Jobs
Interviews

5174 Information Security Jobs - Page 13

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

7.0 - 15.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Join our Team About this opportunity: We are now looking for a Senior Security Engineer professional for our Managed Security team. This job role has accountability for researching, designing, engineering, implementing, and supporting security solutions in partnership with the respective stakeholders within Ericsson and / or customer organization and / or 3rd Party Providers. The professional will work alongside a highly skilled, diverse team, making sure that the information assets, that we are responsible to protect, are secured. What you will do: Design, implement, manage, monitor, and troubleshoot cybersecurity defenses, including configuration management, network security, systems security, and monitoring systems / tools. Participate in planning and audit scope development as well as project execution as a critical team member on complex technology related assessments. Play an active role in the design and execution of infrastructure initiatives to ensure an evolving adherence to industry best practices for information security. Lead the execution of the assessment of specific technical areas of a project, supervising other team members and providing coaching where needed. Perform Security Incident Management, including but not limited to: supporting SIEM tools, integrating logs into the tool, creating and modifying rules, investigating and resolving alerts, automating tasks. Research new and emerging threats to gain insight into the evolving threat landscape, and share knowledge with the team. Promote new ideas and new ways of executing projects and internal infrastructure enhancements. Innovate and automate repetitive activities and corrective actions, including broader automation initiatives. Analyzes and recommends security controls and procedures in business processes related to use of information systems and assets, and monitors for compliance Responds to information security incidents, including investigation of countermeasures to and recovery from computer-based attacks, unauthorized access, and policy breaches; interacts and coordinates with third-party incident responders, including law enforcement The skills you bring: Strong knowledge of information security Strong knowledge of SIEM tools (such as McAfee ESM, QRadar, ArcSight, Splunk, etc.), scanning tools (Nessus, Qualys, IBM AppScan, etc.) and PAM tools (BeyondTrust, CyberArk, etc.) Strong knowledge of both Linux-based and MS Windows-based system platforms with a strong technical understanding and aptitude for analytical problem-solving Strong understanding of enterprise, network, system and application level security issues Strong understanding of enterprise computing environments, distributed applications, and a strong understanding of TCP/IP networks along with available security controls (technical & process controls) for respective layers Good understanding of the system hardening processes, tools, guidelines and benchmarks Fundamental understanding of encryption technologies Participate in the out-of-hours on call rotation, providing technical support to the business for incidents Strong knowledge sharing and collaboration skills Deliver results and meet customer expectations Excellent communication skills; English is a must Key Qualifications: Education: BE/ B.Tech (Telecommunication/ Computer Science) Minimum years of relevant experience: 8 to 15 years experience with at least 8 years in IT and 7 years in Security ITIL certification, CCSP, OSCP, Security +, CISSP or similar will be an advantage Basic knowledge of telecommunications networks will be an added advantage

Posted 1 week ago

Apply

0.0 years

0 - 0 Lacs

Gurugram

Work from Office

About the Team: The Fraud Preventions & LEA management team under Risk Operations manages the LEA queries and resolutions through immediate responses and gathering requisite response from different business units within PayU. The team consists of 8-10 members ranging Execs to Sr.Manager level employees who reports in to Head of Investigations. About the Role: The role requires a person to be well versed with the nodal functions of financial sectors and should be able to handle the LEA (Law Enforcement Agencies) queries and represenatations and enhance internal processes to manage the LEA requirements within timlines and develop cordial relationship with multiple LEA’s/Regulatory(MHA, RBI, CBI, CID, Cyber Crime, Stae Police etc.) across india. Responsibilities: Handling daya to day LEA/regulatory enquiries received by Payu through multiple channels/sources and resolve within the timelines as per regulations. Liaising internally within the PayU India organization for collection of data, documents and factual inputs for providing timely and accurate responses within timelines. Good Knowledge about Cybercrime / Financial frauds with Banks/Cards etc. Exp. in handling RBI and Regulatory enquiries/cases. Handling cases relted to Acquiring and issuing banks. Risk monitoring for merchants and suspicion reporting. Dealing with Cyber Police Officials & Banks over phone call and assisting them as per the requirement as point of contact (case to case basis). Dealing with merchants to fetch the details or reolve disputes received through LEA/Regulatory. Daily case closure and reporting tracker update/upload. Requirements: Graduate with experience in same field is preferred. Experience in handling of Cyber crime and other financial frauds of cards misuses etc. Team player, who is eager to develop/learn and work towards team objectives. What we offer? A positive, get-things-done workplace A dynamic, constantly evolving space (change is par for the course – important you are comfortable with this) An inclusive environment that ensures we listen to a diverse range of voices when making decisions. Ability to learn cutting edge concepts and innovation in an agile start-up environment with a global scale Access to 5000+ training courses accessible anytime/anywhere to support your growth and development (Corporate with top learning partners like Harvard, Coursera, Udacity) About us: At PayU, we are a global fintech investor and our vision is to build a world without financial borders where everyone can prosper. We give people in high growth markets the financial services and products they need to thrive. Our expertise in 18+ high-growth markets enables us to extend the reach of financial services. This drives everything we do, from investing in technology entrepreneurs to offering credit to underserved individuals, to helping merchants buy, sell, and operate online. Being part of Prosus, one of the largest technology investors in the world, gives us the presence and expertise to make a real impact. Find out more at www.payu.com Our Commitment to Building A Diverse and Inclusive Workforce As a global and multi-cultural organization with varied ethnicities thriving across locations, we realize that our responsibility towards fulfilling the D&I commitment is huge. Therefore, we continuously strive to create a diverse, inclusive, and safe environment, for all our people, communities, and customers. Our leaders are committed to create an inclusive work culture which enables transparency, flexibility, and unbiased attention to every PayUneer so they can succeed, irrespective of gender, color, or personal faith. An environment where every person feels they belong, that they are listened to, and where they are empowered to speak up. At PayU we have zero tolerance towards any form of prejudice whether a specific race, ethnicity, or of persons with disabilities, or the LGBTQ communities.

Posted 1 week ago

Apply

5.0 - 8.0 years

27 - 42 Lacs

Bengaluru

Work from Office

Job Summary This role encompasses a broad range of security responsibilities, including advanced offensive security operations, application security reviews, secure code reviews, and implementation of the Secure Software Development Lifecycle (SSDLC). The successful candidate will simulate sophisticated attacks, conduct secure code reviews, and contribute to the development of security tools. Responsibilities also include ensuring cloud security and Kubernetes security. The ideal candidate will possess the ability to conduct offensive security operations and apply their expertise to application security. They will perform threat modeling exercises with an attacker's mindset, leveraging their experience in bug bounty programs and red teaming simulations. The candidate will implement mitigations at the code level and support the Blue Team in improving detection capabilities using SIEM tools. This role requires a unique blend of skills and knowledge across multiple security domains. Job Requirements • Conduct Red Team exercises, simulating APTs in cloud, container, and AD environments. • Develop and execute adversary simulations based on the MITRE ATT&CK framework, focusing on assume breach scenarios. • Simulate attacks on software supply chains and CI/CD pipelines. • Perform in-depth penetration testing (both black-box and white-box) for web applications, APIs, and networks. • Conduct secure code reviews in collaboration with development teams to identify, exploit and implement mitigations on code level. • Integrate security tools and practices into the CI/CD pipeline, emphasizing DevSecOps methodologies. • Conduct threat modeling, design, and architectural reviews to identify potential security risks in the software development lifecycle. • Provide security guidance to development teams, assisting in risk mitigation and secure development practices. • Collaborate with the Blue Team to improve detection capabilities and test defensive measures. • Utilize SIEM tools for incident detection and response, providing insights to enhance monitoring and alerting mechanisms. • Develop and maintain custom security tools and frameworks to automate security testing and monitoring. • Stay informed about emerging threats, attack techniques, and security technologies. Education • Bachelor’s degree in computer science, information security, or a related field (or equivalent experience). • At least 4+ years of experience in offensive security and Application security. • Proven experience in offensive security, with a strong understanding of attack vectors and techniques. • Relevant certifications such as OSWE, OSCP, CRTO, or similar. • Significant contributions to security through Bug bounty programs, CVEs or recognized security research. • Recognized public acknowledgments in security research. • Experience with scripting or programming languages like Python, Go, or Ruby for developing custom attack tools/exploits. • Familiarity with CI/CD tools such as GitHub Actions, Jenkins, or TeamCity. • Knowledge of security practices of cloud computing platforms like AWS, Azure, GCP, as well as k8s.

Posted 1 week ago

Apply

2.0 - 5.0 years

5 - 8 Lacs

Noida

Work from Office

Develop and implement organization-wide information security policies and practices Monitor IT infrastructure for security incidents and lead the incident response process Conduct regular risk assessments, vulnerability scans, and audits Ensure compliance with relevant standards and regulations (e.g., ISO 27001, SOC 2, GDPR, PCI-DSS) Manage the deployment and monitoring of security tools (firewalls, SIEM, DLP, IDS/IPS, endpoint protection) Coordinate with internal teams and third-party vendors to ensure secure systems and operations Lead and guide the security awareness and training program across departments Handle internal and external security audits, and ensure timely closure of findings Stay updated with emerging threats, security trends, and regulatory changes Collaborate with the IT, DevOps, and legal teams to ensure secure development and compliance

Posted 1 week ago

Apply

2.0 - 4.0 years

6 - 10 Lacs

Pune

Work from Office

0px> Who are we Amdocs helps those who build the future to make it amazing. With our market-leading portfolio of software products and services, we unlock our customers innovative potential, empowering them to provide next-generation communication and media experiences for both the individual end user and enterprise customers. Our employees around the globe are here to accelerate service providers migration to the cloud, enable them to differentiate in the 5G era, and digitalize and automate their operations. Listed on the NASDAQ Global Select Market, Amdocs had revenue of $5. 00 billion in fiscal 2024. For more information, visit www. amdocs. com In one sentence Secures enterprise information by developing, implementing, and enforcing security controls, safeguards, policies, and procedures What will your job look like Develop, implement, and administer security policies and plans for Amdocs as well as carry out information security activities in accordance with the established policies and guidelines Build and assess security policies for the OS, network, and database. This will require analyzing and evaluating security vulnerabilities, and managing security systems such as anti-virus, firewalls, patch management, intrusion detection, and encryption Recommend fixes, security patches, and any other measures required in the event of a security breach. Assist in coordinating contingency plan tests on a periodic basis Coordinate security orientation and security awareness programs. You will build standard operating procedures for security tools and processes per industry best practices Be responsible for carrying out penetration testing and vulnerability assessments to align with client security needs across countries You will design, implement, and report on security system and end-user activity audits; monitor server, application, and network traffic for unusual or suspicious activity; interpret activity and make recommendations for resolution You will be responsible for coordinating, assessing & addressing customer security needs All you need is. . . Bachelor degree in engineering or equivalent CISA/CISM preferable CISSP/CEH preferable ISO27001 certified Experience with operating systems (Windows, Linux, and Unix) and network Knowledge and hands-on experience with TCP/IP and other network protocols. Knowledge of firewall architecture and design, network architecture, and monitoring and reporting solutions to proactively identify issues and mitigate risk Knowledge of information security concepts and methodologies Knowledge of compliances (PCI DSS, SoX, DPA, and so on) and IS standards (ISO 27001, BS25999, ISO 20000, OWASP, and so on) Knowledge of risk management methodologies and approach Knowledge of Secure SDLC methodology Why you will love this job: You will be able to demonstrates an understanding of key business drivers and ensures strategic directions are followed and the organization succeeds You will be able to gathers relevant data, identifies trends and root causes, and draws logical conclusions to develop solutions You will have ability to assess details, systems and other factors as part of a single and comprehensive picture We are a dynamic, multi-cultural organization that constantly innovates and empowers our employees to grow. Our people our passionate, daring, and phenomenal teammates that stand by each other with a dedication to creating a diverse, inclusive workplace! We offer a wide range of stellar benefits including health, dental, vision, and life insurance as well as paid time off, sick time, and parental leave

Posted 1 week ago

Apply

2.0 - 3.0 years

8 - 9 Lacs

Pune

Work from Office

Identity & Access Management is a core driver for Information Security at Allianz Technology. The Identity Lifecycle & Access Provisioning (IL&AP) cluster is tasked to continuously develop and enhance our IAM solutions, harden their resilience against attackers and keep the access management efficient, traceable and secure to ensure that the IT services of the Allianz group are in line with the audit requirements. The IAM Business Analyst holds a key role and is responsible for IAM operations within a global team which is part of the IAM tribe inside our central Information Security function. Short description of position The IAM Business Analyst will play a crucial role in the implementation, enhancement, and maintenance of our Identity and Access Management systems. This position will be responsible for analyzing business requirements, designing IAM solutions, and ensuring the alignment of IAM processes with organizational goals and regulatory requirements. The ideal candidate will have a strong understanding of IAM principles, excellent analytical skills, and the ability to collaborate effectively with cross-functional teams. Key responsibilities/tasks Requirements Gathering and Analysis Collaborate with stakeholders to gather and document business requirements related to identity and access management. Conduct detailed analysis of current IAM processes and identify areas for improvement. Translate business needs into functional and technical requirements for IAM solutions. Solution Design and Implementation Work with IAM product owners, architects, developers and engineers to design and implement IAM solutions within the One Identity Manager framework that meet business requirements and adhere to security best practices. Participate in the configuration, testing, and deployment of IAM systems and tools. Ensure IAM solutions are scalable, reliable, and compliant with regulatory standards. Process Improvement Identify opportunities to streamline and optimize IAM processes. Develop and maintain documentation for IAM policies, procedures, and workflows. Provide recommendations for enhancing IAM governance and controls. Stakeholder Collaboration Serve as a liaison between business units, IT, and Information Security teams to ensure effective communication and alignment on IAM initiatives. Conduct training and awareness sessions for end-users on IAM policies and procedures. Support audit and compliance activities related to IAM. Monitoring and Reporting Monitor IAM systems and processes to ensure effective operation and compliance. Develop and generate reports on IAM metrics, incidents, and performance. Assist in the investigation and resolution of IAM-related incidents and issues. Key requirements /skills /experience a) Qualification, Certification and Experiences (education, passed PE, trainings, certificates, special IT skills, languages etc.) BachelorDegree in Information Technology, Computer Science, Business Administration, a related field, or comparable work experience Excellent English skills both written and spoken fluently At least 2-3 years of work experience as a Business Analyst, preferably in the field of Identity and Access Management. Experience working with a modern IGA software tool like One Identity Manager (strongly preferred), SailPoint, Salesforce, ForgeRock, Oracle Identity Manager or similar Knowledge of regulatory requirements and standards related to IAM (e.g., GDPR, HIPAA, SOX, DORA) is a plus. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Identity and Access Manager (CIAM), or similar are desirable. b) Skills and Competencies (functional / technical / methodological / social skills, Allianz competencies) Experience in IAM with strong knowledge of IAM concepts, including authentication, authorization, provisioning, and role-based access control, processes and understanding of security, risks, and governance is a plus Expertise and interest in IT security, Identity and Access Management and related fields of technology, and open to new trends and technologies Excellent analytical and problem-solving skills. Strong communication and interpersonal skills, with the ability to work effectively with diverse teams. Experience working with agile software methodologies (Scrum, Kanban, SAFe) Proven track record of the ability to create proper documentation and being capable of transfering knowledge in an enterprise scaled, international environment Competence to manage tasks in demanding and unfamiliar situations with problem solving skills based on practice and precedent Ability to cooperate efficiently with clients, working in cross-functional teams as well as willingness to support new team members Experience with incident analysis/handling with a close contact to architects, developers, engineers, customers and business stakeholders .

Posted 1 week ago

Apply

14.0 - 15.0 years

14 - 15 Lacs

Thiruvananthapuram

Work from Office

Overall Objectives of Job: Key Responsibilities: Training Program Development and Delivery: Design and implement engaging training programs tailored to meet organizational needs. Deliver training sessions and workshops both in-person and virtually. Continuously evaluate and improve training materials and methodologies. Program Management: Manage the logistics and administration of training programs. Coordinate with internal and external stakeholders to ensure smooth program execution. Monitor program budgets and resources. Learning Metrics and Reporting: Develop and maintain reporting mechanisms for learning metrics. Analyze data to assess the impact and effectiveness of training programs. Provide insights and recommendations to improve learning outcomes. Workshops and Team Support: Support the team in organizing workshops on CSRD and SWP topics. Collaborate with subject matter experts to ensure content relevance and accuracy. Facilitate interactive sessions to foster engagement and learning. Support with data management and data analysis 90% Allianz IndiaDuties & Responsibilities : Follow Allianz Services HR policies Organize/ participate in various divisional level and organization level activities and initiatives such as OPEX, ICG, TCG, Diversity, Innovation, and Charity. Ensuring on-time Weekly/Monthly reporting as required 5% ISMS Responsibilities : Conduct ISMS activities in BC team as per the guidance of ISMS Team SPOC Adhere to the Information Security policies day in and day out Report any ISMS events / incidents as per the reporting procedures Shall be aware of all ISMS principles and guidelines 5% Qualification & Experience Bachelordegree in human resources, Education, Business Administration, or a related field. Proven experience in training program development and delivery. Strong project management skills with the ability to manage multiple programs simultaneously. Excellent communication and presentation skills. Proficiency in data analysis, presentation and reporting tools. Familiarity with CSRD, audit standards and SWP concepts is preferred. Understanding of continuous improvement and innovation 77525 | Human Resources | Professional | PG08 | Allianz Services | Full-Time | Permanent Allianz Group is one of the most trusted insurance and asset management companies in the world. Caring for our employees, their ambitions, dreams and challenges, is what makes us a unique employer. Together we can build an environment where everyone feels empowered and has the confidence to explore, to grow and to shape a better future for our customers and the world around us. We at Allianz believe in a diverse and inclusive workforce and are proud to be an equal opportunity employer. We encourage you to bring your whole self to work, no matter where you are from, what you look like, who you love or what you believe in. We therefore welcome applications regardless of ethnicity or cultural background, age, gender, nationality, religion, disability or sexual orientation. Join us. Lets care for tomorrow. Note: Diversity of minds is an integral part of Allianzcompany culture. One means to achieve diverse teams is a regular rotation of Allianz Executive employees across functions, Allianz entities and geographies. Therefore, the company encourages its employees to have motivation in gaining varied skills from different positions and to collect experiences from across Allianz Group.

Posted 1 week ago

Apply

5.0 - 10.0 years

20 - 25 Lacs

Mumbai

Work from Office

Seclore seeks an experienced Product Manager with technical expertise and client-facing skills. This role involves launching a new product, connecting clients, industry experts, and our technical team. Strong communication skills, technical understanding, and project management efficiency are essential. Here's what you will get to explore: Collaborate with security architects, engineers, and compliance teams to gather technical and regulatory requirements. Translate complex cybersecurity needs into clear product specifications and user stories. Understand end-user journeys and gather product metrics to evaluate the effectiveness of new features in achieving business outcomes. Be the Functional Expert: Understand the full Seclore product suite functionally and be the expert for the product modules owned by you. Know various user personas and their business context. Understand the technology environment, including devices, operating systems, and browsers. Product Development Support: Partner with engineering teams throughout the development lifecycle to ensure secure design and implementation. Participate in sprint planning, backlog grooming, and daily stand-ups to provide product guidance. Security Integration: Ensure security is embedded in all stages of the product lifecycle (DevSecOps). Work on integrating security tools and frameworks (e.g., SIEM, IAM, DLP, SAST/DAST) into the product ecosystem. Technical Documentation: Create and maintain detailed documentation for security features, APIs, workflows, and compliance mappings. Cross-Functional Collaboration: Act as a liaison between product, engineering, security, and compliance teams. Support external product managers with technical insights and feasibility assessments. Build with DevSecOps in Mind: Champion secure development practices and help integrate security tools (e.g., SAST, DAST, IAM, SIEM) into our CI/CD pipelines. Risk Compliance Alignment: Ensure product features align with internal security policies and external regulations (e.g., GDPR, HIPAA, PCI-DSS). Assist in security audits and risk assessments. We can see the next Entrepreneur At Seclore if you: Have a technical degree (Engineering, MCA) and/or business degree (MBA, BBA) from a reputed institute. Have 5+ years of experience in product management, technical program management, or cybersecurity engineering. Have experience working in Agile environments and collaborating closely with engineering teams. Can break down complex technical problems into simple, actionable steps. Possess strong analytical, communication, and organizational skills. Have experience working in a software product organization as a product consultant, product owner, business analyst, or functional expert in the product team. Bring a technical background in software either from development or systems perspective. Good to Have: Awareness and exposure to User Experience design practices. Experience in information security procedures and practices. Initiative to take up responsibility and ownership of tasks and ensure end-to-end delivery with the highest level of quality. Why do we call Seclorites Entrepreneurs, not Employees We value and support those who take the initiative and calculate risks. We have an attitude of a problem solver and an aptitude that is tech agnostic. You get to work with the smartest minds in the business.

Posted 1 week ago

Apply

2.0 - 5.0 years

13 - 18 Lacs

Mumbai

Work from Office

This position is for individuals who possess the ability to identify multiple solutions to the same problem and can help in decision making while working in a super-agile environment. Seclore is a place where innovation is nurtured. We continuously push the boundaries of innovation and find new ways to add value to customers and stakeholders. We are proud to be recognized as Great place to work for the fifth consecutive year. RESPONSIBILITIES You will be responsible for planning and delivering feature releases of the Seclore product Ensure timely closure of requirements from product management team. Get the engineering team to come up with solution and estimation. Create an aggressive but realistic release plan and get stakeholder buy-in Execute and monitor the project to a timely and quality release including resource allocation in collaboration with the development lead and testing lead. Anticipate risks, plan for mitigation, remove any hurdles to successful delivery. You will work with product management team and other project managers to deliver the product roadmap and build the next generation Seclore product. Candidate Requirements: You should have: A technical degree from a reputed institute with a minimum of 2 to 5 years of overall experience in the software industry as Project manager, with minimum 1+ years of experience in Software development Aptitude and attitude required to understand technical complexities and pre-empt project risks / challenges. Excellent communication skills and understanding of key project management areas. Good negotiation and stakeholder management skills Curiosity to learn new things, and empathy to appreciate the challenges of your team and of your customers. High analytical/critical thinking/problem solving skills. Working Experience in SDLC/Software Development Industry. It would be nice if you have: An experience in information security procedures and practices. A certification in the knowledge areas related to information security, business process management or IT infrastructure. Personal Attributes we are looking for: An analytical frame of mind to identify multiple solutions to the same problem, to help in decision making. A can do attitude to be able to work within existing constraints and come up with innovative ideas that may not be obvious or apparent. Maturity and level headedness to handle difficult situations and still maintain healthy relationships with customers and partners

Posted 1 week ago

Apply

10.0 - 20.0 years

20 - 35 Lacs

Hyderabad

Work from Office

Greetings from Technogen !!! We thank you for taking time about your competencies and skills, while allowing us an opportunity to explain about us and our Technogen, we understand that your experience and expertise are relevant the current open with our clients. About Technogen : https://technogenindia.com/ Technogen India Pvt. Ltd. is a boutique Talent & IT Solutions company, founded in 2008, has been serving global customers for over last 2 decades,. Talent Solutions: We assist several GCCs, Global MNCs and IT majors on their critical and unique IT talent needs through our services around Recruitment Process Outsourcing (RPO), contract staffing, permanent hiring, Hire-Train-Deploy (HTD), Build-Operate-Transfer (BOT) and Offshore staffing. Job Title : Infrastructure Security Engineering and Architecture Lead Required Experience : 10+ years Work Mode: WFO-4 Days from Office. Shift Time : UK Shift Time-12:00 PM IST to 09:00 PM IST. Location : Hyderabad. Job Summary:- The Infrastructure Security Engineering and Architecture Lead is a senior technical role responsible for the secure design, implementation, and ongoing hardening of the organization's critical IT infrastructure across on-premises, cloud (IaaS, PaaS, SaaS), and hybrid environments. This individual will serve as a subject matter expert, leading security initiatives, defining architectural standards, and mentoring engineering teams to integrate robust security controls throughout the infrastructure lifecycle. The ideal candidate possesses deep technical expertise in various infrastructure domains, a strong understanding of modern security principles, and the ability to translate complex security requirements into actionable engineering solutions. Key Responsibilities: Security Architecture & Design: Lead the development, review, and evolution of secure architectural patterns and standards for all infrastructure components (networks, servers, storage, virtualization, containers, cloud platforms, endpoint management). Design and implement security controls for new infrastructure initiatives, ensuring adherence to security best practices, industry frameworks (e.g., NIST, ISO 27001), and regulatory requirements. Provide expert security guidance during the selection, design, and deployment of infrastructure technologies. Perform security architecture reviews of existing and proposed infrastructure to identify and mitigate design-level vulnerabilities. Security Engineering & Implementation: Drive the engineering and implementation of advanced security solutions and tools across the infrastructure landscape (e.g., WAFs, IDS/IPS, network segmentation, secure remote access, endpoint detection & response, cloud security posture management). Oversee the secure configuration and hardening of operating systems (Windows, Linux), network devices, hypervisors, and cloud services. Automate security provisioning, configuration management, and vulnerability remediation processes using scripting (e.g., Python, PowerShell) and Infrastructure as Code (IaC) tools (e.g., Terraform, CloudFormation, Ansible). Collaborate with DevOps/SRE teams to embed security into CI/CD pipelines and infrastructure deployments. Vulnerability Management & Hardening: Lead efforts to identify, assess, prioritize, and remediate infrastructure vulnerabilities. Develop and implement continuous monitoring and alerting mechanisms for infrastructure security posture. Define and enforce secure baseline configurations and golden images for server, network, and cloud environments. Cloud Security: Serve as a primary architect for securing cloud infrastructure (e.g., AWS, Azure, GCP), including identity and access management (IAM), network security groups, cloud native WAFs, container security, and serverless function security. Develop and implement cloud security policies and best practices. Mentorship & Leadership: Provide technical leadership and mentorship to junior security engineers and infrastructure teams. Evangelize security best practices and foster a security-first culture across the organization. Act as a point of contact for complex infrastructure security issues and incident response support. Documentation & Standards: Create and maintain comprehensive security documentation, including architecture diagrams, security standards, hardening guides, and operational procedures. Develop and enforce security policies and guidelines for infrastructure. Collaboration: Work closely with IT operations, development teams, enterprise architecture, and other security domains (e.g., AppSec, GRC) to ensure a holistic security approach. Engage with external vendors and security researchers as needed. Required Qualifications: Bachelor's degree in Computer Science, Information Security, Engineering, or a related field; equivalent practical experience will be considered. 10+ years of progressive experience in IT infrastructure, with at least 5 years specifically focused on infrastructure security engineering and architecture. Demonstrated expertise in securing diverse infrastructure components, including: Networking: Firewalls (NGFW, WAF), IDS/IPS, VPNs, network segmentation, routing, switching, secure network protocols. Operating Systems: Deep hardening knowledge of Windows Server and various Linux distributions. Virtualization: VMware ESXi, Hyper-V, or equivalent hypervisor security. Cloud Platforms: Extensive experience with security services and best practices in at least one major cloud provider (AWS, Azure, or GCP). Identity & Access Management: Strong understanding of Active Directory, Azure AD, federated identity, SSO, MFA, and privileged access management (PAM). Endpoint Security: EDR solutions, host-based firewalls. Proficiency in scripting languages (e.g., Python, PowerShell, Bash) for automation and security tasks. Experience with Infrastructure as Code (IaC) tools (e.g., Terraform, Ansible, CloudFormation). Solid understanding of common security frameworks (e.g., NIST CSF, ISO 27001), compliance regulations (e.g., GDPR, CCPA, HIPAA), and security best practices (e.g., CIS Benchmarks). Excellent analytical, problem-solving, and communication skills, with the ability to articulate complex security concepts to technical and non-technical audiences. Qualifications: Education: Bachelors degree in computer science, Information Technology, or a related field. A masters degree is preferred. Experience: 510+ years of progressive experience in cyber security, including at least 5 years in senior leadership roles. Technical Skills: Deep understanding of cyber security frameworks (NIST CSF, NIST 800-53, MITRE ATT&CK) Leadership Skills: Demonstrated experience building and managing enterprise security programs in complex, regulated environments. Proven ability to influence at all levels, including executives and board members. Excellent leadership, communication, and stakeholder engagement skills. Problem-Solving: Strong technical foundation in network security, cloud security (GCP, AWS, Azure, OCI), security engineering, and incident response. Cultural Awareness: Ability to work effectively in a multicultural environment and manage teams across different time zones. Preferred Qualifications: Experience working in a global organization with distributed teams. Certification in (CISSP, CISM, CISA, CCSP, etc.) strongly preferred. Experience and Certifications in ITIL, Agile and DevOps practices. Experience working in Retail & Manufacturing. Knowledge of managing regulatory environments such as HIPAA, SOX, PCI-DSS, GDPR. Experience integrating security in agile, DevOps, and CI/CD pipelines. Experience with containerization technologies (Docker, Kubernetes) and their security implications. Familiarity with serverless computing security. Experience with Security Information and Event Management (SIEM) systems and SOAR platforms. Experience in a highly regulated industry. Best Regards, Syam.M| Sr.IT Recruiter syambabu.m@technogenindia.com www.technogenindia.com | Follow us on LinkedIn

Posted 1 week ago

Apply

5.0 - 10.0 years

8 - 18 Lacs

Bhiwadi

Work from Office

Job Summary: Provides IT Infrastructure support on-site and remotely (solving second level Incident, Problem and Request management), maintenance (Change, Asset Management and Patching) and support project execution, partnering with Global IT Enterprise teams and external service providers, utilizing tools and following IT Standards and Procedures. Responsibilities: Tenneco may make reasonable accommodations to enable people with disabilities to perform the essential duties of the position. Supports Incident and Request management submitted through IT Service management system per service level objectives. Supports procurement, installation, configuration and support end user devices like Laptops, Desktops, Workstations, and mobile devices through staging or manual deployment of standard software, apps, PBX and Phone systems. Supports Enterprise IT teams in additional troubleshoots and maintains Server, Network (WAN & LAN), Monitoring UPS and Switches, Backup Environment, and external vendor. Reports issues through service desk tools and follows-up through enterprise team and or vendors for critical and high issues tracking and escalating until closure. Supports the on-site Computer Room, Racks, cabling, and Data room maintenance tasks. Manages and maintains IT Asset Register through tools. Maintains and loads backup tapes per backup policy and direction from Global Enterprise teams and supports restoration of data per requests. Covers all critical equipment through Annual maintenance contract, reports issues with services providers and escalates per vendor services level agreement. Education / Experience: • Bachelors Degree in Computer Science. • Minimum 2 years’ of experience working in an IT operations / service organization within a complex IT Infrastructure environment providing support on-site and remotely (automotive and / or manufacturing industries is a plus). • ITIL, Microsoft Certified Desktop Service Technician (MCDST), HP Desktop / Printer preferred.

Posted 1 week ago

Apply

2.0 - 4.0 years

15 - 25 Lacs

Mumbai

Work from Office

About Organization: Larsen & Toubro Ltd, commonly known as L&T, is an Indian multinational conglomerate company, with business interests in engineering, construction, manufacturing, technology, information technology and financial services, headquartered in Mumbai. The company is counted among world's top five construction companies. The L&T Group comprises of 93 subsidiaries, 5 associate companies, 27 joint ventures and 35 jointly held operations, operating across basic and heavy engineering, construction, realty, manufacturing of capital goods, information technology, and financial services. Specialties: Aerospace, Infrastructure, Shipbuilding, Construction, Defense, Finance, Forging, Hydrocarbon, Information Technology & Engineering Services, Construction Equipment, Railways, Boilers, Process Plant, Turbines, Power, Renewable Energy, Manufacturing and Green Hydrogen. Job Role - Application Security (Cyber), Corporate IT Educational Qualifications - B.Tech/B.E Experience - Around 2-4 years in (IT) information technology along with information security Job Location - Mumbai Job Profile Sound knowledge of Info Sec standards such as ISO27001 Understanding of technology security architecture concepts Understanding Application Risk Management Framework Should possess good interfacing skills Should possess good application security knowledge, experience on tools & methodologies related to secure software development (OWASP top20, AppScan, Metasploit, WAF) for web, mobility, API, ERP & cloud apps. Job Responsibilities Keep track of latest tools & technologies being introduced in application security arena Roll out "security by design" structure in software projects (secure SDLC) Work with solution providers to conduct limited proof of concept testing for products through well-defined measurement criteria Implement security tools & technologies as per project plans with vendors & partners Conducting software security awareness trainings for stakeholders in respective areas Good communication skills ( verbal / written ) Should be a self-starter, motivated Competencies Required Security certifications (CISSP, OSCP, CEH) desirable

Posted 1 week ago

Apply

5.0 - 8.0 years

3 - 7 Lacs

Jaipur

Work from Office

Shift : 9x5 Job Description for Threat Hunter/TIP admin Skillset Must : Network forensic (Packet Capture andRe-Construction Capability), Knowledge on Threat Intelligence Platform (TIP)/Anti APT/ EDR Certified with any threat hunting certification,or equivalent . Responsible for conducting all threat-huntingactivities necessary for identifying the threats including zero day. Hunt for security threats, identify threat actorgroups and their techniques, tools and processes. Strong knowledge of APT lifecycle, tactics,techniques, and procedures (TTPs). Familiarity with MITRE ATT&CK framework andmapping threats to techniques. Provide expert analytic investigative support toL1 and L2 analysts for complex security incidents. Proficiency in malware behavior analysis andsandboxing. Perform analysis of security incidents forfurther enhancement of rules, reports, AI/ML models. Perform analysis of network packet captures,DNS, proxy, NetFlow, malware, host-based security and application logs, as wellas logs from various types of security sensors uncovering the unknown aboutinternet threats and threat actors. Analyse logs, alerts, suspicious malwaressamples from all the SOC tools, other security tools deployed such asAnti-Virus, Anti APT solutions, EDR, IPS/IDS, Firewalls, Proxies, ActiveDirectory, Vulnerability assessment tools etc. Using knowledge of the current threat landscape,threat actor techniques, and the internal network, analyze log data to detectactive threats within the network. Build, document and maintain a comprehensivemodel of relevant threats to customer. Proactively identify potential threat vectorsand work with team to improve prevention and detection methods. Identify and propose automated alerts for newand previously unknown threats. Incident Response for identified threats. Strong knowledgeof APT lifecycle, tactics, techniques, and procedures (TTPs). Hands-onexperience with Trellix (formerly McAfee) APT solutions, EDR, and ThreatIntelligence. Proficiency inmalware behavior analysis and sandboxing. Familiarity withMITRE ATT&CK framework and mapping threats to techniques. Experience withsecurity monitoring tools such as SIEM, SOAR, EDR, and Threat IntelligencePlatforms (TIPs). Solidunderstanding of network protocols, endpoint protection, and intrusiondetection systems. Required Qualifications: Education: B.E./B.Tech/MCA/M.Sc. in Computer Science or Information Technology. Experience: Minimum 6+ years of relevant experience in Security Operations, Threat Detection, or Incident Response. Certification : CSA/CEH

Posted 1 week ago

Apply

4.0 - 7.0 years

3 - 7 Lacs

Jaipur

Work from Office

Experience Required: 4+ years in Cybersecurity, with 2+years hands-on any threat intelligence platform Reports To: Security Operations Lead / SOC Manager Location: Jaipur Job Type: Full-time, Customer locations Job Summary: We are seeking a skilled Threat IntelligenceEngineer/Analyst with hands-on experience in managing and operating a UnifiedThreat Intelligence Platform (UIP). The ideal candidate will be responsible forintegrating, enriching, analyzing, and disseminating threat intelligence acrosssecurity systems (SIEM, SOAR, EDR) to enhance threat detection, hunting, andresponse efforts. Key Responsibilities: Administer and maintain the Unified Threat Intelligence Platform (e.g., MISP, Anomali, ThreatConnect, EclecticIQ, TIP from commercial vendors). Should have worked on any of the TI platform. Experience in Recorded future preferred. Aggregate, normalize, and enrich threat intel feeds from internal, commercial, and open-source sources (OSINT). Map Indicators of Compromise (IOCs), TTPs, and threat actor profiles using frameworks such as MITRE ATT&CK and STIX/TAXII. Integrate UIP with SIEM, SOAR, and EDR platforms to enable automated threat correlation and alert enrichment. Analyze and prioritize threat intelligence based on relevance, risk level, and business impact. Coordinate with threat-hunting and SOC teams to enable actionable use of threat intelligence. Create and manage threat intelligence dashboards, reports, and alerts. Continuously improve threat ingestion, enrichment pipelines, and integration workflows. Required Skills and Qualifications: Solid understanding of Threat Intelligence lifecycle: collection, processing, analysis, dissemination. Experience with commercial or open-source TIP/UIP tools (e.g., MISP, ThreatConnect, Anomali, EclecticIQ). Strong knowledge of STIX/TAXII, OpenIOC, YARA, Sigma rules. Experience integrating threat intel into SIEM (e.g., Splunk, QRadar, Sentinel) and SOAR platforms. Familiarity with threat actor behavior, campaigns, malware families, and IOC tracking. Working knowledge of scripting (Python preferred) for automation and data transformation. Ability to analyze complex data and present threat intelligence in clear, actionable formats. Education Requirements : BE, B.Tech in IT/CS/ECE, BCA, BSc CS and MCA Certification : CEH/CSA/ NBAD certification

Posted 1 week ago

Apply

5.0 - 10.0 years

9 - 14 Lacs

Chennai

Work from Office

Major Responsibilities: Manage the Perimeter Security technologies deployed by Tata Communication on client infrastructure including Firewall, Proxy, 2FA, etc. Handle change and support requests from customers Perform initial troubleshooting on issues and escalate to shared SOC team as needed via portal, email or phone. Follow up requests and incidents for resolution and ensure client is communicated regularly Establish good working relationship with the stakeholders on the client side Send regular reports on the tasks performed to the TCL Manager Provide hands and feet support for the remote team inside the client infrastructure for troubleshooting and other activities. Work with vendors to resolve internal and customer issues in a timely manner Support client on their regular office days. Candidate would also be expected to be flexible with timings to support issues and major activities like upgrades or maintenance. Experience and qualification Bachelors degree in Engineering or equivalent 5-8 years of Experience in Networking and Perimeter Security. Good knowledge in Firewalls, Proxies and in Two Factor Authentication Technical Skills: Candidate should have handled at least any two of the Firewall products. Cisco, Checkpoint, Palo Alto, and FortiGate, Experience with any of these Proxy products Bluecoat or Zscaler. Understanding of security landscape and different tools used Good Communication and interpersonal Skills are mandatory. Industry certifications in the above products would be an added advantage. Familiarity with ITIL framework would be an advantage

Posted 1 week ago

Apply

3.0 - 7.0 years

12 - 17 Lacs

Mumbai

Work from Office

Responsible for driving Internal Audit ,Internal financial Control (IFC) for the organization and subsidiary. This is a tactical role which contributes to defining the direction of the operating plans based on the business strategy, with a significant mid-term impact on the overall results.Responsibilities Prepare the annual audit calendar and drive internal audit projects as per the calendar. Conduct Internal audit across departments/functions/ subsidiaries as per the timelines. Conduct meetings with the process owners to identify the scope, timeline & SLA of audit report. Interact with audit agencies and facilitate as well as review the auditing process. Review and Monitoring of Action Taken Report (ATR) Prepare the Internal finance control process document and risk & control matrix. Undertake management testing & ensure key controls proposed in the Internal finance document are tested. Identify & evaluate deficiencies in testing. Provide support to statutory auditors in their independent testing based on the requirements of the new companies act. Minimum qualification & experience 3-7 years of post qualification years of experience in internal audit and financial controls testing in a technology industry.Desired Skill sets Hands on experience with relevant Information System for assurance, testing, setting finance controls. Well versed with Excel, Power Bi etc good communication and report writing skills

Posted 1 week ago

Apply

7.0 - 9.0 years

12 - 16 Lacs

Chennai

Work from Office

Roles/Responsibilities: Experiencein SIEM Tool like ArcSight, LogRhythm SIEM, Threat Intelligence, MalwareAnalysis, Incident Response Experiencein handling SOC customer in MSSP/multi-tenant environment Responsiblefor the technical Administration or troubleshooting in SIEM ensuring theefficient functionality of the solution Responsiblefor Incident Validation, Incident Analysis, Solution Recommendation, Good knowledge on implementation,installation, integration troubleshooting and overall functionalities of LogRhythm/ArcSight/QRadar/Splunk Arc Sight/LR/QRadar platformadministration, management experience, platform upgrade Experience in troubleshooting platformrelated issues, Data backup, restoration, retention Experience in creating content basedon MITRE Framework Exposure to SOAR, alert aggregation,automation, Playbook creation ArcSight/LRrule base fine tuning, Ongoing log source modifications, Configuration/policychanges, General SIEM Administration, SIEM Content Development Troubleshootingof an incident within IT Security incident response teams of SOC. Maintainsawareness of new and emerging cyber-attack threats with potential to harmcompany systems and networks. Devises and implements countermeasures tomitigate potential security threats. Assistswith the development and maintenance of IT security measurement and reportingsystems to aid in monitoring effectiveness of IT Security programs. Assistswith the development, revision, and maintenance of Standard OperatingProcedures and Working Instructions related to IT Security. Good Coordination skills with variousother teams for faster resolution/completion. Good to have threat huntingknowledge. Education/Skills: BE/B.Techor equivalent with minimum 7-10 years of experience Workexperience of minimum 6 years in SOC Incident Handling, Incident Response TrendAnalysis, administration/monitoring of SIEM Tool like ArcSight, LogRhythm SIEM,Threat Intelligence, Malware Analysis, Abilityto adapt and follow the processes and guidelines Possessan impeccable work ethic and a high degree of integrity GoodAnalytical & Problem Solving skills Ableto communicate with technical staff/management Flexibleto work after office and over weekend if required Highlymotivated & customer centric

Posted 1 week ago

Apply

5.0 - 8.0 years

2 - 6 Lacs

Mumbai

Work from Office

ob Title: Perimeter Security Specialist Job Location : Mumbai Job Summary: We are seeking experienced and dedicated professionals to join our cybersecurity team. These specialists will be responsible for safeguarding our customer organization's network infrastructure and web applications against various threats, including DDoS attacks, web application vulnerabilities, encrypted traffic management, and network anomalies. Roles and Responsibilities: DDoS Protection Specialist: DDoS Mitigation: Implement and manage DDoS mitigation strategies to protect the organization's network from disruptive DDoS attacks. Monitoring: Continuously monitor network traffic for unusual patterns and proactively respond to DDoS attacks. Incident Response: Develop and execute DDoS incident response plans, including coordination with relevant stakeholders. Security Awareness: Educate staff about DDoS threats and best practices for mitigation. WAF Specialist (Web Application Firewall): WAF Configuration: Configure, manage, and maintain the Web Application Firewall to secure web applications against common threats, including SQL injection, XSS, and more. Rule Development: Develop and maintain WAF security rules to adapt to evolving threats and application requirements. Incident Response: Investigate and respond to security incidents and breaches related to web applications. Security Auditing: Regularly audit WAF logs and rules to ensure compliance and effectiveness. Encrypted Traffic Management Specialist: SSL/TLS Inspection: Implement SSL/TLS decryption and inspection techniques to identify and mitigate threats hidden within encrypted traffic. Certificate Management: Manage SSL/TLS certificates and ensure their proper deployment. Traffic Analysis: Analyze encrypted network traffic for potential security threats. NBAD Specialist (Network-Based Anomaly Detection): NBAD Configuration: Configure, manage, and maintain NBAD systems to monitor network traffic for unusual behavior or anomalies. Anomaly Detection: Detect and respond to unusual network activities that may indicate security breaches. Incident Response: Investigate and respond to network anomalies and security incidents. Qualifications: Science Graduate (IT / Computer) is preferred. Bachelor of Engineering (BE), Bachelor of Technology (B.Tech), or Master of Computer Applications (MCA) is required. A minimum of 4 to 5 years of relevant experience in the field of information security and a total of 6-7 years of experience in the field of IT Security and the implementation/support of in-scope solutions. Certifications: Certification in at least 2 of the following: CCNA, RHCE, CompTIA. OEM Product Certification in at least 2 technologies should be mandatory Work Hours : Flexible to work in 24x7x365 environments and extend in case of P1 incident, critical patch upgrades/updates, DC D R drills and as and when required.

Posted 1 week ago

Apply

2.0 - 4.0 years

2 - 6 Lacs

Thane

Work from Office

Organisation : Novamesh Ltd (TATA Commununications Ltd) Position : L1, Location Belapur, Customerlocation Shift : 9x5 Job Summary: We are seeking a well-rounded Security SolutionsSpecialist with hands-on experience in deploying, configuring, and managingsecurity platforms including EfficientIP (DNS, DHCP, IPAM), PicusSecurity (Breach and Attack Simulation), Varonis (Data Security& Governance), and ColorTokens (Microsegmentation & Zero Trust).The candidate will play a key role in optimizing the security posture of theorganization through proactive technology implementation, tuning, andcontinuous improvement. Key Responsibilities: EfficientIP (DNS Security & DDI Management): Configure and manage DDI (DNS, DHCP, IPAM) solutions using EfficientIP. Implement DNS threat protection, DNS tunneling detection, and response actions. Integrate EfficientIP with SIEM/SOC platforms for alerting and incident enrichment. Picus Security (Breach and Attack Simulation - BAS): Operate and tune the Picus BAS platform to continuously validate security controls. Conduct attack simulations mapped to MITRE ATT&CK to identify gaps in defenses. Collaborate with red/blue teams to interpret simulation outcomes and drive improvements. Varonis (Data Security and Insider Threat): Deploy and maintain Varonis to monitor access to critical data repositories (file shares, SharePoint, OneDrive, etc.). Investigate anomalous file activity, permissions misuse, and potential data exfiltration attempts. Support data classification, audit, and compliance initiatives (e.g., GDPR, HIPAA, PCI). ColorTokens (Microsegmentation & Zero Trust): Implement Zero Trust and application-layer segmentation policies using ColorTokens platform. Monitor east-west traffic, define security zones, and restrict lateral movement. Work with infrastructure and cloud teams to enforce policy across hybrid environments. Required Qualifications: Education: B.E./B.Tech/MCA/M.Sc. in Computer Science or Information Technology Certification : CEH

Posted 1 week ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Information Protection. Experience: 3-5 Years.

Posted 1 week ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Kochi

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: GRC Consulting. Experience: 5-8 Years.

Posted 1 week ago

Apply

6.0 - 11.0 years

4 - 8 Lacs

Navi Mumbai

Work from Office

Experience: 5 to 6 Experience. Hands-on Experience on Checkpoint firewall 80.xx and cloud guard and Cisco ASA 55XX and FTD. Hands-on Experience on O365 EOP and Email proxys and web proxys. Hands-on Experience on any IPS devices. Hands-on Experience on Mcafee EPO. Hands-on Experience on Cisco umbrella. Experience on working ticketing tool. Good communication & Presenting skill Technical. Aware of Firewall Upgradation process. Maintaining firewalls, virtual private networks, web protocols, and email security. Reporting the security analysis and monitoring findings. Hands-on experience on DC, DR, AWS connectivity. BE / BTech 5/6 yrs experience of the domain

Posted 1 week ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Security Incident Response. Experience: 5-8 Years.

Posted 1 week ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Coimbatore

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Identity Manager. Experience: 5-8 Years.

Posted 1 week ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: PKI - Certificate Management. Experience: 3-5 Years.

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies