Jobs
Interviews

4421 Information Security Jobs - Page 14

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 10.0 years

7 - 12 Lacs

Pune

Work from Office

Manager, Software Engineering Overview We are the global technology company behind the world s fastest payments processing network. We are a vehicle for commerce, a connection to financial systems for the previously excluded, a technology innovation lab, and the home of Priceless . We ensure every employee has the opportunity to be a part of something bigger and to change lives. We believe as our company grows, so should you. We believe in connecting everyone to endless, priceless possibilities. Our team within Mastercard - Services: The Services team is a key differentiator for Mastercard, providing the cutting-edge services that are used by some of the worlds largest organizations to make multi-million dollar decisions and grow their businesses. Focused on thinking big and scaling fast around the globe, this agile team is responsible for end-to-end solutions for a diverse global customer base. Centred on data-driven technologies and innovation, these services include payments-focused consulting, loyalty and marketing programs, business Test & Learn experimentation, and data-driven information and risk management services. As a member of the Mastercard Intelligence team, you will help build real-time interactive applications for thousands of clients across the globe that allow users to compare the performance of their portfolio against benchmarks. The team will consist of full-stack developers focused on building a platform that leverages the Mastercard data and combining it with other data provided by 3rd parties and clients to power applications that help clients track performance and identify underperforming groups of customers. You will have the opportunity to build a high-performance analytics platform that advances how businesses all over the world unleash the most value from Mastercard data. Our next-generation platform blends industry-leading analytics, advanced software architecture, and the latest web technologies. You will play a vital role within a rapidly growing organization while working closely with experienced and driven engineers to solve challenging problems. The teams work in small, flexible groups and every team member contributes to feature design, building, and testing. The range of work you encounter varies from building data pipelines to working on web apps to writing server-side calculation code to performance turning of large workloads. There are no rigid organizational structures at Mastercard; each team uses processes that work the best for that teams members and projects. Position Responsibilities: Manage, coach, and develop a cross-functional engineering team Provide strategic technical and product direction for applications, architectures, and software development processes Design and develop new, complex technical products from inception to release Partner with product development on the product roadmap, scoping features, and planning releases Champion technical innovation and high quality within the team Collaborate across teams and business units to solve complex problems Lead goal setting and accountability practices within the engineering team Continuously experiment and innovate to develop a high performing engineering team Be a strong individual contributor to the implementation efforts of product solutions Lead with an agile mindset and pivot fast and often as new information surfaces Keep senior stakeholders informed of progress and incorporate input into technical decisions Identify short term and long-term engineering needs to scale platform solutions to meet customer demand All About You 5+ years of full stack engineering experience in an agile production environment Experience leading engineering teams and/or coaching and mentoring junior teammates Experience leading the design and implementation of large, complex features in full-stack applications Experience leading a large technical effort that spans multiple people and teams Proficiency with Java/Spring Boot, .NET/C#, React, Redux, Typescript, and SQL Server or other object-oriented languages, front-end frameworks, and/or relational database technologies Strong technologist with proven track record of learning new technologies and frameworks Customer-centric development approach Passion for analytical / quantitative problem solving Experience identifying and implementing technical improvements to development processes Collaboration skills with experience working with people across roles and geographies Motivation, creativity, self-direction, and desire to thrive on small project teams Superior academic record with a degree in Computer Science or related technical field Strong English written and communication skills.

Posted 1 week ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Hyderabad

Work from Office

Job Description: IAM Engineer and Analyst Role This role will participate heavily in ongoing IAM program enhancements, monitor and analyze events to proactively address operational issues and thwart threats to the customer environment. You will be responsible for the following: Define and document business and technical requirements for Identity and Access Management systems, including requirements for establishing role, entitlements, and access definitions, defining the provisioning lifecycle processes, user account lifecycle processes, reconciliation, certification, provisioning, and de-provisioning processes. Participate in IAM projects and initiatives. Work with customer team members, business partners/analysts, and application teams to understand access requirements. Create reports to identify provisioning inconsistencies or conflicts and operationalize processes to regularly identify and remediate issues. Automate or streamline existing processes and workflows. Define, validate, and maintain user access roles. Analyze user access roles and processes to independently assess compliance with defined standards. Support user access re-certifications, as defined by customer policies. Strictly adhere to audit and regulatory controls, as well as IAM standards. Independently identify gaps and propose solutions. Regularly review and maintain documentation to ensure it reflects current processes and procedures and identify opportunities for process improvement. Participate in IAM audits and review access control reports to identify potential risks. Maintain up-to-date knowledge of identity and access management best practices. Required Technical and Professional Expertise Minimum 5+ years of experience working within an IAM capacity, at least 2 years in a seniorlevel capacity Bachelors degree in computer science, information technology, or a related field or equivalent experience Strong analytical skills Good organizational skills and attention to detail Experience with modern Identity and Access Management concepts Hands-on experience with Role Based Access Control (RBAC), Privileged Access Management (PAM), and Segregation of Duties Subject Matter Expert with Active Directory, Entra ID, and Okta to include IAM-related features (user and group management, file share permissions, federation) Proficient in authentication, authorization, and auto-provisioning services, including Active Directory, Amazon Web Services, SSO, SAML, OAuth, and OpenID Understanding of standard integration protocols, APIs, and connectors Familiarity and practical experience in Agile methodology Strong written and verbal communication skills needed; ability to tailor approach based upon audience and message Familiarity with database concepts and relational databases, such as Microsoft SQL Server Preferred Technical Skills Security domain knowledge Knowledge of IT operations, infrastructure services support (Systems NT, UX, Storage, Backups, DB s or Network management), security incident and security processes Understanding of ITSM/ITIL processes Detailed knowledge and working experience with Privileged Access Management (PAM) SaaS environments Experience in programming (Perl, Python, PowerShell, Administrative scripting) Experience with dashboards and reporting programming (PowerQuery, PowerBI, ServiceNow Reporting) Understanding of high-availability (HA) and failover implementations for network infrastructure and server systems What You Will Do Design, develop and manage IAM solutions based on best of bread IAM platforms Develop and maintain identity lifecycle workflows and identity mappings Provide subject matter expertise for customer IAM infrastructure not limited to: Single SignOn, access management, identity federation, multifactor authentication (MFA), risk-based authentication (RBA) Support customer business groups to efficiently integrate with IAM platforms and services. Good knowledge of directory servers and LDAP protocol technologies (Active Directory) At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We re committed to fostering an inclusive environment where everyone can thrive. Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .

Posted 1 week ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

Gurugram

Work from Office

Job Description: ~3-5 years of experience. o Technical Skill Set - The successful candidate will need to demonstrate proficiency in one or more of the following verticals: o 1. Identity & Access Governance Enterprise Suites, Capabilities, Services and Processes (e.g. RSA Identity Governance & Lifecycle / SailPoint IdentityIQ) o 2. Privileged Account Management (PAM) Enterprise Suites, Capabilities, Services and Processes (e.g. CyberArk / Beyond Trust / Delinea / Arcon / Centrify / Thycotic) o First level knowledge and/or demonstrated technical ability to understand code and technology infrastructure in multiple environments with experience in the below languages [Powershell, Python, Java, SQL, Regular expressions-based programming] Soft Skill Set - o Good communication & Management skills. Working shift -> Afternoon Shift 2:00 PM to 10:30 PM At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We re committed to fostering an inclusive environment where everyone can thrive. Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .

Posted 1 week ago

Apply

4.0 - 9.0 years

6 - 11 Lacs

Bengaluru

Work from Office

Job Description: Key Responsibilities Multi-Cloud Log Ingestion & Analysis Write Python code to fetch and normalize logs via AWS/Azure/GCP APIs (e.g., S3, Storage Queues, Pub/Sub) Parse, cleanse, and aggregate diverse log types (DNS, proxy, Orca, Uptycs, NSG flow logs, etc.) Identify data quality issues, annotate metadata, and document remediation steps Interactive Visualization Build reusable Plotly Dash components (heatmaps, time-series, geospatial maps) that allow security teams to drill into anomalies Annotate key events and embed insights for non-technical stakeholders Infrastructure as Code Develop Terraform modules to provision logging infrastructure in AWS (S3, Kinesis), Azure (Storage Accounts, Log Analytics), and GCP (Cloud Storage, Pub/Sub) Configure remote state backends with locking and integrate secrets in secure stores (Key Vault, Secrets Manager) Configuration Automation (Nice to have) Create Ansible roles/playbooks to provision and configure Ubuntu (or container) environments, install dependencies, deploy code, and run analyses Securely manage service principal or IAM credentials via Ansible Vault or environment variables Security Best Practices Apply least-privilege principles when assigning IAM/RBAC roles Understand threat models for log data streams (e.g., log injection, tampering, retention) and recommend hardening measures Collaborate with Ops to tune alert thresholds and response workflows Required Qualifications 4+ years professional Python development experience Demonstrated ability to work with AWS, Azure, and GCP SDKs/APIs for storage, messaging, and compute Strong Plotly or similar interactive visualization skills Proven Terraform expertise across at least two cloud providers, with remote state and secret management Experience parsing and making sense of security logs (e.g., DNS queries, proxy logs, NSG flows, Orca/Uptycs outputs) Familiarity with security concepts and best practices (RBAC, least privilege, log integrity, etc.) Comfortable with Git-based workflows and CI/CD pipelines Preferred Qualifications Prior experience building security or SIEM dashboards Containerization (Docker) and orchestration (Kubernetes/EKS, etc) skills Hands-on with monitoring/alerting tools (Prometheus, Grafana, etc) Familiarity with mocking and testing frameworks (pytest, moto, etc) Bachelor s degree in Computer Science, Engineering, or related field (or equivalent experience) At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We re committed to fostering an inclusive environment where everyone can thrive. Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .

Posted 1 week ago

Apply

4.0 - 7.0 years

6 - 9 Lacs

Bengaluru

Work from Office

Job Description: CyberArk Engineer Detailed knowledge and working experience with: Design, Implementation & Deployment of CyberArk on Premise and SaaS Environments - Assessing and troubleshooting CyberArk and other PAM solution installations - Assisting in the daily operations of CyberArk and other PAM solutions - Execution of daily tasks, support tickets, and provisioning tasks as assigned or routed via the ticketing system - Applies knowledge, skills and abilities to implement a process or procedure, timely and professionally. - Responsible for Privileged User account administration of various Windows and UNIX accounts using CyberArk components. - Integrating various platforms with CyberArk, such as different LDAP providers, Windows servers, UNIX servers, Databases and networking Devices. - Creating and Managing Safes, Platforms and Owners. - Central Policy Manager (CPM) policies management or redistribution. - Perform health check monitoring on all CyberArk severs to ensure consistent availability of the system to end-user. - Ability to document installation procedures, Standard Operating Procedures (SOP), etc. - Extensive experience with digital password vaulting solutions - Experience in programming (Perl, Python, PowerShell, Administrative scripting) a plus - Basic understanding of high-availability (HA) and failover implementations for network infrastructure and server systems - Providing an overview of CyberArk and equivalent Privileged Access Management solution capabilities - CPM Plugins and PSM connector Build and Customization skills - Communicates project status and escalates issues as needed. - Execution of project tasks during engagement activities - Works on special projects as assigned. Education (degree) and professional experience required: University Degree in Computer Science, Computer Engineering, Electronics/ Electrical Engineering or equivalent Other requirements: Fluent in English language CyberArk Certifications (Defender/Sentry) CDE Certification CPC certification preferable At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We re committed to fostering an inclusive environment where everyone can thrive. Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .

Posted 1 week ago

Apply

4.0 - 7.0 years

6 - 9 Lacs

Bengaluru

Work from Office

Job Description: Installing windows system , Linux systems Strong expertise in installing Linux & Windows systems, and using terminals to perform all kind of administrative tasks, including file manipulation, package installation, and user management. Configuring the VMs, DNS, Post deployment/migration of windows/Linux systems DXC has expertise in configuring the VMs settings , VM tools & setting up DNS service. Expert knowledge working around configurinhg Cyberark for Linux environment Strong experience with secure installation, configuring and troubleshooting issues to deploy CyberArk for Linux environment, including providing some best practices to create reconciliation accounts on Linux servers. Expert skills in Installing Linux components Strong experience in navigating the systems components, directories and filing system, manipulating files in the Linux shell, user permission configuration, package installation and software management, ability to identify and apply different filesystem types. Expert knowledge in working around Hyperscalars AWS, GCP, Azure Deep knowledge and experience in migrating, transforming workloads, and managing public cloud environments for our customers. Expert knowledge in configuring the roles and mapping the roles in Hyperscalars and Linux environments Setting up and configure users, groups, roles and permissions effectively, administrators can optimize system resources while safeguarding sensitive data. Expert knowledge in configuring the Hyperscalars policy Building, configuring, and following best practices policies on all the Hyperscalers. Deep Understanding around Hyperscalar Tenant, Admin Unit, Management group configurations Strong experience in building, onboarding and managing Hyperscaler Tenant, Admin Unit (Resource Groups), Management group configurations, optimization and cost management. Deep Understanding around Hyperscalars applications and toolsets Strong experience in delivering cloud native IaaS & PaaS services along with supporting tools for foundational services (vulnerability management, Firewalls, Monitoring, event management, policies etc.) At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We re committed to fostering an inclusive environment where everyone can thrive. Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .

Posted 1 week ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Noida

Work from Office

[{"Remote_Job":false , "Posting_Title":"IT Compliance and Security Analyst" , "Is_Locked":false , "City":"Noida" , "Industry":"IT Services","Job_Description":" Greetings from SDG!! SDG is a global cybersecurity, identity governance, risk consulting, and advisory company that advises and partners with clients to address their complex security, compliance, and technology needs and delivers on strategy, transformation, and long-term management of their cybersecurity and IAM programs. We help some of the largest brands in the world realize their business vision through a mix of strategic advice, expert systems integration, relevant technology recommendations, and smart managed services. Our value proposition to our customers is that we bring thought leadership to the table in each of our domains, a passion for customer success, and an eye to risk management in everything we do. We are looking for you to join our SDG family!! Job Summary: The IT Compliance and Security Analyst is responsible for ensuringthe organization\u2019s IT infrastructure, policies, and processes comply withregulatory and industry security standards. This role involves conducting riskassessments, managing audits, enforcing security policies, and mitigatingpotential vulnerabilities to protect organizational assets. Key Responsibilities: 1. IT Compliance & Risk Management Ensure adherence to IT security compliance frameworks such as SOC 2, ISO 27001, NIST, HIPAA, GDPR, and PCI-DSS. Conduct risk assessments and gap analyses to identify compliance risks and recommend mitigation strategies. Assist in the development, implementation, and maintenance of IT security policies and procedures. Stay updated on evolving compliance regulations and security best practices. 2. Security Monitoring & Incident Response Review security alerts and investigate potential threats or incidents. Support incident response activities, including forensic analysis, reporting, and mitigation plans. Work with IT teams to ensure security controls are implemented and maintained effectively. 3. Audit & Documentation Own internal and external security audits from IT perspective, including evidence collection and audit coordination and track to closure. Maintain records and documentation related to security controls, compliance reports, and risk assessments. Liaise with stakeholders and follow up diligently until issues are fully resolved or mitigated. Take a 360-degree approach to identifying and prioritizing required evidence, ensuring it is provided correctly the first time (FTR \u2013 First Time Right). Ensure all compliance tasks are completed on time and tracked properly, preventing any delays or breaches that could lead to non-compliance. Track audit findings and ensure timely remediation of identified gaps. Conduct rigorous follow-ups on all ongoing tasks, ensuring nothing is overlooked and providing timely updates to the respective stakeholders. 4. Security Awareness &Training Conduct compliance awareness training programs for employees. Educate teams on compliance best practices, requirements. 5. Vendor & Third-PartyCompliance Assess third-party vendors for compliance risks. Ensure vendor contracts align with IT security policies and regulatory requirements. Technical understanding of IT infrastructure-related compliances ensures adherence to compliance standards and all processes. Requirements Required Qualifications & Skills: Bachelor\u2019s degree in information security, IT, Computer Science, or a related field. 5+ years of experience in IT compliance, risk management, or audit functions. Able to discuss past role(s) to demonstrate capabilities for this role. Knowledge of security frameworks such as ISO 27001, SOC 2, NIST, GDPR, HIPAA, or PCI-DSS. Experience with IT governance, risk assessment, and regulatory compliance. Strong analytical, problem-solving, and communication skills. Certifications such as CISA, CEH, or Security+ are a plus. Preferred Skills: Familiarity with security tools such as SIEM, vulnerability scanners, patch management, and endpoint protection Experience in cloud security compliance (AWS, Azure, GCP). Understanding of Data Loss Prevention (DLP) and Identity & Access Management (IAM). Ability to work collaboratively with IT, Legal, and business teams. Benefits Amazing People Amazing Customers Career growth Supports lifelong learning Opportunity to work on new technologies Flexible work environment Work-Life Balance Employee Centric Supportive Leadership Team Start-up environment in an established company of over 25 years. ","Job_Type":"Full time","Job_Opening_Name":"IT Compliance and Security Analyst","State":"Uttar Pradesh" , "Currency":"INR" , "Country":"India" , "Zip_Code":"201301" , "id":"35682000009343011" , "Publish":true , "Date_Opened":"2025-06-23" , "Keep_on_Career_Site":false}]

Posted 1 week ago

Apply

4.0 - 9.0 years

6 - 11 Lacs

Bengaluru

Work from Office

Job Description: Essential Job Functions: Support security assessments, audits, and vulnerability scans, contributing to report generation and action items. Monitor security events and incidents, escalating as required and assisting in containment. Assist with the implementation of security policies and standards. Collaborate with the security team on documentation and process improvement. Participate in incident response activities, including investigations and reporting. Stay informed about emerging security threats and best practices. Contribute to security awareness training efforts. Seek opportunities for professional development in the security field. Basic Qualifications: Bachelors degree in a relevant field or equivalent combination of education and experience Typically, 4+ years of relevant work experience in industry, with a minimum of 1+ years in a similar role Proven experience in information security analysis Proficiencies in security technologies and risk assessment A continuous learner that stays abreast with industry knowledge and technology Other Qualifications: Advanced degree in a relevant field is a plus Relevant certifications such as CompTIA Security+, CEH, or equivalent are a plus At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We re committed to fostering an inclusive environment where everyone can thrive. Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .

Posted 1 week ago

Apply

4.0 - 7.0 years

6 - 9 Lacs

Bengaluru

Work from Office

Job Description: Job Description (JD) -- BeyondTrust PAM Architect with experience in both On-Premise and SaaS environments, covering components like PRA (Privileged Remote Access), Password Safe, and Workforce Password Management (WPM). BeyondTrust PAM Architect to lead the design, implementation, and optimization of Privileged Access Management (PAM) solutions. The ideal candidate will have deep expertise in BeyondTrust components including PRA, Password Safe, and WPM, with a strong background in both on-premise and SaaS deployments. Key Responsibilities: Architect and implement BeyondTrust PAM solutions including PRA, Password Safe, and WPM. Design scalable PAM architectures for hybrid environments (on-premise, cloud, and SaaS). Lead requirement gathering sessions and translate business needs into technical solutions. Integrate PAM with enterprise systems such as Active Directory, cloud platforms (AWS, Azure, GCP), and network devices. Configure and manage BeyondTrust components like Vault, Resource Broker, Application Servers, and Session Monitoring. Define and enforce privileged access policies, RBAC, and session recording. Provide technical leadership and mentorship to implementation teams. Ensure compliance with security standards and regulatory requirements. Troubleshoot and resolve PAM-related issues in production environments. Preferred Qualifications: BeyondTrust certifications (e.g., BeyondTrust Certified Implementation Engineer). Experience with other PAM tools (CyberArk, Delinea, Arcon) is a plus. Knowledge of compliance frameworks (ISO 27001, NIST, GDPR, etc.). At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We re committed to fostering an inclusive environment where everyone can thrive. Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .

Posted 1 week ago

Apply

1.0 - 6.0 years

3 - 8 Lacs

Gurugram

Work from Office

[{"Salary":"25 - 30 L" , "Remote_Job":false , "Posting_Title":"SOC Information Security Engineer I" , "Is_Locked":false , "City":"Gurugram" , "Industry":"IT Services","Job_Description":" Information Security Engineer I This role ispart of NCRs Global Information Security team. This team is responsible fordeveloping and implementing NCRs corporate information security program. Theprimary goal of the program is to protect the confidentiality, integrity, andavailability of information resources. Key information security functions andactivities include architecture and design for NCR information securitycontrols, developing and enforcing policies and standards, security awarenesstraining, risk management, assessment, and testing, monitoring and metrics,incident management, and threat and vulnerability management. The InformationSecurity Engineer I shall be responsible for the day-to-day activities requiredto respond for both routine and high severity incidents and vulnerabilitiesidentified. The Information Security Engineer I shall work in a collaborativemanner with incident responders, key incident management team members, management,and other stakeholders to ensure security incidents are contained, eradicated,remediated and after-action review is held according to corporatepolicy. The Information Security Engineer I shall work in a collaborativemanner with vulnerability coordinators and remediation team to make sure thevulnerabilities are remediated with patching and compensating controls. The InformationSecurity Engineer I is expected to contribute to weekly status calls and is On-Callwhich includes working off hours/weekends and respond to ad-hoc requests aspart of this position. The Information Security Engineer I will work withstakeholders and team members to assist with improving incident responseprocesses that are aligned with the mission of the office of the CISO. Key Responsibilities As an active member of the team, monitor and process response for security events on a 24x7 basis. Perform initial triage, analysis and respond to a security Incident Escalate incidents based on Severity and established protocols Document security incidents and investigation thoroughly Leverage automation and orchestration solutions to automate repetitive tasks. Work alongside other security team members to hunt for and identify security issues generated from the network, including third-party relationships. Coordinate incident response activities across multiple independently managed environments and security teams. Leverage knowledge in multiple security disciplines, such as Windows, Unix, Linux, data loss prevention (DLP), endpoint controls, Public Cloud, and networking, to offer global solutions for a complex heterogeneous environment. Utilize multiple security/threat intelligence tools and resources to understand threats. Analyze and respond to minor and major incidents, reported SPAM and Phishing e-mails. Partner with the detection engineering team to improve tool usage and workflow, as well as with the advanced threats and assessment team to mature monitoring and response capabilities. Support 24/7 operations Perform other duties as assigned Skills and Qualifications Strong knowledge of network, backend systems, operating systems, applications, and web services in a manner that allows for the interaction of all as it relates to security and services. 1+ Years as an incident responder Ability to apply analytical expertise and critical thinking to security incidents Ability to assimilate, understand and utilize various security technologies Ability to collaborate within a geographically distributed team of Incident Response Analysts Demonstrated team or functional leadership experience Experience processing and analyzing intelligence in support of management decision making Current Information Security related certification preferred. Current Public cloud related certification preferred. Knowledge of relevant information security and incident response frameworks such as NIST Cyber Security Framework, MITRE ATT&CK Framework. Strong communication skills and ability to work in a collaborative atmosphere Strong attention to detail Ability to deal with ambiguity and translate high level objectives into detailed tasks Ability to prioritize work with multiple, simultaneous work assignments. Ability and willingness to learn new tools and processes. Experience documenting business processes or technical procedures preferred. ","Job_Type":"Full time","Job_Opening_Name":"SOC Information Security Engineer I" , "State":"Haryana" , "Currency":"INR" , "Country":"India" , "Zip_Code":"-" , "id":"160617000004288001" , "Publish":true , "Date_Opened":"2025-07-14" , "Keep_on_Career_Site":false}]

Posted 1 week ago

Apply

5.0 - 8.0 years

7 - 10 Lacs

Bengaluru

Work from Office

Job Description: PKI (ADCS) Deliver PKI support services including client interaction, and interaction with offshore teams Support business and technology strategy and planning by leveraging knowledge in both technical and business areas Candidate should be knowledgeable & Experienced in key IAM/PKI concepts & skills listed below: ADCS, MPKI - Digicert/Entrust Microsoft Certificate Services Windows 20xx Server/Linux Microsoft Active Directory (Including Active Directory Certification Services) GPOs (Global Policy Objects) +C5Domain membership and authentication Internet Information Service (IIS) Knowledge of DNS Server hardening & security9. Secure key wrapping, backup, replication, and recovery, Key loading & unloading Data Protection/Security Techniques and Methodologies (e.g. HSM, Certificates) Basic knowledge on scripting by using python or PowerShell Certificate Life Cycle Management Design & Deployment of HSM experience is added advantage At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We re committed to fostering an inclusive environment where everyone can thrive. Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .

Posted 1 week ago

Apply

10.0 - 12.0 years

30 - 35 Lacs

Pune

Work from Office

Lead Information Security Engineer-2 Overview The Business Security Enablement (BSE) team is looking for a Lead Security Engineer to join our team in support of the Transfer Solutions program and working out of our Pune office in India. The Business Security Enablement guild is a worldwide team of information security experts focused on helping Mastercard achieve its goals by ensuring security is at the heart of everything we do. The ideal candidate needs a high level of expertise in information security and secure engineering disciplines to advise product and operational teams on how to securely design applications and services following industry best practices. The Role As the Program Security Engineer, you will report to the Business Security Officer, you will be relied upon to serve as a technical security expert supporting the development and sustainability of secure programs, products, and practices. You will be the subject matter expert in application security delivering tactical mentorship and strategic consulting in terms of building a security-focused culture, secure development best practices, and application security awareness as well as contextualizing the threat landscape and associated risks for the Program. Active and critical participant in the design and implementation of the various program initiatives including the integration and migrations. Advise team on the implementation of MA Standards & Security Engineering principles. Proactively work to find solutions that align with business needs while operating within Mastercard s risk tolerance that is scalable and can be applied across multiple programs and platforms. This requires the ability to collaborate with cross-functional teams and regularly articulate and communicate to diverse audiences and properly translate security and risk management terminology into business terms and recommend alternative solutions to these stakeholders. Responsible for all project documentation, including maintaining technical documents and business requirements Maintaining an understanding of security policies and regulatory compliance (i.e. ISO,PCI, GDPR etc.) Strong communication skills and technical skills with the ability to communicate between business and technical teams Responsible for understanding security policies and industry best practices & compliance Responsible for reviewing and providing feedback to management for improvements to front line metrics to ensure controls are being met as defined

Posted 1 week ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Gurugram

Work from Office

Job Description: o 1 resource with 5+ years of experience. Skill Set 1 -> Responsibilities for Cloud Container Security. Analyze, enhance and support Container Security tools and platforms that provide capabilities for security. Collaborate with multiple stakeholders and partners across Engineering and Operations teams and partner with teams in the wider organization across different time zones. Furthermore, you design security concepts for the platform and support in automation and provisioning of secure container solutions. Collaborate/Develop IR process for Container workload. Respond to security alerts generated by containers security platform. AWS knowledge with experience in EKS Container Security PaloAlto (Prisma) cloud experience is preferred. Responsibilities for Incident Response. Analysis of security events/alerts and investigations of phishing emails, Respond to security alerts in SIEM Create documentation/SOP/Run Books for responding to security alerts. o 1 resource with 3+ years of experience. Skill Set 2 -> Responsibilities for Incident Response. Responsible for effectively planning, designing, implementing and monitoring security technologies and projects that support firms underlying security policies and procedure. Design ,document and implement appropriate security polices and standards that protect firms information assets. Responsible for implementation, validation and reporting, technical documentation, operation support and reference documentation. Review, analyze and respond to security events triggered through automated security monitoring systems. Validate and track security breaches, along with threats to the firms logical information, while still allowing for appropriate access. Coordinate responses to information security incidents. Work to reduce information security risks by effectively administering the information security processes across the vulnerability scanning, anomaly detection, intrusion detection, security policy and forensic functions. Performs complex and advanced troubleshooting. SME ensures the firm receives expected security and business value by establishing operational support procedures, troubleshooting strategies, training team members for consistent performance. Responsibilities for Incident Response. Analysis of security events/alerts and investigations of phishing emails, Respond to security alerts in SIEM Create documentation/SOP/Run Books for responding to security alerts. o Preferred Qualifications: Certifications preferred: Security+, Network+ or any equivalent/higher security certifications. Broad hands-on knowledge of firewalls, intrusions detection/prevention systems, anti-virus software, data encryption and other industry-standard techniques and practices. Very good understanding of security controls, monitoring systems and regulatory/business drivers that impact security policies and practices. o Working shift -> Rotational shift including Nightshift. At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We re committed to fostering an inclusive environment where everyone can thrive. Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .

Posted 1 week ago

Apply

4.0 - 7.0 years

6 - 9 Lacs

Belgaum

Work from Office

Hitesh Dharmdasani, Director - Technical Hitesh has completed his Master of Science in Information Security and Assurance from George Mason University, Fairfax, Virginia and a Bachelors of Engineering in Computer Science from KLS Gogte Insitute of Technology, Belgaum. He is an active member of the Centre for Evidence-based Security Research (CESR) and is passionate towards the intersection of Computer Security, Economics of Cybercrime and Machine Learning. He was previously a part of FireEye as a Security Researcher, specializing in researching new threats and reverse engineering the process of malware detection for better security. In January 2015, he founded a company called Informant Networks, that focusses on Network Security related problems, specially internal security threats. He joined the SSSPL team in 2018 and has been the driving force behind the research and development for improved solutions and the best in class technology exposure. Hitesh Dharmdasani, Director - Technical Hitesh has completed his Master of Science in Information Security and Assurance from George Mason University, Fairfax, Virginia and a Bachelors of Engineering in Computer Science from KLS Gogte Insitute of Technology, Belgaum. He is an active member of the Centre for Evidence-based Security Research (CESR) and is passionate towards the intersection of Computer Security, Economics of Cybercrime and Machine Learning. He was previously a part of FireEye as a Security Researcher, specializing in researching new threats and reverse engineering the process of malware detection for better security. In January 2015, he founded a company called Informant Networks, that focusses on Network Security related problems, specially internal security threats. He joined the SSSPL team in 2018 and has been the driving force behind the research and development for improved solutions and the best in class technology exposure. Hitesh Dharmdasani, Director - Technical Hitesh has completed his Master of Science in Information Security and Assurance from George Mason University, Fairfax, Virginia and a Bachelors of Engineering in Computer Science from KLS Gogte Insitute of Technology, Belgaum. He is an active member of the Centre for Evidence-based Security Research (CESR) and is passionate towards the intersection of Computer Security, Economics of Cybercrime and Machine Learning. He was previously a part of FireEye as a Security Researcher, specializing in researching new threats and reverse engineering the process of malware detection for better security. In January 2015, he founded a company called Informant Networks, that focusses on Network Security related problems, specially internal security threats. He joined the SSSPL team in 2018 and has been the driving force behind the research and development for improved solutions and the best in class technology exposure. Hitesh Dharmdasani, Director - Technical Hitesh has completed his Master of Science in Information Security and Assurance from George Mason University, Fairfax, Virginia and a Bachelors of Engineering in Computer Science from KLS Gogte Insitute of Technology, Belgaum. He is an active member of the Centre for Evidence-based Security Research (CESR) and is passionate towards the intersection of Computer Security, Economics of Cybercrime and Machine Learning. He was previously a part of FireEye as a Security Researcher, specializing in researching new threats and reverse engineering the process of malware detection for better security. In January 2015, he founded a company called Informant Networks, that focusses on Network Security related problems, specially internal security threats. He joined the SSSPL team in 2018 and has been the driving force behind the research and development for improved solutions and the best in class technology exposure. Hitesh Dharmdasani, Director - Technical Hitesh has completed his Master of Science in Information Security and Assurance from George Mason University, Fairfax, Virginia and a Bachelors of Engineering in Computer Science from KLS Gogte Insitute of Technology, Belgaum. He is an active member of the Centre for Evidence-based Security Research (CESR) and is passionate towards the intersection of Computer Security, Economics of Cybercrime and Machine Learning. He was previously a part of FireEye as a Security Researcher, specializing in researching new threats and reverse engineering the process of malware detection for better security. In January 2015, he founded a company called Informant Networks, that focusses on Network Security related problems, specially internal security threats. He joined the SSSPL team in 2018 and has been the driving force behind the research and development for improved solutions and the best in class technology exposure. Hitesh Dharmdasani, Director - Technical Hitesh has completed his Master of Science in Information Security and Assurance from George Mason University, Fairfax, Virginia and a Bachelors of Engineering in Computer Science from KLS Gogte Insitute of Technology, Belgaum. He is an active member of the Centre for Evidence-based Security Research (CESR) and is passionate towards the intersection of Computer Security, Economics of Cybercrime and Machine Learning. He was previously a part of FireEye as a Security Researcher, specializing in researching new threats and reverse engineering the process of malware detection for better security. In January 2015, he founded a company called Informant Networks, that focusses on Network Security related problems, specially internal security threats. He joined the SSSPL team in 2018 and has been the driving force behind the research and development for improved solutions and the best in class technology exposure. prev next AnexGATE AnexGATE is the Network Security and Secure Connectivity family of appliances that provides High-End Network Infrastructure Solutions for all major Industry Verticals with some unique and very advanced features like 100% internet up time using multi-link failover and Bandwidth Aggregation. visit website AnexTECH AnexTECH is our Electronic Equipment Manufacturing division that creates high-performance devices under high-quality standards. One of the latest product entirely designed and developed in India is our AnexVM - Volumetric Weighing Machine. visit website AnexSECURE AnexSECURE is our surveillance systems solutions division that provides intelligent and integrated solutions with CCTV, Access Control, Fire Alarm, etc. Also caters to Video Analytics based intelligent cloud-based monitoring and surveillance solutions for all major Industry Verticals visit website SSSPLs state-of-the-art RMA centers and proof-of-concept labs include a skill set of highly motivated professionals who are capable of handling prompt service requirements of our customers. Providing the best services is the result of having the best partners. At SSSPL we believe that growth is fuelled by strong partners and we are committed to building long-term, mutually sustaining relationships with our partners. We provide our channel partners access to an exceptional suite of benefits that support them throughout their business cycle. We offer our partners business enablement support, marketing and sales support, solution development and technical support , partner networking, secured partner portal and partner communication, in addition to the high quality product and services which are delivered over our sophisticated network with extensive access to our product roadmap information. From MDs Desk, Rahul Gupta,, Managing-Director It has always been my dream to develop and provide locally manufactured International Class solutions from India. Over the years, I have realized that instead of talking about Hardware and Software, we need to develop special APPLIANCES to meet specific customer needs. We have always been driven by solutions based approach and this company SSSPL was a major step towards achieving these goals. We will always continue to develop solutions that simplify processes and create a sustainable work environment.

Posted 1 week ago

Apply

10.0 - 15.0 years

30 - 35 Lacs

Bengaluru

Work from Office

Greenlight is the leading family fintech company on a mission to help parents raise financially smart kids. We proudly serve more than 6 million parents and kids with our award-winning banking app for families. With Greenlight, parents can automate allowance, manage chores, set flexible spend controls, and invest for their family s future. Kids and teens learn to earn, save, spend wisely, and invest. At Greenlight, we believe every child should have the opportunity to become financially healthy and happy. It s no small task, and that s why we leap out of bed every morning to come to work. Because creating a better, brighter future for the next generation depends on it. We are looking to hire a Staff Product and Application Security Engineer to lead us in designing and building security into software application services, in an exciting and agile cloud-native, mobile-first, Kubernetes-based microservices environment. Your work will ensure that Greenlight s products remain safe against advanced threats, honor the privacy rights of our users, and satisfy several fintech compliance regimes. Cyber threats have proven to be highly capable of compromising best practice security, therefore, we will rely on you to blaze a cutting edge trail so we can stay ahead of the curve. What you will be doing: Implement and maintain DevSecOps tools, including Static Application Security Testing (SAST), Software Composition Analysis (SCA), and secret scanning. Execute and refine security testing protocols, including penetration testing, Dynamic Application Security Testing (DAST), API security testing, web testing, and mobile testing. Automate high-fidelity end-to-end (E2E) testing for all API changes before production deployment. Integrate with existing engineering processes. Lead Product Security Incident Response Teams (PSIRT) playbook, mature detection and response rules, and actively neutralize against product security threats (such as Account Takeover, API abuse, etc). Lead and execute threat modeling exercises across varying scope of the organization. Identify security gaps and control recommendations, including client and server-side controls. Design, review, and manage security controls, including user registration, authentication/authorization, password management, account takeover protection, and application layer threat detection. Enhance security tool accuracy and oversee vendor/open-source proof-of-concepts (PoVs). Evangelize and promote standardized application logging practices across the organization. Evaluate and provide strategic guidance on mitigating security risks efficiently. Contribute to various aspects of the Information Security Program, including data privacy, penetration testing, audit evidence production, security awareness training, and enterprise risk management. Guide engineers at all levels in designing and integrating security aspects into Greenlight s products, services, and software development lifecycle (SDLC). Evangelize security culture through security champion program and technical developer-focused security training. What you should bring: 10+ years of experience in application and product security with a strong software engineering foundation Expert understanding of mobile, web, cloud, container, and cryptographic technologies and security practices. Offensive security minded with in-depth knowledge of current and emerging cyber threats, testing procedures, and their mitigations. The ability to quickly and deeply learn new technology stacks and modern CI/CD pipelines, including Docker, Kubernetes, AWS, Kotlin, Node.js , Android, iOS, Swift, and gRPC. Strong independent critical thinking with the capability to form and defend opinions through knowledge sharing. Skillful in assessing and managing security risks with a pragmatic solution-first approach. Commitment to continuous improvement, ongoing education and knowledge sharing with peers. A humble, collaborative, and supportive approach to teamwork Relevant certifications (e.g OSCP, OSWE, GWAPT, GMOB, CISSP) are a plus. Greenlight is an equal opportunity employer and will not discriminate against any employee or applicant based on age, race, color, national origin, gender, gender identity or expression, sexual orientation, religion, physical or mental disability, medical condition (including pregnancy, childbirth, or a medical condition related to pregnancy or childbirth), genetic information, marital status, veteran status, or any other characteristic protected by federal, state or local law.

Posted 1 week ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Noida, Mumbai

Work from Office

Position:Network Administrator- Algorithmic Trading SystemsThe hours for this position are: 4:00 am ?? 1:30 pm ISTDuties & Responsibilities:Assist with monitoring, maintenance, and troubleshooting of performance, security, and stability issues in application, hardware, and network layers.Assist with the configuration/build-out of new deployments.Work with third-party vendors in establishing, monitoring, and troubleshooting external connectivity.Be hands-on for advanced networking activities and environmental continuity assurance.Specifically work to establish new third party connectivity implementations in managed datacenter locations.Work actively with the team in identifying system optimizations and new technologies and products to improve overall performance, efficiency, and resiliency of the infrastructure.Experience / Skills:5- 10 years?? experience and expert-level knowledge with networking, ideally financial securities-related, required as primary focus.Cisco CCNA network certification or verified specific experiential equivalent needed for this member of the team.Direct experience with LAN / WAN Network implementation, configuration and support required.Working knowledge of Information Security technologies such as IDS, IPS, VPNs, and firewalls will be needed.Knowledge of MPLS technologies and Network Management required.Experience with FIX protocol networking connectivity is preferable.Experience or exposure to configuring and troubleshooting RDS 2012 ?? 2019 preferred.Solid knowledge of Hyper-V networking aspects in 2012 R2 and 2019 preferred.ITIL certificate a plus, ITIL awareness required.Experience or exposure to Linux and cloud technologies preferably Amazon Web Services a plus.Experience in financial (preferably securities industry) a strongly desired plus excellent verbal and communication skills.Strong command of spoken and written English.Qualifications:This position requires candidates with exceptional technical, analytical and communication skills and provides ample opportunity for growth. Must be interested in joining the preeminent research and development team in the industry and working on cutting-edge technologies. Bachelor??s degree in scientific major is preferred.Location:The position is based in Noida or Mumbai and offers an attractive compensation and benefits package with ample opportunities for growth and learning. The firm is currently working remotely and plans to continue to do so as required by local government and for the safety of its employees.About the Firm:Tethys Technology, Inc. is an independent, broker-neutral provider of best execution algorithms TethysALGO and a trading platform TethysEMS. The firm has been a service provider to sophisticated quantitative buy-side market participants for more than a decade, providing best-in-class trading technology. Tethys?? U.S. equity algorithms and program trading products were launched in 2004 and the firm was first to market with options algorithms in 2007. Our clients include both buy-side and sell-side firms active in equities, options, futures and FX around the globe.The firm is an established industry leader in innovative algorithms and currently offers execution algorithms for the global trading of, equities, options, futures and FX trading. TethysEMS is a high-capacity, trade execution system our multi-asset EMS platform supports algorithmic trading, strategy-based algorithms, and risk management, as well as pre-trade, post-trade and real-time execution analytics.We are a fast-growing financial technology and algorithmic trading analytics firm with a presence in the Americas, Europe and Asia providing Algorithmic trading strategies, analysis and associated technology to premier global financial institutions. We are known for the excellence of our offering and innovation.Tethys Culture and BenefitsDue to Covid-19, we are predominantly working from home right now. We are actively interviewing, hiring and onboarding remotely.Tethys Culture:Tethys Employees are comprised of diverse cultural and ethnic backgrounds. The firm fosters a creative atmosphere focused on learning, collaboration and achievement. Although specific roles require specific skills, above all we??re looking for candidates who share our values:Intellectual Curiosity ?? getting to the bottom of problemsQuantitative Approach ?? to decision making and problem-solvingTeam Player ?? cooperative mindsetTethys BenefitsMedical insurance with cover for immediate familyCompetitive salary structure to maximize deductible benefitsRegular company recreational activities (office lunches, social events, etc)Competitive holiday and vacation benefitsTo apply:Send resume via email to careers@tethystech.com and in the subject line please include the title of the position. No calls, please.

Posted 1 week ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Gurugram

Work from Office

This role is part of NCRs Global Information Security team. This team isresponsible for developing and implementing NCRs corporate informationsecurity program. The primary goal of the program is to protect theconfidentiality, integrity, and availability of information resources. Keyinformation security functions and activities include architecture and designfor NCR information security controls, developing and enforcing policies andstandards, security awareness training, risk management, assessment, andtesting, monitoring and metrics, incident management, and threat andvulnerability management. Information Security Engineer III will be responsible foridentifying, analyzing, and mitigating vulnerabilities within our systems. Thisrole requires a deep understanding of vulnerability management tools,particularly Rapid7, and the ability to work closely with cross-functionalteams to ensure the security of our infrastructure. Key Responsibilities Vulnerability Assessment: Conduct regular vulnerability assessments using tools like Rapid7 to identify potential security risks. Analysis and Reporting: Analyze vulnerability data and generate detailed reports for stakeholders, highlighting critical issues and recommended remediation steps. Remediation and Prioritization: Prioritize and remediate security vulnerabilities Incident Response: Collaborate with the Incident Response team to address and mitigate vulnerabilities that could be exploited during security incidents. Patch Management: Work with IT and development teams to ensure timely application of security patches and updates. Security Best Practices: Develop and enforce security best practices and guidelines to minimize vulnerabilities. Training and Awareness: Provide training and awareness sessions for staff on vulnerability management and security practices. Documentation: Maintain comprehensive documentation of vulnerability management processes, findings, and remediation efforts. Continuous Improvement: Stay updated with the latest security trends, vulnerabilities, and threat intelligence to continuously improve the vulnerability management program. Qualifications: Bachelors degree in Computer Science, Information Security, or a related field. Minimum of 5 years of experience in vulnerability management or a related role. Proficiency in using vulnerability management tools, particularly Rapid7. Strong understanding of network protocols, operating systems, and security architectures. Experience with incident response and patch management processes. Excellent analytical and problem-solving skills. Strong communication skills, both written and verbal. Knowledge of relevant information security and incident response frameworks such as NIST Cyber Security Framework, MITRE ATT&CK Framework. Ability to deal with ambiguity and translate high level objectives into detailed tasks Ability to prioritize work with multiple, simultaneous work assignments. Ability and willingness to learn new tools and processes.

Posted 1 week ago

Apply

15.0 - 20.0 years

20 - 25 Lacs

Mumbai

Work from Office

Business Functions Technology and Operations (T&O) enables and empowers the bank with an efficient, nimble and resilient infrastructure through a strategic focus on productivity, quality & control, technology, people capability and innovation. In Group T&O, we manage the majority of the Banks operational processes and inspire to delight our business partners through our multiple banking delivery channels. Job Purpose The Head of Technology Central Functions plays a critical role in ensuring the effective and efficient operation of DBSs technology function. This leadership position requires a highly organized and detail-oriented individual with a strong understanding of technology governance, risk management, financial management, vendor management, and employee development. The successful candidate will be responsible for overseeing key central technology functions, driving strategic initiatives, and fostering a collaborative and high-performing team. Key Accountabilities Technology Governance: Lead and manage all aspects of Technology Governance activities. This includes among others: Preparation of comprehensive materials and presentations for key technology forums such as the IT Strategy Committee, IT Steering Committee, Technology Risk Forum, and Demand Forums. Ensuring effective communication and collaboration across different technology teams and stakeholders. Maintaining and improving existing governance frameworks and processes. Technology Risk Management: Proactively identify, assess, and mitigate technology risks across the organization. This includes among others: Developing and implementing a robust risk management framework aligned with industry best practices and regulatory requirements. Monitoring and reporting on key technology risks to senior management. Implementing appropriate control measures to minimize potential risks. Managing findings where Technology is impacted (across external and internal audits and reviews, and excluding IT Information Security) Scan regulatory requirements, circulars to ensure forward planning and execution for compliance. This includes Singapore and India regulatory requirements Contribute to overall Technology estate across DBS, Partners, external environment and to manage the disaster recovery/BCP/ quality of code for any impact on user/customer experience Technology Budget and Financial Management: Manage the technology budget effectively and efficiently, including both direct and indirect expenses. This includes among others: Developing and monitoring the annual technology budget. Tracking expenditures and ensuring adherence to budget constraints. Providing accurate and timely financial reporting. Technology Vendor Governance: Oversee the management of technology vendors, ensuring compliance with all relevant regulations and contractual obligations. This includes among others: Establishing and maintaining strong relationships with key technology vendors. Monitoring vendor performance and compliance. Managing vendor contracts and negotiations. Technology Employee Engagement and Skill Development: Foster a positive and engaged work environment within the technology team. This includes among others: Implementing initiatives to improve employee morale and engagement. Identifying and addressing skill gaps within the team. Developing and implementing training and development programs to enhance employee skills. Requirements Ideally, 15+ years of successful experience in Technology governance, Risk and financials. The more recent 5+ years should be in a well-established bank (Indian or Multinational) Education / Preferred Qualifications Minimum Computer Science or Technology Management graduate Core Competencies Strategic thinking Problem-solving Decision-making Good communication skills and ability to manage dialogues with seniors Collaboration across teams Leadership and drive Risk management Financial management

Posted 1 week ago

Apply

6.0 - 11.0 years

8 - 13 Lacs

Hyderabad

Work from Office

Manager, Cybersecurity Engineer The Opportunity Based in Hyderabad, join a global healthcare biopharma company and be part of a 130- year legacy of success backed by ethical integrity, forward momentum, and an inspiring mission to achieve new milestones in global healthcare. Be part of an organisation driven by digital technology and data-backed approaches that support a diversified portfolio of prescription medicines, vaccines, and animal health products. Drive innovation and execution excellence. Be a part of a team with passion for using data, analytics, and insights to drive decision-making, and which creates custom software, allowing us to tackle some of the worlds greatest health threats. Our Technology Centers focus on creating a space where teams can come together to deliver business solutions that save and improve lives. An integral part of our companys IT operating model, Tech Centers are globally distributed locations where each IT division has employees to enable our digital transformation journey and drive business outcomes. These locations, in addition to the other sites, are essential to supporting our business and strategy. A focused group of leaders in each Tech Center helps to ensure we can manage and improve each location, from investing in growth, success, and well-being of our people, to making sure colleagues from each IT division feel a sense of belonging to managing critical emergencies. And together, we must leverage the strength of our team to collaborate globally to optimize connections and share best practices across the Tech Centers. Role Overview As a Cybersecurity Engineer, you will be responsible for designing, implementing, and maintaining security measures to protect the organizations computer systems, networks, and data from cyber threats. This role will involve a combination of technologies, processes, and practices designed to safeguard data, applications, and networks from threats like malware, phishing, and data breaches. You will be tasked with identifying vulnerabilities, supporting the response to incidents, and ensuring that security protocols and controls are adhered to. Your role is vital in safeguarding critical assets and ensuring compliance with legal and regulatory standards. What will you do in this role: Contribute to the development of enhanced cloud and application security control integrations and architectural best practices. Contribute to the development and implementation of product security policies and standards to ensure that application, cloud services and infrastructure meet organizational security requirements. Help maintain and monitor security tools and dashboards, ensuring that applications deployed in our environments adhere to organizational security standards and compliance requirements. Identify and prioritize adoption of our security tools within other teams ensuring the inputs and outputs are fully integrated enabling a complete security function. Follow standard approaches and established design patterns to create new designs for systems or system components. Identify and resolve minor design issues. Assist in implementing and maintaining specific security controls as required by organisational policy and local risk assessments and contribute to identifying risks that arise from potential technical solution architectures. Monitor and log the actual service provided, compared to that required by service level agreements. Undertake low-complexity routine vulnerability assessments using automated and semi-automated tools and contribute to evaluating and documenting the scope of results. Design, implement, test, document, and support integration of security tools and technologies in pipelines, Also, assist the product teams in related activities. Assist in maintaining security infrastructure and performing system updates. Investigate minor security breaches in accordance with established procedures. Assist users in defining their access rights and privileges and perform non-standard operational security tasks. Resolve security events and operational security issues. Work closely with cross-functional Infrastructure teams on Automation and Orchestration. Create and document detailed designs for simple software applications or components. Apply agreed modelling techniques, standards, patterns, and tools. Work within a matrix organizational structure, reporting to both the functional manager and the project manager. What should you have: Bachelors degree in Information Technology, Computer Science or any Technology stream. 3+ years of hands-on experience working with network protocols, firewalls, intrusion detection systems, encryption technologies, and endpoint security solutions. Proficiency in security tools in the areas of cloud, application, endpoint, network or identity, vulnerability scanners, and malware analysis platforms. Understanding of OWASP Top security risks and mitigation strategies, relevant NIST standards, and Zero Trust principles. Working experience in cloud environments AWS must have and good to have Azure, or GCP. Familiarity with software development/delivery lifecycle and related technologies Familiarity with programming/scripting languages like Python, Bash, Terraform, Ansible, JSON, PowerShell, or JavaScript for automating tasks. Knowledge of authentication methods, identity management, and security access protocols (e.g., SSO, MFA, LDAP). Ideally AWS certified. Good interpersonal and communication skills (verbal and written). Relevant certifications (e.g., CISSP, CISM, CEH, CompTIA Security+) are often required or highly desirable. Proven record of delivering high-quality results. Product and customer-centric approach. Innovative thinking, experimental mindset. Our technology teams operate as business partners, proposing ideas and innovative solutions that enable new organizational capabilities. We collaborate internationally to deliver services and solutions that help everyone be more productive and enable innovation. Who we are: What we look for: #HYDIT2025 Current Employees apply HERE Current Contingent Workers apply HERE Search Firm Representatives Please Read Carefully Employee Status: Regular Relocation: VISA Sponsorship: Travel Requirements: Flexible Work Arrangements: Hybrid Shift: Valid Driving License: Hazardous Material(s): Required Skills: Design Applications, Information Security, Security Operations, SLA Management, Software Development, Software Development Life Cycle (SDLC), System Designs, Technical Advice, Vulnerability Scanning Preferred Skills: Job Posting End Date: 08/11/2025 *A job posting is effective until 11:59:59PM on the day BEFORE the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date.

Posted 1 week ago

Apply

4.0 - 9.0 years

20 - 25 Lacs

Noida, Gurugram, Coimbatore

Work from Office

Your role We are looking for an experienced Cloud Security Consultant/Lead/Architect with expertise in Azure /AWS to join our team with 4+ years of experience . If you are passionate about cloud security and have hands-on experience with CNAPP tools and Microsoft Azure environments, wed love to hear from you. Manage, update, and enhance security policies across various cloud assets in Microsoft Azure. Improve and optimize security configurations within CNAPP tools in alignment with the customers ISMS (Information Security Management System). Provide expert-level knowledge of Microsoft CNAPP, cloud security frameworks, and integration with SOC tools. Support cloud analysts in alert analysis, remediation planning, and incident response. Assist team leads in preparing weekly and monthly security reports. Ensure continuous monitoring and compliance using CSPM, CWPP, and CASB tools. Collaborate with cross-functional teams to maintain a secure cloud infrastructure. Maintain documentation and audit trails for security configurations and changes. Recommend and implement security best practices for cloud-native applications. Utilize Office 365 tools (Excel, Word, PowerPoint) for reporting and documentation. Your profile Azure/AWS Cloud Security CSPM (Cloud Security Posture Management) / CWPP(Cloud Workload Protection Platform) CASB (Cloud Access Security Broker) / Microsoft CNAPP(Cloud-Native Application Protection Platform) Integration withSOC Tools Cloud Security Monitoring & Reporting What you"ll love about working here You can shape yourcareerwith us. We offer a range of career paths and internal opportunities within Capgemini group. You will also get personalized career guidance from our leaders. You will get comprehensive wellness benefits including health checks, telemedicine, insurance with top-ups, elder care, partner coverage or new parent support via flexible work. At Capgemini, you can work on cutting-edge projectsin tech and engineering with industry leaders or createsolutionsto overcome societal and environmental challenges. Location - Coimbatore,Gurugram,Noida,Chennai,Mumbai,Pune,Hyderabad,Bengaluru

Posted 1 week ago

Apply

4.0 - 6.0 years

13 - 18 Lacs

Bengaluru

Work from Office

4 - 6 years of relevant experience supporting Information Security architecture and technologies in large enterprise networks. Architecture of large-scale network and application environments (including Internet-facing) Familiar with cloud infrastructure and related technologies Solid understanding of the TCP/IP protocol suite and related concepts and technologies and IPv6 Experience with router and multilayer switch technologies and products Experience with stateful firewall technologies and products, NextGen firewalls (e.g. Checkpoint, Juniper, Cisco, Palo Alto) and firewall management tools Experience with key security tools such as Antivirus, File Integrity Monitoring, Intrusion Detection/Prevention, Data Loss Prevention, Web Application Firewalls, Web Proxies, Web Content Filtering; DDoS defence. Solid experience with system engineering, installation and administration of *NIX-based and Windows-based operating systems, system hardening and troubleshooting Ability to support Incident Response processes Familiarity with major application protocols (HTTP, HTTPS, SMB, FTP/SFTP, SMTP, NTP, SNMP, VoIP protocols, etc.) Strong understanding of authentication and encryption technologies Primary Skills Experience with stateful firewall technologies and products, NextGen firewalls (e.g. Checkpoint, Juniper, Cisco, Palo Alto) and firewall management tools Experience with key security tools such as Antivirus, File Integrity Monitoring, Intrusion Detection/Prevention, Data Loss Prevention, Web Application Firewalls, Web Proxies, Web Content Filtering; DDoS defence. Solid experience with system engineering, installation and administration of *NIX-based and Windows-based operating systems, system hardening and troubleshooting Familiarity with major application protocols (HTTP, HTTPS, SMB, FTP/SFTP, SMTP, NTP, SNMP, VoIP protocols, etc.) Strong understanding of authentication and encryption technologies

Posted 1 week ago

Apply

4.0 - 8.0 years

5 - 9 Lacs

Pune

Work from Office

Your role This position is responsible for administering the Splunk platforms for enterprise Security Information and Event Management (SIEM). The role involves working with asset owners to ensure the timely and efficient collection of computer security events and logs for the purpose of detecting and responding to information security incidents. Maintain all components of a distributed SPLUNK infrastructure including indexer clusters, search head clusters, and deployment servers. Provide overall management of the SPLUNK platform. Standardize SPLUNK forwarder deployment, configuration, and maintenance across Unix and Windows platforms. Troubleshoot SPLUNK server and forwarder problems and issues. Assist internal users in designing and maintaining production-quality dashboards. Monitor the SPLUNK infrastructure for capacity planning. Implement change requests and engineering tasks. Lead technical discussions in customer governance calls. Participate in technical audits. Identify opportunities for automation, standardization, and stabilization. Prepare/update/review run books, SOPs, and knowledge articles. Plan, prepare, and execute change processes and implementations. Perform OS-level performance monitoring and troubleshooting. Monitor and troubleshoot application and database layers (e.g., Apache, Tomcat, MySQL). Administer and maintain a 24/7 highly available Splunk environment. Work closely with clients, technicians, and managerial staff. Experience with Databricks, Kafka, and NiFi is an added advantage. Your profile Splunk Administrator with 4 to 8 years experience Dashboards, reports creation and Monitoring Experience with Splunk Phantom as well, would be given preference Work location Bengaluru,Mumbai,Pune & Hyderabad What Youll Love About Working Here You can shape yourcareerwith us. We offer a range of career paths and internal opportunities within Capgemini group. You will also get personalized career guidance from our leaders. You will get comprehensive wellness benefits including health checks, telemedicine, insurance with top-ups, elder care, partner coverage or new parent support via flexible work. At Capgemini, you can work oncutting-edge projectsin tech and engineering with industry leaders or createsolutionsto overcome societal and environmental challenges.

Posted 1 week ago

Apply

4.0 - 9.0 years

7 - 11 Lacs

Hyderabad

Work from Office

Your role Monitor network security events and take action per security policy. Analyze incidents, raise tickets, and assign to resolver teams. Perform health checks of security tools and vulnerability assessments. Create and review daily/weekly/monthly dashboards and reports. Act as escalation point for L1/L2 analysts and backup for SOC Manager. Develop and fine-tune SIEM use cases. Participate in Change Control Board and infrastructure design reviews. Coordinate and implement security-related changes in line with policies. Identify and remediate rogue, unpatched, or unauthorized systems. Support incident response, maintain logs, and assist in investigations. Your profile SIEM ToolsIBM QRadar, ArcSight, RSA Envision, Nitro Security with 4 to 9 years of experience Vulnerability ManagementNessus, Qualys Guard Malware Protection & Anti-Spam Web Filtering, Content Filtering PKI, Forensic Analysis Work location Pan India and preferred location is Bengaluru What Youll Love About Working Here You can shape yourcareerwith us. We offer a range of career paths and internal opportunities within Capgemini group. You will also get personalized career guidance from our leaders. You will get comprehensive wellness benefits including health checks, telemedicine, insurance with top-ups, elder care, partner coverage or new parent support via flexible work. At Capgemini, you can work oncutting-edge projectsin tech and engineering with industry leaders or createsolutionsto overcome societal and environmental challenges.

Posted 1 week ago

Apply

2.0 - 4.0 years

11 - 16 Lacs

Bengaluru

Work from Office

Drafting and negotiating client contracts and data processing agreements; Performing risk assessments based on widely accepted industry standards; Adept in performing privacy impact assessments basis the agreed contractual requirements and applicable privacy laws; Ensure that company policies are in compliance with codes of practice such as BCRs; Devise training plans and provide data protection advice to staff members; Exposure to working on proactive pitches and data privacy and security related RFPs and developing collaterals to showcase capabilities via creation of compelling business cases; Promote a culture of data protection and compliance across all units of the organization. Knowledge and exposure to various country specific privacy laws/ regulations and privacy standards/framework; Knowledge of basic data protection/ information security standards, practices, and principles. Primary Skills 2 to 4 years of experience in Data Privacy/ Protection IAPP Certified DPDP Client Specific Project Data privacy & protection GDPR Data Processing Agreements Data Protection Impact Assessments Data Protection Risk Assessments Data Breach Reporting Binding Corporate Rule Data Subject Requests Secondary Skills Experience on Privacy tools like One Trust OR TrustArc Excellent verbal & written English communication

Posted 1 week ago

Apply

4.0 - 9.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Drafting and negotiating client contracts and data processing agreements. Performing risk assessments based on widely accepted industry standards. Ensure that company policies are in compliance with codes of practice such as BCRs Knowledge and exposure to various country specific privacy laws/ regulations and privacy standards/frameworks Knowledge of basic data protection/ information security standards, practices, and principles. Adept in performing privacy impact assessments basis the agreed contractual requirements and applicable privacy laws. Exposure to working on proactive pitches and data privacy and security related RFPs and developing collaterals to showcase capabilities via creation of compelling business cases Devise training plans and provide data protection advice to staff members Promote a culture of data protection and compliance across all units of the organization. Primary Skills 4 to 9 years core experience in Data Privacy/ Protection IAPP Certified Client Specific projects Data privacy DPDP Risk Advisory GDPR Data Processing agreements Data Protection Impact Assessments Data Protection Risk Assessments Data Breach Reporting Binding corporate rules Working on Privacy tool Secondary Skills Experience on Privacy tools like One Trust/ TrustArc prefers Excellent verbal & written communication skills

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies