Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
4.0 - 7.0 years
12 - 15 Lacs
Bengaluru
Work from Office
Responsibilities: Lead sales & business dev efforts Manage client relationships Drive revenue growth Ensure compliance with industry standards Develop cybersecurity strategies Health insurance Annual bonus Provident fund
Posted 4 weeks ago
5.0 - 10.0 years
12 - 17 Lacs
Mumbai
Work from Office
i. BE/B. TECH/BCA/B.SC/M.SC/MCA/M. Tech-(Computers/Electronics/IT) ii. Minimum one certification such as CEH/CPTC/OSCP/ECSA/CEPT and/or equivalent. iii. Having at least 5+ years of post-qualification relevant work experience including appearance before court of law while presenting the extracted cyber evidence. iv. Experience of managing large scale digital evidence media. v. Comprehensive knowledge on forensic digital device data preservation, acquisition, analysis and documentation. vi. Experience in-depth practical knowledge on Ethical Hacking, Penetration Testing, OSINT, Deep and Dark Net Investigations. vii. Experience in handling real-life cyber- crime cases would be preferred. viii. Experience in investigation on Web Defacement/Site Down activities ix. Experience in investigation of Email and VOIP call Analysis and trace Down Methods. x. Experience in investigation on Web SMS/Image/Reverse Image/Video Source tracing methods. xi. Experience in practical knowledge multiple enterprise and open source which have industry benchmark. xii. Experience in comprehensive knowledge on System, Mobile Forensics, Internet Forensics, Cloud Forensics, CC Footage/AV Forensics, Database Forensics, Network Forensics, Malware Forensics, Stegano and Crypto Forensics, Memory Forensics, UAV Forensics and /or other variety of Forensic formats. xiii. Experience in-depth practical knowledge on Malware Forensics, Memory Analysis, Ethical Hacking, Penetration Testing, OSINT, Deep and Dark Net Investigations, Advanced persistent threats (APTs), Sophisticated analysis of malware, cyber security incident (Packet tracing, Web Logs, taking a copy of the mail store and aggregated log analysis), performing threat modeling, and producing intelligence threat assessments. xiv. Experience in practical knowledge on multiple enterprise, open-source tools, Static and Dynamic Malware Analysis Tools. xv. Experience in generating forensic documents for case investigation. xvi. Graduation from premier institutes (IITs, NITs, NFSL, IIIT, etc.) shall be preferred. xvii. Bug-bounty program winners will be preferred. .
Posted 4 weeks ago
5.0 - 10.0 years
5 - 8 Lacs
Gurugram
Work from Office
Job Title: Software Electronic Control System Experience: 2~ 5 Years Age Limit: 22 ~ 27 Years Educational Qualification Essential : B.E / B. Tech in Electrical / Electronics / Mechanical Desirable: Experience Knowledge Automotive Software architecture and experience in following areas: Model Based Software Design Testing Validation Software Development Requirement Management In Vehicle Networks (CAN/LIN) Cyber Security Vehicle Gateways Design Improvements Experience of preparing MATLAB models for controllers logic Work experience in HILS (Hardware In Loop Simulation) Role: Design and Development for Softwares of Automotive electrical electronics parts and implementation of In-vehicle Networks. Automotive software testing and development. Responsibilities: Prepare electronic controller s software specification and In vehicle network Design specifications. Conduct software design check. Supplier interaction supplier management for Controller Software development. Technical reviews/Design reviews with suppliers. Engineering evaluation of part (vehicle level and part level). Coordination for meeting the targets of design and development. Project management. Design: -Optimization -Benchmarking Technical/ Functional: Good knowledge for all vehicle electrical electronics parts/ systems. Model based Software design. Experience in creating software specifications for the automotive electronic controllers and In vehicle Network (CAN/LIN). Proficiency in CANOE software usage. Understanding of vehicle level testing of electronic controller s software. Experience in Encryption and Cyber security. Desirable: Worked in Automotive OEM and have experience of full vehicle development cycle. Minimum 2 years of hands on experience in the Automotive Electronic Controller software development. Understanding of Vehicle Product Development Life cycle. Behavioral: Effective team player having Positive attitude. Study Industrial Trends (global domestic) and apply it in work related area. Co-ordinate department activities and represent in various forums. Good Interpersonal, Communication Presentation skills.
Posted 4 weeks ago
2.0 - 7.0 years
7 - 11 Lacs
Gurugram
Work from Office
Desirable: Experience Knowledge Automotive Software architecture and experience in following areas: Model Based Software Design Testing Validation Software Development Functional Requirement Generation In Vehicle Networks (CAN/LIN) Cyber Security Vehicle Gateways Design Improvements Experience of preparing MATLAB models for controllers logic Work experience in HILS (Hardware In Loop Simulation) Role: Design and Development for Softwares of Automotive electrical electronics parts and implementation of In-vehicle Networks. Automotive software testing and development. Responsibilities: Prepare electronic controller s(BCM, A/B, AC) software specification and In vehicle network Design specifications. Conduct software design check. Supplier interaction supplier management for Controller Software development. Technical reviews/Design reviews with suppliers. Engineering evaluation of part (vehicle level and part level). Coordination for meeting the targets of design and development. Project management. Design: -Optimization Technical/ Functional: Good knowledge for all vehicle electrical electronics parts/ systems. Model based Software design. Experience in creating software specifications for the automotive electronic controllers and In vehicle Network (CAN/LIN). Proficiency in CANOE software usage. Understanding of vehicle level testing of electronic controller s software. Experience in Encryption and Cyber security. Desirable: Worked in Automotive OEM and have experience of full vehicle development cycle. Minimum 2 years of hands on experience in the Automotive Electronic Controller software development. Understanding of Vehicle Product Development Life cycle. Behavioral: Effective team player having Positive attitude. Study Industrial Trends (global domestic) and apply it in work related area. Co-ordinate department activities and represent in various forums. Good Interpersonal, Communication Presentation skills.
Posted 4 weeks ago
14.0 - 19.0 years
9 - 13 Lacs
Gurugram
Work from Office
Position Title: Vehicle Cyber Security - Product Processes Educational Qualification Essential: B.E. / B. Tech. in Electrical/Electronics/Computer Science Desirable: M.E. /M. TECH. / Masters / Post-graduate certificate in cybersecurity, embedded electronics, automotive electronics Certification(s) in Cybersecurity, Embedded Electronics etc. Experience: 10~14 years Location: Gurgaon Role: Manage team for Vehicle cyber security Implementation as per UNR155 Lead the team for various activities related to CS implementation like TARA, preparing CS concept, CS product specification, CS verification, PSIRT etc Supporting Automotive ECUs development teams for CS implementation Supporting vehicle homologation team during discussion with certification agencies and vehicle type approval Responsibilities: Develop a cost-effective Vehicle CS concept and CS solution for relevant controllers. Develop process to manage CS requirements, specification, verification, PEN testing etc. (RFQ, SOR, SPEC, TARA, CHECKLIST, etc.) Project management: Plan and monitor CS development activities for smooth implementation as per UNR155 in various models. Supporting CS capability development of team and relevant stakeholders Verification of ECU part level CS test result and analysis report Verification of vehicle-level cybersecurity measures including type-approval demonstration to regulatory agencies CS Vulnerability Incident Management (PSIRT) Compiling cybersecurity relevant incidents, technology trends industry best practices and sharing it with internal workgroup Competency Technical/ Functional: Knowledge of ISO21434, ISO 24089, ISO 26262 standards. Hands on TARA experience i.e. Identify cyber security assets, threat vectors, attack path, risk assessment etc Knowledge of various CS measures applied on Hardware, Software, In vehicle server communication. Hands-on experience in automotive ECU CS development i.e. CS development cycle implementation (Concept/ CS Specifications / Product Development etc) Cryptography - Knowledge of various cryptographic algorithms/function applied for protection of different cybersecurity properties. Awareness for global standards e.g., NIST, FIPS Practical experience of ECU embedded software development Desirable: Automotive OEM experience: Vehicle design and development cycle System level understanding of various vehicle functions and functional safety compliance. Ethical hacking, penetration testing at ECU and/or vehicle level. Knowledge of Japanese language would be an added advantage.
Posted 4 weeks ago
5.0 - 10.0 years
4 - 8 Lacs
Gurugram
Work from Office
Desirable: Experience Knowledge Automotive In vehicle network design and experience in the following areas: Software Dev. process experience (Autosar/ Non Autosar) In vehicle network design and development Must Have Knowledge of CAN, LIN, automotive ethernet, UDS and KWP protocols. Good knowledge of In-Vehicle Networks architecture Implementation understanding of Secure boot, Secure Diagnostic, Secure Logging, Secure Debug, Secure communication etc. Hands on experience for Vector tools CANoe, CANanalyzer and Diagnostic tools (CANdela,CANdiva ). Role: In vehicle network design, development and implementation. Automotive software communication and Diagnostic test and reporting Communication and Diagnostic security design and development. Responsibilities: Prepare electronic controller s software specification and In-vehicle network Design specifications. Conduct software design check. Supplier interaction supplier management for Controller Software development. Technical reviews/Design reviews with suppliers. Engineering evaluation of part (vehicle level and part level). Coordination for meeting the targets of design and development. Project management. Design Optimization Benchmarking Technical/ Functional: Good knowledge of vehicle electrical electronics parts/ systems. Experience in creating software specifications for the automotive electronic controllers and In-vehicle Network (CAN/LIN/Diag). Proficiency in CANOE software usage. Understanding of vehicle level testing of electronic controller s software. Experience in Encryption and Cyber security. Desirable: Automotive OEM experience: Vehicle design and development cycle Minimum 2.5-years of hands-on experience in CAN, LIN and Diagnostic (UDS/KWP) design and development
Posted 4 weeks ago
7.0 - 12.0 years
2 - 5 Lacs
Gurugram
Work from Office
EDUCATIONAL QUALIFICATION:- B.E./B.Tech in Mechanical, Automobile, or Mechatronic Engineering from a reputed institute. Additional technical qualifications, such as an M.Tech, are acceptable with relevant work experience. WORK EXPERIENCE: a) 2 ~ 7 Years of Relevant Work Experience. b) Design Development of Wiping Washing System, Audible warning devices and Cowl Top Garnish. Regulation compliance checks and applicable testing. Advanced engineering projects, Localization VAVE Problem Solving, Root cause analysis and countermeasure planning, based on Design/ Quality Reviews, feedback / Testing. Coordination with Suzuki Headquarter (Japan) and business partners for development of parts. Parts Vehicle level testing as per program schedule. Study industry trends (global and domestic) and application. Proficiency in CAD software, preferably Unigraphics NX. Experience in design and development of at least one of the following domains: wiper system or mechanism parts, washer system and Audible warning devices. Understanding of automotive regulations and their implications in the aforementioned domains. Basic knowledge of kinematics, plastics and sheet metal manufacturing processes including tooling know-how. Techniques for Weight reduction Cost Control i.e. Teardown, Benchmarking, VAVE etc. Planning skills and manage activity schedules effectively. Exposure to DFMEA, DRBFM, EMC/EMI, Cyber security, ISO26262 etc. Proficiency in CAD software preferably Unigraphics NX, GDT, Tolerance stack-up
Posted 4 weeks ago
3.0 - 8.0 years
4 - 5 Lacs
Warangal, Hyderabad, Nizamabad
Work from Office
Total experience 3 years as Cyber Security Analyst. Knowledge on LogRhythm SIEM tool. Incident handling Total experience 3 years as Cyber Security Analyst. Knowledge on LogRhythm SIEM tool. Incident handling Job description 2-3 years of Experience in SIEM analyst and incident handling. B.E/B.Tech Roles and Responsibilities: 3+ years experience as a SOC analyst and any SIEM tool. Min 2+ years experience on LogRhythm SIEM. Responsible for alerts monitoring and incident handling. Perform the initial analysis and identify if any potential threat. Analyse security alerts and determine their validity and potential impact on the organization. Review and analyse security logs from various sources (e.g., firewalls, intrusion detection/prevention systems, and endpoint protection) Correlating logs from various security controls to gather more insight of the suspected event. Regularly preparing log monitoring reports and daily security report and proactively work on it. Document security incidents, including the steps taken to resolve them and any lessons learned. Ensure compliance with security policies, procedures, and regulatory requirement Work closely with other IT and security team members to enhance overall security posture. Coordinate with the L2 and L3 for any escalations. Knowledge on cyber kill chain and MITRE Attack frameworks and mythologies. Knowdledge on various cyber attacks in Cyber security world. Certifications: LogRhythm Security Analyst (LRSA) from LogRhythm University CEH
Posted 4 weeks ago
2.0 - 3.0 years
9 - 13 Lacs
Noida, New Delhi, Pune
Work from Office
Rockwell Automation is a global technology leader focused on helping the world s manufacturers be more productive, sustainable, and agile. . Behind our customers - amazing companies that help feed the world, provide life-saving medicine on a global scale, and focus on clean water and green mobility - our people are energized problem solvers that take pride in how the work we do changes the world for the better. We welcome all makers, forward thinkers, and problem solvers who are looking for a place to do their best work. And if that s you we would love to have you join us! Job Description Job Summary: As an OT Cybersecurity Detection Engineer, you will be responsible for designing, implementing, and managing detection strategies and tools to respond to cyber threats targeting critical OT/ICS environments. You will work with both internal and external cyber security teams to ensure the security and resilience of our industrial infrastructure. We are looking for an understanding of OT protocols, industrial control systems, OT threat intelligence and cybersecurity best practices, coupled with. You will report to the Cyber Team Leader and have a hybrid schedule working in Hinjewadi-Pune. Your Responsibilities: Develop detection rules, correlation searches, and alerting mechanisms within our Security Information and Event Management (SIEM) and other security monitoring tools specifically tailored for OT environments. Analyze OT network traffic, system logs, and security events to identify suspicious activity, anomalies, and potential security incidents. Develop of OT protocols (e.g., Modbus, DNP3, IEC 61850), industrial control systems (e.g., PLC, SCADA, DCS), and their security possible effects. Collaborate with OT operations and engineering teams to understand their processes, and potential vulnerabilities. Tune and optimize detection rules to minimise false positives and ensure high-fidelity alerts. Maintain documentation for detection strategies, rules, and incident response procedures specific to OT. Participate in incident response activities related to OT cybersecurity incidents, providing technical expertise in detection and analysis. Contribute to the development of OT security policies, standards, and procedures. Stay up-to-date on the latest OT cybersecurity threats, vulnerabilities, and mitigation techniques. Recommend new security tools relevant to OT detection capabilities. Collaborate with IT security teams to ensure a cohesive and integrated security posture across both IT and OT environments. Develop and deliver training or awareness sessions on OT-specific detection techniques for relevant teams. The Essentials - You Will Have: Have 2-3years strong understanding of OT protocols, architectures, and common industrial control systems Experience with SIEM\SOAR platforms and developing custom correlation rules and alerts. Experience analyzing network traffic using tools like Wireshark and understanding OT-specific network protocols. Knowledge of common cybersecurity frameworks and standards relevant to OT (e.g., NIST SP 800-82, IEC 62443) Familiarity with threat intelligence sources and their application to OT environments. Technical information to both technical and non-technical audiences. Understand internal or external customer needs. The Preferred - You Might Also Have: You will have to understand relevant evolving technology, understand complex technology dependency and working across a range of service offerings that may use a wide array of technologies and partners. Across multiple departments with different goals. Develop important product and service launches. Collaborative culture across the automation engineering team while meeting CI goals Adopt technology best practices around technology vendor evaluation and managing maintenance of technology platforms. What We Offer: Our benefits package includes Comprehensive mindfulness programmes with a premium membership to Calm Volunteer Paid Time off available after 6 months of employment for eligible employees. Company volunteer and donation matching programme - Your volunteer hours or personal cash donations to an eligible charity can be matched with a charitable donation. Employee Assistance Program Personalised wellbeing programmes through our OnTrack programme On-demand digital course library for professional development ... and other local benefits! At Rockwell Automation we are dedicated to building a diverse, inclusive and authentic workplace, so if youre excited about this role but your experience doesnt align perfectly with every qualification in the job description, we encourage you to apply anyway. You may be just the right person for this or other roles. #LI-Hybrid #LI-SM1
Posted 4 weeks ago
6.0 - 10.0 years
10 - 15 Lacs
Chennai
Work from Office
for all. We are advancing the world s energy system to be more sustainable, flexible, and secure, and we collaborate with customers and partners to enable a sustainable energy future - for today s generations and those to come. The Hitachi Energy Indian Operations Center (INOPC) is a competence center with around 3000+ skilled engineers who focus on tendering, engineering, planning, procurement, project Management, functional system testing, installation supervision, documentation and commissioning. However, over the last decade, it has evolved to become the largest Operations hub. The India Operations Centre team at Chennai, Bangalore and Gurugram supports Hitachi Energy s units in more than 40 countries across a wide portfolio of all the four business units in Hitachi Energy To date, the team has executed engineering and commissioning for projects in more than 80 countries. The technical marketing engineer for Mission Critical telecommunication Solutions (MCS) has the global responsibility to enable the Pre-Sales Sales community of the different regional HUBs to understand technical market requirements for wired telecommunication networks and ensure customer interaction in line with global solution/product strategy. How you ll make an impact: You will be supporting Global Projects by adapting HVDC Cyber security for SCADA HMI developing architecture functional descriptions for Functions / Solutions for future HVDC in cyber security technologies. You will be prepare Perform test case scenarios participate in FST supporting projects in resolving the issues related to Cyber security Functions. You will be coordinate with different stakeholders across the business units to get inputs to optimize the Cyber security solutions in HVDC. You will be design develop a secured network architecture for SCADA system with advanced cyber security features You will evaluate and strengthen the security of any connections to the SCADA network. You will be monitor and validate third party security patches to ensure that reliability of the system is maintained. You will be implementing the security features provided by device and system vendors. You will be performing technical audits of SCADA devices and networks, and any other connected networks, to identify security concerns conducting physical security surveys and assess all remote sites connected to the SCADA network to evaluate their security. You will be maintaining the test environment with updated software and hardware for current and future use backup/ Image handling on servers and workstations and patch management. Living Hitachi Energy s core values of safety and integrity, which means taking responsibility for your own actions while caring for your colleagues and the business. Your Background: Bachelor s degree in computer science/IT with a minimum knowledge in networking protections. Candidate should have 6 to 10 years of experience in networking, security, Anti-Virus. Must have Basic knowledge on IEEE / IEC standards. Must have Knowledge Experience MS Office: Word, Excel. Excellent written and verbal communication skills. Self-starter caliber who could own tasks through to completion .
Posted 4 weeks ago
4.0 - 5.0 years
8 - 12 Lacs
Noida, Pune
Work from Office
Job Summary As an OT Cybersecurity Data Engineer, you will manage the design, implementation, and testing of our Security Information and Event Management (SIEM) system with a specific focus on integrating and analyzing data from critical OT/ICS environments. You will work with cybersecurity teams to ensure the monitoring, detection, and reporting of security threats within industrial infrastructure. We are looking for a understanding of SIEM and SOAR technologies, OT protocols, and cybersecurity best practices. You will report to the Cyber Team Leader and have a hybrid schedule working in Hinjewadi-Pune. Your Responsibilities: Develop SIEM and SOAR solutions tailored for OT environments, considering the unique challenges and protocols involved. Integrate multiple OT data sources (e.g., IDS, EDR, control system logs, network traffic from industrial protocols) into the SIEM platform. Maintain custom parsers, normalizers, and correlation rules to analyze OT-specific logs and events within the SIEM. Collaborate with OT operations and engineering teams to understand their systems, data sources, and security monitoring requirements. Configure and improve the SIEM platform for performance, scalability, and stability in an OT context. Maintain OT-focused dashboards and reports within the SIEM to provide actionable insights into security posture and potential threats. Tune and optimize SIEM rules and alerts to minimize false positives and ensure high-fidelity detection of OT security incidents. Maintain documentation for the OT SIEM architecture, data sources, rules, and operational procedures. Recommend new SIEM features, integrations, and related security technologies for enhancing OT security monitoring. The Essentials - You Will Have: Have 4-5years of demonstrated experience working with SIEM platforms (e.g., Sumo Logic, Palo Alto Cortex XSOAR) and a understanding of their architecture, configuration, and rule development. Understanding of OT protocols (e.g., Modbus, DNP3, IEC 61850), industrial control systems (e.g., PLC, SCADA, DCS), and their logging mechanisms. Experience parsing and normalising complex log formats, including those specific to OT devices and applications and, in the context of security event analysis, technical information to both technical and non-technical audiences and as part of a team in a environment. Specific experience integrating OT data sources with enterprise SIEM platforms. Knowledge of security frameworks and standards relevant to OT (e.g., NIST SP 800- 82, IEC 62443). Experience with scripting languages (e.g., Python, PowerShell) for SIEM automation and data manipulation. Relevant certifications such as GICSP, GRID, CISSP, or SIEM-specific certifications. Familiarity with threat intelligence platforms and their integration with SIEM for OT threat detection. The Preferred - You Might Also Have: You will have to understand relevant evolving technology, understand complex technology dependency and working across a range of service offerings that may leverage a wide array of technologies and partners. Develop key product service launches Collaborative culture across the automation engineering team while meeting CI objectives Adopt technology best practices around technology vendor evaluation and managing maintenance of technology platforms. What We Offer: Our benefits package includes Comprehensive mindfulness programmes with a premium membership to Calm Volunteer Paid Time off available after 6 months of employment for eligible employees Company volunteer and donation matching program - Your volunteer hours or personal cash donations to an eligible charity can be matched with a charitable donation. Employee Assistance Program Personalized wellbeing programmes through our OnTrack program On-demand digital course library for professional development ... and other local benefits! At Rockwell Automation we are dedicated to building a diverse, inclusive and authentic workplace, so if youre excited about this role but your experience doesnt align perfectly with every qualification in the job description, we encourage you to apply anyway. You may be just the right person for this or other roles. #LI-Hybrid #LI-SM1 Rockwell Automation s hybrid policy aligns that employees are expected to work at a Rockwell location at least Mondays, Tuesdays, and Thursdays unless they have a business obligation out of the office.
Posted 4 weeks ago
2.0 - 3.0 years
8 - 12 Lacs
Noida, New Delhi, Pune
Work from Office
Job Summary: As an OT Cybersecurity Detection Engineer, you will be responsible for designing, implementing, and managing detection strategies and tools to respond to cyber threats targeting critical OT/ICS environments. You will work with both internal and external cyber security teams to ensure the security and resilience of our industrial infrastructure. We are looking for an understanding of OT protocols, industrial control systems, OT threat intelligence and cybersecurity best practices, coupled with. You will report to the Cyber Team Leader and have a hybrid schedule working in Hinjewadi-Pune. Your Responsibilities: Develop detection rules, correlation searches, and alerting mechanisms within our Security Information and Event Management (SIEM) and other security monitoring tools specifically tailored for OT environments. Analyze OT network traffic, system logs, and security events to identify suspicious activity, anomalies, and potential security incidents. Develop of OT protocols (e.g., Modbus, DNP3, IEC 61850), industrial control systems (e.g., PLC, SCADA, DCS), and their security possible effects. Collaborate with OT operations and engineering teams to understand their processes, and potential vulnerabilities. Tune and optimize detection rules to minimise false positives and ensure high-fidelity alerts. Maintain documentation for detection strategies, rules, and incident response procedures specific to OT. Participate in incident response activities related to OT cybersecurity incidents, providing technical expertise in detection and analysis. Contribute to the development of OT security policies, standards, and procedures. Stay up-to-date on the latest OT cybersecurity threats, vulnerabilities, and mitigation techniques. Recommend new security tools relevant to OT detection capabilities. Collaborate with IT security teams to ensure a cohesive and integrated security posture across both IT and OT environments. Develop and deliver training or awareness sessions on OT-specific detection techniques for relevant teams. The Essentials - You Will Have: Have 2-3years strong understanding of OT protocols, architectures, and common industrial control systems Experience with SIEM\SOAR platforms and developing custom correlation rules and alerts. Experience analyzing network traffic using tools like Wireshark and understanding OT-specific network protocols. Knowledge of common cybersecurity frameworks and standards relevant to OT (e.g., NIST SP 800-82, IEC 62443) Familiarity with threat intelligence sources and their application to OT environments. Technical information to both technical and non-technical audiences. Understand internal or external customer needs. The Preferred - You Might Also Have: You will have to understand relevant evolving technology, understand complex technology dependency and working across a range of service offerings that may use a wide array of technologies and partners. Across multiple departments with different goals. Develop important product and service launches. Collaborative culture across the automation engineering team while meeting CI goals Adopt technology best practices around technology vendor evaluation and managing maintenance of technology platforms. What We Offer: Our benefits package includes Comprehensive mindfulness programmes with a premium membership to Calm Volunteer Paid Time off available after 6 months of employment for eligible employees. Company volunteer and donation matching programme - Your volunteer hours or personal cash donations to an eligible charity can be matched with a charitable donation. Employee Assistance Program Personalised wellbeing programmes through our OnTrack programme On-demand digital course library for professional development ... and other local benefits! At Rockwell Automation we are dedicated to building a diverse, inclusive and authentic workplace, so if youre excited about this role but your experience doesnt align perfectly with every qualification in the job description, we encourage you to apply anyway. You may be just the right person for this or other roles. #LI-Hybrid #LI-SM1 Rockwell Automation s hybrid policy aligns that employees are expected to work at a Rockwell location at least Mondays, Tuesdays, and Thursdays unless they have a business obligation out of the office.
Posted 4 weeks ago
7.0 - 9.0 years
7 - 11 Lacs
Thiruvananthapuram
Work from Office
Job Title: Specialist I - Information Security | Vulnerability Management - Subject Matter Expert (SME) Location:, Hyderabad , Chennai , Bangalore , Trivandrum , Cochin Experience: 7-9 years Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence. Job Summary: We are seeking a highly experienced and knowledgeable Subject Matter Expert (SME) to join our Vulnerability Management team. The ideal candidate will possess deep expertise in cybersecurity, particularly in vulnerability management processes, tools, and best practices. This role demands strong analytical skills, excellent communication, and a proactive approach to security risk mitigation. Key Responsibilities: Lead and manage the vulnerability management program end-to-end. Conduct vulnerability assessments and penetration testing. Use tools like Qualys VMDR, MS Defender, and CrowdStrike to detect, analyze, and report vulnerabilities. Create dashboards and detailed reports with actionable recommendations. Prioritize vulnerabilities based on business risk and exploitability. Collaborate with technical teams for remediation planning and execution. Stay current with emerging threats, trends, and technologies. Deliver training on vulnerability management processes and tools. Support incident response efforts with expertise in vulnerability exploitation and mitigation. Ensure compliance with security frameworks and regulatory standards.
Posted 4 weeks ago
2.0 - 8.0 years
5 - 9 Lacs
Gurugram
Work from Office
Key Responsibilities- Research, design, and development of BIW parts, Door systems, Fuel tank and Filling system, Vehicle front and rear facia, Glasses, NVH parts etc. according to the project schedule. Conceptualize parts, create master sections, check feasibility concerning regulations, manufacturability, and assembly. Engage with the CAE team to take countermeasures, confirm testing performance, and resolve issues. Estimate cost and weight at the part and sub-system levels BOM handling. Conduct design reviews and solve problems through root cause analysis and countermeasure planning. Coordination with business partners for parts development. Work on advanced engineering projects. Perform mathematical calculations for engineering tasks. Desirables- Exposure to DFMEA, cyber security for Body systems Connected Parts, ISO26262, Power operated door, and Door handles experties. Specific knowledge of Automation, macros, proficiency in model based design calculations. Project management skills. Understanding of Japanese language is an added advantage. Competencies- a) Proficiency in CAD software, preferably Unigraphics NX. - Experience in design and development within at least one of the following domains: BIW, closure systems, fuel tank storage, fuel filling area, and alternate fuel systems. - Understanding of automotive regulations and their implications in the aforementioned domains. - Basic knowledge of sheet metal and plastic parts manufacturing processes, including tooling. - Techniques for Weight reduction Cost Control i.e. Teardown, Benchmarking, VAVE etc. - Ability to manage activity schedules effectively. b) Effective communication, analytical, and presentation skills. - Strong team player with openness to learning. - Creative and innovative approach, with a willingness to share experiences. - Ability to study and apply global and domestic industry trends in the work area. - Flexible, proactive, and Positive attitude. - Skilled trainer, capable of disseminating learnings within the group. - Adherence to systems and processes.
Posted 4 weeks ago
0.0 - 3.0 years
2 - 3 Lacs
Tirupati
Work from Office
Roles and Responsibilities Design and deliver training programs for IT professionals on various technologies such as Cyber Security, Cloud Computing, Data Science, Data Analytics, Python, and Blockchain. Develop course materials and presentations to effectively communicate complex technical concepts to students. Conduct hands-on exercises and practical sessions to ensure effective learning outcomes. Evaluate student performance through assessments and provide feedback to improve their skills. Collaborate with subject matter experts (SMEs) to stay updated on industry trends and best practices.
Posted 4 weeks ago
5.0 - 8.0 years
8 - 16 Lacs
Chennai
Work from Office
Role & responsibilities Security Implementation and Automation: Design, implement, and automate security controls for a wide range of technologies, including Active Directory, firewalls, networking, cloud environments (AWS, Azure, GCP), and operating systems (Windows, Linux, macOS). Monitoring, Detection, and Response: Identity and Access Management Security Architecture and Risk Management: Participate in the development and enforcement of security policies, procedures, and standards to ensure compliance with regulatory frameworks such as ISO27001, NIST and NIS2. Work collaboratively with cross-functional teams (Global Infrastructure , Regional Local IT, ERP, etc.) to integrate security practices into IT operations. Cybersecurity Awareness & Training Preferred candidate profile Qualifications: Experience: University-level thinking and 5+ years of hands-on experience in the following areas: Security control implementations for technologies including Active Directory, firewalls, networking (VPNs, proxies, IDS/IPS), cloud services (AWS, Azure, GCP), and operating systems (Windows, Linux, macOS). Security tool integration and automation using tools like, CrowdStrike, Splunk, Palo Alto, Qualys, and others. Implementing defense-in-depth security designs for corporate and production infrastructure. Scripting and automation of security tasks using Python, PowerShell, Bash, or similar languages. Working with SIEM systems, including log aggregation, alerting, and automated response mechanisms. Technical Skills: Expertise in Identity and Access Management concepts such as OAuth2, SSO, SAML, Federated Identity, and RBAC. Deep understanding of network security concepts (e.g., firewall configuration, network segmentation, proxies, and IPS/IDS systems). Strong knowledge of endpoint security, threat detection, and incident response, specifically leveraging tools like CrowdStrike for endpoint monitoring and response. Experience with application security practices such as SAST, DAST, and WAF implementations. Familiarity with compliance frameworks, NIST, and ISO, and ensuring systems and infrastructure meet these standards. Experience in cybersecurity in manufacturing sites /OT domains is preferred Certifications (Preferred): SANS GIAC, CISSP, ISC2, ISACA, OSCP/OSCE, or equivalent security certifications. Additional Requirements: Ability to work in a fast-paced, dynamic environment with minimal supervision. Strong communication skills (English Verbal and writing required) and ability to collaborate effectively with cross-functional teams. Willingness to participate in on-call rotations for critical issues.
Posted 4 weeks ago
1.0 - 6.0 years
6 - 12 Lacs
Greater Noida
Work from Office
Designation: Cybersecurity Trainer Job Purpose & Role: To design, develop, and deliver advanced training programs in secure coding, reverse engineering, and malware analysis . Technical knowledge and hands-on experience in secure coding, system-level programming, and threat analysis is highly preferred. A. Knowledge Proven experience as a trainer or instructor in cybersecurity. Expertise in Assembly language, C/C++, and secure system programming. Proficiency in reverse engineering tools such as IDA Pro, Ghidra, and Process Explorer. Solid understanding of PE file formats, static and dynamic code analysis techniques. Experience with Python scripting for automation and cybersecurity use cases. B. Functional Skills Develop and deliver training modules in: Computer Architecture and Assembly Language Secure Coding Practices Reverse Engineering and Malware Analysis Advanced C++ Development Python for Security Automation (optional/elective) Conduct assessment and certification exams to evaluate participant learning outcomes. C. Attributes Dynamic, energetic, team player, thrives among strong colleagues. Ability to work in fast paced evolving environment . Be willing and able to exercise judgment and take risks. Accept criticism and constructive feedback , while being extremely adaptable and flexible. Reflection of an impeccable persona in walk-talk while dealing with academia High spiritual quotient (Social quotient -SQ, Intelligence quotient - IQ, Emotional Quotient - EQ) D. Qualification & Years of Experience Certifications such as GREM, OSCE, OSCP, or CEI (Certified EC-Council Instructor). ME/M.Tech and BE/B.Tech in Computer Science /Information Technology Cybersecurity or related field reputed university & Institute of eminence. PhD Degree in the relevant field of subject is desirable. Industry and Global Experience is desirable. E. Salary as per norms F. Location: Greater Noida, Delhi/NCR G. Apply for the position by sending your CV at careers@glbitm.ac.in H. Visit our website’s career page at www.glbitm.ac.in
Posted 4 weeks ago
0.0 - 5.0 years
6 - 16 Lacs
Greater Noida
Work from Office
ABOUT JOB Designation: Cybersecurity Trainer Job Purpose : Proven experience in cybersecurity concepts, hands-on experience with tools and techniques across the security domain, and relevant industry certifications. You will be responsible for training students as per a structured semester-based roadmap that includes areas like ethical hacking, digital forensics, malware analysis, penetration testing, and more. A. Knowledge Strong understanding of security principles and best practices. Hands-on experience with tools and platforms used in SOC, VAPT, forensic analysis, and exploit development. Passion for teaching and mentoring. B. Functional Skills Deliver high-quality training in the following areas: Network Defense and Python Programming Ethical Hacking, Intrusion Detection, and Prevention Vulnerability Assessment and Penetration Testing (VAPT) Digital Forensics, Governance Risk and Compliance (GRC), Reverse Engineering Cyber Threat Intelligence (CTI), Exploit Development, OSINT Develop course content, lab exercises, and assessments aligned with semester-wise skill development. Train and mentor students on real-world scenarios and tools (e.g., Wireshark, Metasploit, Burp Suite, Splunk). C. Attributes Dynamic, energetic, team player, thrives among strong colleagues. Ability to work in fast paced evolving environment . Be willing and able to exercise judgment and take risks. Accept criticism and constructive feedback , while being extremely adaptable and flexible. Reflection of an impeccable persona in walk-talk while dealing with academia High spiritual quotient (Social quotient -SQ, Intelligence quotient - IQ, Emotional Quotient - EQ) D. Qualification & Years of Experience ME/M.Tech and BE/B.Tech in Computer Science /Information Technology from reputed university & Institute of eminence PhD Degree in the relevant field of subject is desirable. Industry and Global Experience is desirable. Certifications (Any of the following required) CEH (Certified Ethical Hacker) CompTIA Security+ / CySA+ OSCP (Offensive Security Certified Professional) CHFI (Computer Hacking Forensic Investigator) CISA/CISM (Certified Information Systems Auditor / Manager) CPT / CVAPT (Certified Penetration Tester / Certified VAPT Professional) GIAC Certifications (GSEC, GCIA, GREM etc.) E. Salary as per norms F. Location: Greater Noida, Delhi/NCR G. Apply for the position by sending your CV at careers@glbitm.ac.in H. Visit our websites career page at www.glbitm.ac.in
Posted 4 weeks ago
5.0 - 10.0 years
9 - 17 Lacs
Thane, Mumbai (All Areas)
Work from Office
Senior Advisor - Business Security Location: Thane/Vikhroli 5 days work from office in a MONTH Shift: 1.30 P.M. to 10.30 P.M. The Company: UK based one of the largest MNCs is a leading global advisory, broking and solutions company that helps clients around the world turn risk into a path for growth. One of the oldest MNCs, has more than 42,000 employees serving more than 142 countries. Business Unit The mission of the Business Information Security team is to be Information and Cyber Security trusted advisors to senior business and technology stakeholders. When they're forming strategy and delivering business change, we aim to help them ensure that their business continues to be secure and compliant in line with our information and cyber security policies and standards. Job Summary As the Information Security Associate within the Business Security Operations (BusSecOps) team, you will be responsible for implementing and maintaining information & cyber security practices. Candidate would be required to gain a high-level of knowledge and understanding of critical technology applications and security standards. You will need to take a leadership role in building security testing framework for web-based applications which includes Threat Profiling, DAST, SAST, Security Architecture, and Penetration testing. In this role, you are expected to understand the organizations information & cyber security strategy and standards while working collaboratively with technology teams to implement and maintain sound security practices. This role resides in our Information & Cyber Security (ICS) team within Corporate IT. Roles & Responsibilities Build and maintain effective relationship with technology teams and ICS stakeholders Foster a culture of information and cyber security best practices though awareness and support Stay up to date with the latest application security developments and security trends to continually improve internal processes Hold good understanding of Application & Infrastructure testing methodology & support development teams in the remediation of vulnerabilities Work with development teams to improve the secure software development lifecycle Engage in information security activities to support client/business engagements i.e., incidents, vulnerabilities, development lifecycles, risk management and emerging threats Ability to coordinate and execute security testing for applications and cloud environments Engage with key stakeholders to support internal and external audit activities to ensure compliance with regulations such as: SOC, FCA, NYDFS, GDPR, HIPAA Demonstrate a good understanding of security regulations and data privacy laws Support the risk identification & exceptions management process Manage and oversee adhoc projects related to maturing information and cyber security controls across the organizationR. Education Qualification: Degree in a relevant Business or Information Technology area Experience Band: 5 - 12 yrs. Technical Skills: Need to have Degree in a relevant Information Technology area preferably with a focus on information security Significant experience in managing and patching vulnerabilities across a host of assets Expert understanding of all aspects of information security principles, policy and its application in business and technology areas Understanding of core cloud security principles Knowledge and experience on supporting information security audits Technical Skills: Nice to have Client focus: ability to engage positively with clients and business stakeholders. Information Security specific certification is desirable (such as CISM, CISSP, CISA, CEH) Full JD will be shared on email Best Regards, Uma SW +91 98 22 780 197 uma@starlighthr.com I https://starlighthr.com/
Posted 4 weeks ago
2.0 - 6.0 years
7 - 13 Lacs
Thane, Mumbai (All Areas)
Work from Office
Senior Advisor - Business Security Location: Thane/Vikhroli 5 days work from office in a MONTH Shift: 1.30 P.M. to 10.30 P.M. The Company: UK based one of the largest MNCs is a leading global advisory, broking and solutions company that helps clients around the world turn risk into a path for growth. One of the oldest MNCs, has more than 42,000 employees serving more than 142 countries. Business Unit The mission of the Business Information Security team is to be Information and Cyber Security trusted advisors to senior business and technology stakeholders. When they're forming strategy and delivering business change, we aim to help them ensure that their business continues to be secure and compliant in line with our information and cyber security policies and standards. Job Summary As the Information Security Associate within the Business Security Operations (BusSecOps) team, you will be responsible for implementing and maintaining information & cyber security practices. Candidate would be required to gain a high-level of knowledge and understanding of critical technology applications and security standards. You will need to take a leadership role in building security testing framework for web-based applications which includes Threat Profiling, DAST, SAST, Security Architecture, and Penetration testing. In this role, you are expected to understand the organizations information & cyber security strategy and standards while working collaboratively with technology teams to implement and maintain sound security practices. This role resides in our Information & Cyber Security (ICS) team within Corporate IT. Roles & Responsibilities Build and maintain effective relationship with technology teams and ICS stakeholders Foster a culture of information and cyber security best practices though awareness and support Stay up to date with the latest application security developments and security trends to continually improve internal processes Hold good understanding of Application & Infrastructure testing methodology & support development teams in the remediation of vulnerabilities Work with development teams to improve the secure software development lifecycle Engage in information security activities to support client/business engagements i.e., incidents, vulnerabilities, development lifecycles, risk management and emerging threats Ability to coordinate and execute security testing for applications and cloud environments Engage with key stakeholders to support internal and external audit activities to ensure compliance with regulations such as: SOC, FCA, NYDFS, GDPR, HIPAA Demonstrate a good understanding of security regulations and data privacy laws Support the risk identification & exceptions management process Manage and oversee adhoc projects related to maturing information and cyber security controls across the organizationR. Education Qualification: Degree in a relevant Business or Information Technology area Experience Band: 2 - 6 yrs. Technical Skills: Need to have Degree in a relevant Information Technology area preferably with a focus on information security Significant experience in managing and patching vulnerabilities across a host of assets Expert understanding of all aspects of information security principles, policy and its application in business and technology areas Understanding of core cloud security principles Knowledge and experience on supporting information security audits Technical Skills: Nice to have Client focus: ability to engage positively with clients and business stakeholders. Information Security specific certification is desirable (such as CISM, CISSP, CISA, CEH) Full JD will be shared on email Best Regards, Uma SW +91 98 22 780 197 uma@starlighthr.com I https://starlighthr.com/
Posted 4 weeks ago
5.0 - 7.0 years
12 - 15 Lacs
Vadodara
Work from Office
Exciting Opportunity at Lauritz Knudsen Electrical & Automation (A unit of Schneider Electric India Pvt. Ltd) **Vadodara Plant**! Key Deliverables: 1. Ensure a full compliancy with Schneider Electric Security Policies - including new means coming from Industrialization - and rectify the potential deficiencies. 2. Own the inventory of all OT assets and ensure data accuracy via Claroty. 3. Having the strong knowledge of Network and OT Devices like PLC, HMI,SCADA, Desktop and communication protocol like Modbus , TCP Modbus , TCP/IP. Must have network knowledge, Vlan and Firewall. 4. Monitor potential cyber threats and mitigate them with remote support from the Connected Services Hub. • Remediate identified cyber vulnerabilities with support from Schneider Digital when needed. • Support Incident Response Process when a cyber incident is detected and handled by the Security Operations Center in collaboration with Security Team. 5. Support transformation projects launched by the global Cybersecurity Team to sustain the Plant Cybersecurity Performance. 6. Need good Communication Skills, to co-ordinate effectively with internal customers. Key Competencies: 1. A technical background in OT Technologies. 2. A good knowledge of the plants infrastructure, including the network and all assets located in the shop floor. 3. Capacity to leverage support from IT teams and from external partners related to OT assets. 4 . Coordination, Activity Planning 5. Knowledge of IEC62443
Posted 4 weeks ago
4.0 - 6.0 years
6 - 13 Lacs
Chennai
Work from Office
ROLE AND RESPONSIBILITIES The Level 1 IT/OT Engineer executes assigned work orders, including support tickets and project tasks to meet Managed Security Services Provider (MSSP) and other contractually defined obligations for new and existing customer facilities. This role will perform routine and scheduled maintenance and support tasks, work break/fix and other trouble and support tickets, act as a subject matter expert for programs and products offered, and respond to other emergent conditions across the fleet. Candidates must possess a strong understanding of and direct experience with concepts and best practices related to IT/OT systems.This is an opportunity to be part of a world-class team operating at the nexus of two of the most exciting and fastest-growing sectors in renewable energy today: SCADA IT/OT and mission-critical software. Work Location : Chennai Notice period : Immediate Experience : 4 to 6 years Shift : UK Shift PREFERRED EXPERIENCE • Experience in NERC CIP-regulated environments is preferred. • Experience in compliance programs or standard-driven environments (e.g., PCI-DSS, NIST, ISO-27001) • SOC, NOC, or other operation center experience • Work experience in at least one of the following areas: • Network and infrastructure design, deployment, or maintenance. • Power generation, especially renewable energy. REQUIRED QUALIFICATION & EDUCATION • A university technical degree or minimum 1-2 years of relevant IT/OT professional experience. • Direct or indirect service experience and/or experience providing remote support. • Ability to read electrical, network, infrastructure, and cabling drawings. • All applicants must have prior professional IT/OT systems management experience and knowledge in at least two of the following fields: • Server hardware and OS management. • Networking and infrastructure design, implementation, and management. • Cybersecurity, including Next-Generation Firewall configuration and management. Interested candidates can apply to kinnera259@gmail.com. Regards, HR Manager
Posted 4 weeks ago
3.0 - 7.0 years
12 - 18 Lacs
Bengaluru
Hybrid
An Information Security Consultant is responsible for ensuring an organization's data and systems are secure and compliant with industry standards. They assess vulnerabilities, develop security policies, and implement solutions to protect digital
Posted 4 weeks ago
2.0 - 5.0 years
3 - 7 Lacs
Hyderabad
Work from Office
What you will do Let’s do this. Let’s change the world. In this vital role you will Guide and support junior team members by offering technical advice, conducting code reviews, and sharing knowledge to promote their professional development. Perform security testing (e.g., penetration testing, code reviews) and ensure continuous security monitoring across the organization’s IT landscape. Identify vulnerabilities in networks, systems, applications, and infrastructure through hands-on penetration testing. Attempt to exploit discovered vulnerabilities to demonstrate their impact and prove their existence (e.g., retrieving sensitive data, elevating user privileges, or gaining access to admin functionality). Perform assessments on web applications, cloud environments, and network infrastructure. Use automated tools and manual techniques to identify security weaknesses. Conduct advanced post-exploitation tasks to simulate real-world attack scenarios. Work with third-party security vendors for audits, product testing, and external assessments when required. Use automated tools (e.g., Burp Suite, OWASP ZAP, or Acunetix) to identify common vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), and others. Document identified vulnerabilities in detail, explaining how they were found, their severity, and their potential impact. Include proof-of-concept (PoC) for critical vulnerabilities. Offer actionable, practical solutions for fixing the vulnerabilities, such as secure coding practices, configuration changes, or security controls. Use risk-based prioritization, categorizing issues by their severity and business impact (e.g., high, medium, low) to help the organization focus on the most critical issues. Continuously learn about the latest vulnerabilities, exploits, and security trends. Present the findings to stakeholders, security teams, and management, explaining the business risk and potential impacts of the vulnerabilities discovered. Familiarity with industry standards and compliance requirements (e.g., PCI-DSS, NIST, ISO 27001) and their relevance to penetration testing. What we expect of you We are all different, yet we all use our unique contributions to serve patients. This role has a strong focus on ensuring the organization's infrastructure, applications, and systems are secure from external and internal threats. This role is responsible for conducting authorized security tests on IT infrastructure to evaluate the strength of its systems against potential cyberattacks. A variety of automated tools and manual techniques are leveraged to simulate real-world attacks. The penetration tester then works with the organization to prioritize, remediate and report on identified issues, strengthening the overall security posture. Basic Qualifications: Bachelor’s degree with 6 - 8 years of experience in Computer Science, Cybersecurity or Information Systems related field . Preferred Qualifications: Must-Have Skills: Strong knowledge of common vulnerabilities (e.g., OWASP Top 10, SANS Top 25), network protocols, encryption standards, application security and common penetration testing methodologies (ISSAF, OSSTMM, PTES). Familiarity with tools like Burp Suite, OWASP ZAP and Metasploit. A deep understanding of web application architecture, databases, and authentication mechanisms. Ability to think critically and creatively when testing and attempting to exploit vulnerabilities. Good-to-Have Skills: Experience with threat intelligence and incorporating emerging threats into penetration testing practices Proficiency in scripting and automation (e.g., Python, Bash) is a plus Professional Certifications (please mention if the certification is preferred or mandatory for the role): PreferredeJPT, eCPPT, eWPT, OSCP, OSWA, GWAPT What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now for a career that defies imagination Objects in your future are closer than they appear. Join us. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
Posted 4 weeks ago
2.0 - 5.0 years
2 - 6 Lacs
Hyderabad
Work from Office
Join Amgen’s Mission of Serving Patients At Amgen, if you feel like you’re part of something bigger, it’s because you are. Our shared mission—to serve patients living with serious illnesses—drives all that we do. Since 1980, we’ve helped pioneer the world of biotech in our fight against the world’s toughest diseases. With our focus on four therapeutic areas –Oncology, Inflammation, General Medicine, and Rare Disease– we reach millions of patients each year. As a member of the Amgen team, you’ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you’ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. What you will do Let’s do this. Let’s change the world. In this vital role you will be responsible for the initial response to security events and incidents within a 24/7 Cybersecurity Operations Center (CSOC). This role involves following established procedures to investigate security events, providing feedback to improve processes, and assisting in the incident response lifecycle. Additionally, the associate will participate in knowledge-sharing sessions and correlate security alerts across platforms. Roles & Responsibilities: Follow established procedures to triage, investigate and respond to security events and incidents. Provide feedback to senior analysts to improve, review, and optimize existing procedures and documentation. Correlate security alerts from various platforms based on common elements. Participate in and lead CSOC Tier 1 knowledge-sharing and learning sessions. Assist incident responders in coordinating the response, containment, eradication, recovery, and lessons learned phases of the incident response lifecycle. Basic Qualifications: Bachelor’s degree and 0 to 3 years of Security Operations experience OR related field experience Diploma and 4 to 7 years of Security Operations or related field experience Professional Certifications: CompTIA Security+ (preferred) CEH (preferred) GSEC (preferred) MTA Security Fundamentals (preferred) Must-Have Skills: Solid understanding of security technologies and their core functionality Experience in analyzing cybersecurity threats with up-to-date knowledge of attack vectors and the cyber threat landscape. Ability to prioritize tasks effectively and solve problems efficiently in a diverse, distributed team environment. Good knowledge of Windows and/or Linux systems. Familiarity with CSOC operations and incident response procedures. Experience with security alert correlation across different platforms. Preferred Qualifications: Good communication and collaboration skills, especially when working with global teams. Ability to prioritize and manage tasks in high-pressure situations. Critical thinking and problem-solving abilities in cybersecurity contexts. A commitment to continuous learning and knowledge sharing. Work Hours This position requires you to work a later shift and may be assigned a second or third shift schedule. Candidates must be willing and able to work during evening or night shifts, as required. Potential Shifts (subject to change based on business requirements)Second Shift2:00 pm – 10:00 pm IST; Third Shift10:00 pm – 7:00 am IST. What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now for a career that defies imagination Objects in your future are closer than they appear. Join us. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
Posted 4 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6464 Jobs | Ahmedabad
Amazon
6352 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane