benchmarks (OWASP Top 10 for ML/LLMs) Ability to communicate technical risk clearly to non-technical stakeholders Ability to guide developers and data scientists to solve the AI Security risks. Certifications: CISSP, OSCP, GCP ML Security, or relevant AI/ML certificates Experience with AI security tools or platforms (e.g., model registries, lineage tracking, policy enforcement) Experience with RAG, LLM-based agents, or agentic workflows Experience in regulated sectors (finance, public sector)

Posted 2 weeks ago

Apply

12.0 - 20.0 years

25 - 40 Lacs

Kolkata, Hyderabad, Bengaluru

Work from Office

Strong experience in SAP implementation and management

Posted 2 weeks ago

Apply

4.0 - 8.0 years

9 - 14 Lacs

Bangalore Rural, Bengaluru, Delhi / NCR

Work from Office

Position 1: Web and Network PT Consultant Proposed designation Consultant Role type Individual contributor Reporting to Work timings 12 PM to 9 PM Roles & responsibilities • Perform manual application penetration tests on one or more of the following to discover and exploit vulnerabilities: web applications, internal applications, APIs, internal and external networks, and mobile applications • Plan and execute network penetration testing and Red teaming assessments to simulate real-world attack scenarios. • Perform manual network and application penetration tests on internal network, Active Directory environment, web applications. • Perform social engineering assessment to assess the security awareness and physical security controls of the organization. • Ability to independently research for new vulnerabilities in systems and software and modify and customize tools, known exploits, POCs and scripts to meet operational requirement. • Research and stay up-to-date with the latest attack techniques, tools, and emerging threats. • Present technical reports to clients, explaining the outcomes of the testing and providing detailed insights and recommendations. • Collaborate effectively with cross-functional teams, including developers, IT operations, and business stakeholders to integrate security best practices seamlessly into project workflows. • Provide mentorship and guidance to junior security staff and foster a culture of proactive security awareness within the organization. This role is for you if you have the below • We are seeking an experienced and highly skilled Consultant with over 5+ years of working experience in the field of cybersecurity, including network penetration testing, vulnerability assessment, Active directory testing, phishing assessment and web application penetration testing. The ideal candidate will possess a strong working knowledge of Network protocols, performing OSINT to identify publicly available information and testing and exploiting Microsoft services like Windows Servers, Active directory, Certificate Services. Mandatory technical & functional skills JOB DESCRIPTIONS 2 • Perform manual application penetration tests on one or more of the following to discover and exploit vulnerabilities: web applications, internal applications, APIs, internal and external networks, and mobile applications • 5+ years of professional experience in cybersecurity, with a focus on Network penetration testing and Red teaming. • Strong understanding of Network protocols, web applications, cryptography, various operating systems and security technologies. • Strong understanding of exploitation of Microsoft platform used in enterprise environment such as windows Servers, Active Directory Certificate Service, Azure, etc. • Experience in one or more of the following a plus: Web application penetration testing, mobile application penetration testing application architecture and business logic analysis. • Relevant certifications, such as GWAPT, OSCP, OSEP, CRTP, CRTO, OSWA, are strongly preferred. Other information Interview process: Please expect 2-3 rounds of interview Does the job role involve travelling: No Does the busy season apply to this role: Seasonality of the work is dependent on the projects/ deliverable timelines Working location: Bangalore/Pune/Gurugram

Posted 2 weeks ago

Apply

10.0 - 14.0 years

27 - 42 Lacs

Pune

Work from Office

Job Summary As a Cyber Security Specialist you will play a critical role in safeguarding our organizations digital assets. With a focus on Cyber Threat Intelligence Services you will work to identify and mitigate potential threats. Your expertise in Cyber Security and Cloud along with experience in CrowdStrike will be essential in ensuring the security of our systems. This hybrid role offers the flexibility of working both remotely and on-site during day shifts. Responsibilities Lead the development and implementation of advanced cyber threat intelligence strategies to protect organizational assets. Oversee the monitoring and analysis of security threats using CrowdStrike and other advanced tools. Provide expert guidance on cloud security best practices to ensure data integrity and confidentiality. Collaborate with cross-functional teams to design and implement robust security architectures. Conduct regular security assessments and audits to identify vulnerabilities and recommend improvements. Develop and maintain incident response plans to effectively manage and mitigate security breaches. Coordinate with external partners and stakeholders to enhance threat intelligence capabilities. Implement security policies and procedures to comply with industry standards and regulations. Analyze security incidents and provide detailed reports to senior management. Train and mentor junior security team members to build a strong security culture within the organization. Stay updated with the latest cyber security trends and technologies to proactively address emerging threats. Support the integration of security solutions into existing IT infrastructure to enhance overall protection. Drive continuous improvement initiatives to optimize security operations and reduce risk exposure. Qualifications Possess a deep understanding of cyber threat intelligence services and their application in a corporate environment. Demonstrate proficiency in using CrowdStrike for threat detection and response. Exhibit strong knowledge of cloud security principles and practices. Have a proven track record of conducting security assessments and audits. Show experience in developing and implementing incident response plans. Display excellent communication skills for effective collaboration with cross-functional teams. Hold a relevant degree in Cyber Security Information Technology or a related field. Certifications Required Certified Information Systems Security Professional (CISSP) Certified Cloud Security Professional (CCSP)

Posted 2 weeks ago

Apply

10.0 - 15.0 years

10 - 12 Lacs

Navi Mumbai

Work from Office

Were Hiring: System Network Administrator Company: GFG Alliance Location: Vashi, Navi Mumbai (with regular travel to BKC/Vashi as required) Division: Information Technology Experience: 10–18 years Education: Bachelor's in IT/Computer Science (Certifications like CCNA, CCNP, MCSA preferred) GFG Alliance , a global leader in sustainable industry, is seeking an experienced System Network Administrator to strengthen our IT infrastructure and ensure seamless operations across multiple locations. This is a hands-on, high-impact role covering network security, server management, cloud systems (AWS, Azure), and user support—critical to powering our business operations. Key Responsibilities: Configure and manage LAN/WAN, routers, switches, firewalls Administer cloud/on-premises servers (Windows, Linux, macOS) Handle AD, DNS, DHCP, virtualization (VMware/Hyper-V) Implement cybersecurity, data protection, and disaster recovery protocols Provide IT support for office and Director’s residence Collaborate with vendors and maintain detailed IT documentation What We’re Looking For: Deep understanding of network protocols, firewalls, VPNs, and IDS/IPS Experience in IT infrastructure management and cloud platforms (AWS, Azure) Strong problem-solving skills and ability to work independently Flexibility to travel between Vashi, BKC, and Nerul as required Be part of GFG Alliance’s journey to build a sustainable future through innovation and operational excellence. Apply Now : https://forms.gle/PUbNi5x6SjKjNGMP6

Posted 2 weeks ago

Apply

0.0 - 1.0 years

0 - 2 Lacs

Mumbai, Mumbai Suburban, Navi Mumbai

Work from Office

Create and deliver cyber security awareness training programs. Collaborate with IT security teams to develop and implement effective security policies and procedures, SOP and supporting documents. Timely initiation, management, closure of activities. Required Candidate profile Exp:1+Years Location - Ghansoli Np : Immediate joiner Any Queries- kanchan@peshr.com/9867762401

Posted 2 weeks ago

Apply

12.0 - 15.0 years

35 - 55 Lacs

Gurugram

Work from Office

Responsibilities:- Lead the IT in the organization with major verticals NOC, IT OPS, IT Security, and IT Assets with the commitment to the agreed SLA/TAT. Maintain the CAPEX/OPEX and plan the AOP of the year. Maintain the IT infrastructure and its continuity to achieve a 24/7/365 business environment. Be on edge to use cutting-edge technology and Implement as per the business requirement. Maintain the WAN/ISPs, P2P, MPLS, Cloud, and on-prem Infra. Maintain and Monitor the Network Infrastructure including all the layers of the Network and have good knowledge of OSI layers. E.g. Switching(l2+L3), Firewalls, LAN and WLAN controllers, NAC, SDWAN, etc. Maintain and Monitor the IT OPS Infrastructure including End User support and Expected technologies like Google Workspace (G-suite), AD/LDAP, NGAV, PatchMGMT, ITSM, Ticketing System, etc. Maintain Security of Onprim, DC/Cloud, Endpoint/users, and Email, to ensure a high level of security across the organization. E.g. DLP, Endpoint EDR/NGAV, Firewall, SSL, Crypto, Endpoint Encryption, and Email security. Also, help Internal and external auditors to plan the audits and related mitigations and preventions. Maintain the 70K+ IT assets across the 5K sites along with multiple IT stores across Delhivery including SAM and HAM. Involvement in regular Internal and cross-functional audits, keeping in mind ISO 9001:2013 for quality assurance and 27001:2013 for security things. Manage the on-roll/off-roll of 350 team members along with KRA/KPI and JD. Take responsibility for sudden outages and way forward improvements. Lead the Projects for Upcoming sites with the respect to IT Infrastructure and OPS. Participate in day-to-day meetings with the team, cross-functional team, and vendors to maintain the SLA/TAT. Interact with different stakeholders to understand their requirements and challenges related to OPS and IT. Update management with periodic reporting, updates, announcements, and newsletters related to IT activities.

Posted 2 weeks ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Bengaluru

Work from Office

FICO (NYSEFICO) is a leading global analytics software company, helping businesses in 100+ countries make better decisions. Join our world-class team today and fulfill your career potential! The Opportunity " The Security Engineer is a highly visible and critical role, collaborating on complex cloud and corporate service edge protection technologies and oversight. With your proven history of technical knowledge of identity and access management systems and services you will be working on a variety of different challenges facing the organization. You will provide both guidance and direct input to help ensure a secure, well-protected environment that complies with all applicable security standards ". Director, Cyber Security. What Youll Contribute Assist with implementation of security tools and services to enhance the oversight and governance of all company identities. Assist with implementation of identity governance and administration (IGA) solutions for the company. Implement identity security detections using next-gen Identity Threat Detection and Response (ITDR) and Non-Human Identity (NHI) platforms and tools. Create automated tooling to test identity systems to ensure detections work as designed. Create automation to produce automated policy and posture collection and reporting, to allow for identity-specific proofs managed within Infrastructure as Code. Create pipelines to deploy and manage IAM solutions and tooling. Provide engineering and technical guidance for supporting the automation of interacting with security tools and services that support the IAM program within the company. Keep current on emerging security technologies and tools and provide recommendations. Support our compliance and certification initiatives and design with those in mind. Collaborate with other engineers on design, analysis, architecture, implementation, pen-testing, security reviews and process enhancements. What Were Seeking 2-4 years in a security role, preferably in financial services or technology. Experience in securing hybrid network infrastructure services. Expertise in security, identity, architecture, and design. Hands-on experience with AWS, Azure, or other cloud platforms and IAM best practices. 2-4 years of experience with privileged access management tools (CyberArk, SailPoint, Delinea). Experience with Okta preferred. Proficiency in identity-related technologies and protocols (LDAP, SAML, OAuth, OIDC). Experience with identity provider services (Active Directory, AWS IAM, Okta). Familiarity with Zero Trust security models (Zscaler, AWS networking). Knowledge of Identity Governance Administration services. Experience with automation scripting and API integrations. Familiarity with DevOps concepts, IaC tools, and CI/CD pipelines. Proficiency in at least one high-level language (e.g., Python). Understanding of compliance frameworks (PCI-DSS, ISO 27001, NIST). Certifications like CISSP, AWS Security Specialty, or Azure SC-300 preferred. Our Offer to You An inclusive culture strongly reflecting our core valuesAct Like an Owner, Delight Our Customers and Earn the Respect of Others. The opportunity to make an impact and develop professionally by leveraging your unique strengths and participating in valuable learning experiences. Highly competitive compensation, benefits and rewards programs that encourage you to bring your best every day and be recognized for doing so. An engaging, people-first work environment offering work/life balance, employee resource groups, and social events to promote interaction and camaraderie. Why Make a Move to FICO At FICO, you can develop your career with a leading organization in one of the fastest-growing fields in technology today Big Data analytics. Youll play a part in our commitment to help businesses use data to improve every choice they make, using advances in artificial intelligence, machine learning, optimization, and much more. FICO makes a real difference in the way businesses operate worldwide Credit Scoring FICO Scores are used by 90 of the top 100 US lenders. Fraud Detection and Security 4 billion payment cards globally are protected by FICO fraud systems. Lending 3/4 of US mortgages are approved using the FICO Score. Global trends toward digital transformation have created tremendous demand for FICOs solutions, placing us among the worlds top 100 software companies by revenue. We help many of the worlds largest banks, insurers, retailers, telecommunications providers and other firms reach a new level of success. Our success is dependent on really talented people just like you who thrive on the collaboration and innovation thats nurtured by a diverse and inclusive environment. Well provide the support you need, while ensuring you have the freedom to develop your skills and grow your career. Join FICO and help change the way business thinks! Learn more about how you can fulfil your potential at www.fico.com/Careers FICO promotes a culture of inclusion and seeks to attract a diverse set of candidates for each job opportunity. We are an equal employment opportunity employer and were proud to offer employment and advancement opportunities to all candidates without regard to race, color, ancestry, religion, sex, national origin, pregnancy, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. Research has shown that women and candidates from underrepresented communities may not apply for an opportunity if they dont meet all stated qualifications. While our qualifications are clearly related to role success, each candidates profile is unique and strengths in certain skill and/or experience areas can be equally effective. If you believe you have many, but not necessarily all, of the stated qualifications we encourage you to apply. Information submitted with your application is subject to theFICO Privacy policy at https://www.fico.com/en/privacy-policy

Posted 2 weeks ago

Apply

4.0 - 8.0 years

6 - 10 Lacs

Bengaluru

Work from Office

About the Role : Looking for Cybersecurity Test Engineer who will be working closely with Hardware, Software and Systems engineering teams to deliver the next generation of Automotive SOC's. Ideal candidate is someone who has strong knowledge and hands on experience with Cybersecurity ISO 21434 standards. He/she should be able to Validate Cybersecurity features for Automotive SOC's and its applications. Responsibilities : - Perform penetration testing of SoC Automotive products. - Establish the Security goals and requirements. - Verification strategies in compliance with ISO 21434. - Develop test specifications, test cases, and test plans for security vulnerability testing. - Scan vulnerabilities with regards to CVSS levels and patch fixing from NIST database. - Perform code-level fuzz testing using open source tools. - Support documentation of test results and collaborate with the development team. - Participate in automating test process within CI/CD environments. - Setup and maintain traceability in compliance with Automotive SPICE requirements. - Experience in tools like OpenVAS, Nmap , wireshark, penetration testing for embedded systems. - Experience in Automotive domain is a must. - Practical experience performing TARA, security concepts and other Cybersecurity Artefacts mentioned in IS021434.

Posted 2 weeks ago

Apply

2.0 - 4.0 years

0 - 0 Lacs

Bengaluru

Work from Office

Neridio requires passionate engineers for product management in Data security and information storage security with a BTech/BE in Engineering or related, familiar with Data management and Cyber security industry. MBA in Marketing will stand out ! Required Candidate profile BTech/BE in CS/IT/ECE or MCA with MBA in Marketing experience in Cyber security domain

Posted 2 weeks ago

Apply

5.0 - 7.0 years

7 - 9 Lacs

Bengaluru

Work from Office

Responsibilities First line review of all incoming cases to the Trust Office in Salesforce. Validate each case for accuracy and prepare for pickup. Responding to requests for information from internal sales teams regarding compliance and security matters for customers and prospects. Prepare and distribute weekly reporting from Salesforce Prepare and send Security and Trust assurance packet (STAP) to customers and prospects. Additional responsibilities and tasks as required and assigned Basic Qualifications Self-starter with excellent communication, collaborative, and presentation skills Minimum of 2 years of relevant experience in computer science, cyber security, governance risk and compliance, or related domains Experience with security control frameworks (e.g. SSAE16, ISO27001, NIST, PCI, SIG, CSA, HIPAA, HITRUST, FedRamp) Experience with Salesforce and Google workspace applications. Professional communicator in both verbal and written English Understanding of compliance and cyber security implications for business Experience with SaaS and cloud solutions environments Experience working with cross functional teams Strong analytical and communication skills Strong attention to detail, excellent organizational skills, and superior time management skills A very strong passion to learn and continuously improve A willingness to contribute to team discussions and challenge views Preferred Qualifications Degree qualified or higher in a relevant field or equivalent work experience Experience working with external customers regarding their compliance assessments and controls Independently driven, resourceful, and able to deliver results with minimal oversight; Strong sense of ownership, urgency, and drive Strong business acumen with the ability to engage with technical teams to present assessment results, risks and to participate in discussions around acceptable and compensating controls Experience working hands-on with cross-functional teams in assessing processes, risks and controls

Posted 2 weeks ago

Apply

3.0 - 8.0 years

5 - 10 Lacs

Hyderabad

Work from Office

Job Area: Information Technology Group, Information Technology Group > Cyber Security Engineering General Summary: PeopleThis role is a combination of 'Data Loss Prevention (DLP) & security orchestration lead in Cyber Defense Center which operates 24x7 thus requires being available on call during weekends and off hours including night shift to support the business requirements of the organization.People management is essential to this role.Continuous focus on upskilling the CDC analysts to keep them upskilled in automation and in 'Data Protection'.Mentor the team to innovate solutions, also improve DLP investigations and operational efficiency.Help drive lower attrition using direct engagement methods like 'Rewards and Recognition' and other indirect engagement methods to retain staff.Ensure maximum coverage and efficient operations.ProcessManage the KPIs, operational deliverables, problem management & operational excellence.Maintain accuracy in DLP escalations to drive 'Zero Tolerance for Errors'.Lead the Shift Handovers & assist the team with direction to investigate key DLP alerts.Actively participate in the stakeholder meetings to review the escalation of Company Confidential Information (CCI) triggered from DLP team.Look for opportunities to gather patterns, anomalies from SOC escalations and drive feedback with relavent stakeholders on preventative measures to bolster the Data Loss Prevention (DLP) policies.Align with the CDC maturity roadmap on innovation and assign priorities for implementation.Drive enforcing and or governing the escalation process between CDC analysts and Cyber Investigations Team (CIT).Accountable for meeting the SOC KPIs that includes "Time Savings by Automaiton", "Quality Accuracy', 'Acknowledgement Time', 'Time to Escalate' & 'Resolution Time'.Synergies with cross-functional teams across Qualcomm.Technology and engineeringLook for opportunities to drive innovation within Cyber Defense Center. Leverage AI/ML to mature the current automation to become a NexGen capability center.Mature automation processes and capabilites to perform faster and more efficient responses leveraging automation and orchestration.Look for opportunities to gather patterns, change in CCI violation channels, techniques, anomalies from CDC investigations and drive feedback with relavent stakeholders on preventative measures. Minimum Qualifications: Bachelor's degree in Engineering, Information Systems, Computer Science, or related field and 3+ years of cybersecurity-relevant work experience. OR High School diploma or equivalent and 5+ years of cybersecurity-relevant work experience. Physical : Frequently transports and installs equipment up to 40 lbs. 8+ years of proffessional experience in IT with prior experience in automation & people managementThe individual must have a strong knowledge on programming skills, delivered automation projects & good awareness of current and developing security threats and technologies, especially on 'Data Protection'Knowledge on DLP tools is mandatory, while CASB is essentialStrong proficiency in DLP investigations, also in written and spoken EnglishExcellent Problem Solving and Critical Thinking SkillsStrong interpersonal skills and a good team playerBachelor’s degree or Master’s Degree in Computer Sciences or in Cyber Security 6 years of 'Information Security' experience & min 3 years of expereience in managing people in 24x7 Security operationsCEH, Security+, OSCP or other industry-relevant cyber-security certifications and ITIL V3.0, 'SAFe Agilist' knowledge is a plus Bachelors Degree in Engineering/Masters in information security Bachelor’s degree or Master’s Degree in Computer Sciences or in Cyber Security CEH, Security+, OSCP or other industry-relevant cyber-security certifications and ITIL V3.0, 'SAFe Agilist' knowledge is a plus

Posted 2 weeks ago

Apply

3.0 - 5.0 years

10 - 14 Lacs

Bengaluru

Work from Office

- Information Security Manager shall be primarily responsible to : - Run and manage the BAU security infosec operations - Create and maintain ISMS Policy and Process documents - Ensure Infosec compliance with RBI and other regulatory agencies - Participate in IT Infosec Audits and ensure closure of observations within given timeliness - Conduct regular VAPT (Vulnerability Assessments) and track closure of open observations - Identifying and evaluating new IT security technologies and services and implementing it - Ensure cyber security related polices and technologies are in place - Conducting regular Inforsec Awareness within users in the organization - The person needs to work closely with the CISO and other stakeholders Risk, IT and Audit teams. - The position will based at CreditAccess Grameen HQ in Bangalore, and may require short term travel on need basis to other CAGL offices. Key Accountability: - Ensuring adequate security controls are in place & working effectively within the organization for information & cyber security - Ensuring effectiveness of all IT controls to prevent any unauthorized access or activities at a system administration level - Identify potential security weaknesses through vulnerability assessments and track them to closure within the timeliness -Tracking and reporting key risk indicators defined for IT processes - Create and maintain the documentation for information system audits in accordance with regulatory and compliance requirements - Create Review ISMS policy and process - Implement Strategic IT Infosec projects to strengthen the overall IT Security posture at CAGL

Posted 2 weeks ago

Apply

6.0 - 10.0 years

15 - 25 Lacs

Bengaluru

Work from Office

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you a tech-savvy problem-solver with a passion for ensuring optimal network performance? If so, look no further – Kyndryl is seeking a Network Support Specialist who will be the go-to expert for installing, maintaining, and troubleshooting computer networks. As our Network Support Specialist, you'll be working in a complex, multi-vendor environment, and will use your analytical skills to identify and resolve network issues, make configuration changes, and implement security policies. This role requires someone who can think on their feet, test and apply corrective actions (including emergency changes), and participate in change reviews as needed. And with the ever-changing nature of technology, you'll be constantly learning and growing in your role. You will work alongside a talented team of experts to plan and execute routine network changes, troubleshoot and solve network issues and outages, and maintain excellent communication with our end customers, project managers, and service engineers. You’ll be responsible for maintaining network components, monitoring network performance, and maintaining network security. You will also be providing user support for network-related issues, ensuring that our customers receive the highest level of support possible. If you're ready to take on a fast-paced and rewarding role in the world of network support, apply to join the Kyndryl team today! Roles & Responsibilities: Perform firmware upgrades, patches, and routine maintenance on firewalls. Integrate firewall solutions with SIEM, IDS/IPS, endpoint protection, and cloud security tools. Monitor network performance and security systems, responding to security incidents and conducting root cause analysis. Investigate and respond to security breaches, malware infections, and intrusion attempts & Major incident handling. Configure, and manage enterprise antivirus solutions (such as TrendMicro, CrowdStrike, or similar) & Configure and manage EDR and XDR solutions. Monitor and analyze security alerts, logs, and reports for malware infections and security incidents. Implement real-time protection, signature updates, behavioral analysis, and heuristic scanning techniques & install and uninstall endpoint security solutions. Implement network virtualization, micro-segmentation, distributed firewalling (DFW). Troubleshoot and optimize NSX networking components, including VXLAN, Overlay, Edge Services Gateway (ESG), and Distributed Logical Routers (DLR). Configure NSX Security Policies, NAT, VPN, Load Balancing, and Firewall rules. Configure, and manage Web Application Firewalls (WAF) in on-premises and cloud environments, configure, and manage NAC for wired, wireless, and VPN network access control. Create and fine-tune security policies, custom rules, and signatures to critical signature. Monitor and analyze WAF logs, alerts, and traffic to detect and mitigate web-based attacks. Design and implement .1X authentication, MAB (MAC Authentication Bypass), posture assessment, and profiling policies. Understanding of PKI, certificate-based authentication, endpoint profiling, and device posture assessment. Monitor, analyze, and respond to NAC logs, security alerts, and compliance reports Configure, and manage Arcon PAM solutions to secure privileged accounts and sensitive data across the organization. Troubleshoot and resolve PAM issues, including access failures, session disruptions, and integration problems User onboarding to PAM and giving required access to systems. Monitor and analyze PAM-related logs, access requests, and activity reports to detect potential security incidents or policy violations Implement and optimize web filtering policies, SSL decryption, and content inspection Monitor and analyze proxy logs, user activities, and internet traffic for security threats and policy violations Troubleshoot proxy performance issues, website access problems, and SSL-related errors, configure, and manage Data Loss Prevention (DLP) solutions Develop and enforce data security policies to detect and prevent unauthorized data transfers. Configure DLP rules, keyword detection, fingerprinting, and machine learning-based policies. Monitor and analyze DLP alerts, incidents, and logs for potential data breaches or policy violations. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Skills and Experience: Experience in cybersecurity, SOC, or security engineering roles. Total experience of 10+ years. Strong knowledge of network security, endpoint security Hands-on experience with WAF, IBM DAM, IBM GDE, Forcepoint Proxy, DLP, Email Gateway. Hands-on experience with FortiManager, Thales CipherTrust and FortiAnalyzerCreate and exp with DAM solutions such as IBM Guardium. BSc. B.E./B. Tech, M.E. /M. Tech . Ability to monitor and audit database activities for unauthorized access and suspicious activities. Understanding of key management solutions (KMS) and Hardware Security Modules (HSMs) & WAF Signature analysis. Hands-on experience with SDWAN, PaloAlto , FortiGate and Checkpoint. Expertise in NSX-T components such as Transport Zones, Edge Nodes, and T0/T1 Gateways. Implement and maintain VPNs, IPSec tunnels, and SSL VPNs using Palo Alto and FortiGate technologies. Proficiency in routing protocols BGP, OSPF, Configure proxy and network access control (NAC) solutions. Preferred Skills and Experience : Network Virtualization (VCTA-NV) , Forcepoint DLP, Web Security Administrator Certification , CEH , CompTIA Security+. PCNSE, NSE4 ,WAF Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 2 weeks ago

Apply

2.0 - 6.0 years

4 - 8 Lacs

Pune

Work from Office

Securonix is leading the evolution of SIEM for today s hybrid cloud, data-driven enterprises. Securonix Unified Defense SIEM provides organizations with content-driven threat detection, investigation, and response (TDIR) solution built with a highly scalable data cloud and a unified experience from the analyst to the CISO. The innovative cloud-native solution enables organizations to scale up their security operations and keep up with evolving threats. Securonix Unified Defense SIEM provides organizations with 365 days of hot data for fast search and investigation, threat content-as-a-service, proactive defense with continuous peer and partner collaboration, and a unified Threat Detection, Investigation and Response (TDIR) experience, all in a single platform. The platform is built on a cloud native architecture and leverages the power of the Snowflake Data Cloud. Summary: Data science and machine learning within cyber security is an exciting and fast evolving field which has seen rapid growth in the last few years. The Securonix SIEM provides a large amount of data from which we can extract insights and develop solutions which drive the industry forwards. Securonix Threat Science Team is a team of data scientists and research engineers producing data driven solutions to meet our business needs. These needs include: The development and productization of new threat detection algorithms and the improvement of existing detection algorithms Increase in the efficiency of our customer s ability to protect themselves by: Prioritizing threat relevant evidence/risk quantification Reducing alert volumes Quantifying product quality. Supporting internal business operations. Customer facing POCs. Responding to algorithmic failures in production algorithms produced by the team. We are looking for a dedicated data scientist/senior data scientist that can conduct research, develop tools, and collaborate closely both within the team, and with product, engineering, and other departments. Please note that this is a data scientist role, and not an engineering position. Responsibilities: Research and implement innovative tools for security decision support. Collaborate with multiple teams and support internal business requests. Conduct and support POCs with customers to gain and incorporate feedback, improving our offerings. Present research findings to internal and external stakeholders Conduct statistical and machine learning research to identify potentially malicious activity and work with threat hunters to verify findings, utilizing predominantly time series analysis, anomaly detection and unsupervised learning methods. Qualifications: Master s degree/PhD (or equivalent) in Statistics, Mathematics, Machine Learning, or other similar quantitative discipline. Experience conducting data-driven research, in real-world settings, for peer-reviewed publications and/or public code projects. Experience formulating research problems and assessing relevant literature Ability to code in Python, and ideally familiarity with PySpark and AWS (EMR, Glue, S3). Experience presenting research to stakeholders, and a mixture of both technical and non-technical audiences. Preferred experience with time series analysis, anomaly detection methods and unsupervised learning. Benefits: As a full-time employee with Securonix, you will be eligible for the following employee benefits: Health Insurance with a total sum insured is INR 5,00,000 Coverage: Self, Spouse, 2 kids, Dependent parents, or parents-in-law Personal Accident with total sum insured is INR 10,00,000 Term Life Insurance with a sum assured for employees is 5 times fixed base pay is covered.

Posted 2 weeks ago

Apply

4.0 - 9.0 years

3 - 7 Lacs

Chennai

Work from Office

The Cyber Incident Responder will be responsible for managing the organisation s response to all severity levels (Sev 1-4) of security incidents. The role involves leading the investigation, recovery, and follow-up of security incidents, allocated based on time of day, business area, and the individual s skills and experience. The responder will work closely with the team to ensure timely recovery from security incidents and collaborate with other departments to implement processes, procedures, and technologies to prevent future occurrences. Additionally, the role includes reviewing, improving, and maintaining a comprehensive suite of security incident response procedures and playbooks. The Cyber Incident Responder will also be expected to conduct threat analysis, provide incident reports, and participate in post-incident reviews to identify lessons learned and areas for improvement. What youll be doing: Manage Security Incidents: Effectively oversee the management, investigation, and forensic analysis of security incidents. Team Collaboration: Collaborate with team members to optimise incident response processes, procedures, and approaches. Procedure and Playbook Maintenance: Continuously review, enhance, and maintain security incident response procedures and playbooks. Stakeholder Engagement: Develop and maintain strong relationships with internal stakeholders, suppliers, and external agencies. Incident Simulations: Participate in and enhance regular cyber security incident simulations and exercises to ensure preparedness. Threat Analysis and Reporting: Conduct threat analysis, generate incident reports, and participate in post-incident reviews to identify lessons learned and areas for improvement. What youll need: Computer Science Degree (desirable but not essential) CISSP or similar Certified Incident Handler or similar Certified Forensic Analyst or similar Experience of managing security incidents within a large multinational organisation Experience of driving security investigations and forensics Experience of working within a high pressured security incident response team Experience of working with suppliers, external stakeholder and internal teams and developing strong and trusting working relationships

Posted 2 weeks ago

Apply

3.0 - 8.0 years

5 - 8 Lacs

Hyderabad

Work from Office

Hiring for SAP Security- Bangalore Design, build, and maintain SAP user roles and authorizations in systems such as ECC, S/4HANA, BW, GRC, Fiori, and others. Implement and maintain SAP Security policies, standards, and procedures. Perform user administration and role assignment through SU01, PFCG, SUIM, and SU53. Collaborate with functional and technical teams during project rollouts to ensure secure system access and proper segregation of duties (SoD).

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies