Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
6.0 - 8.0 years
12 - 16 Lacs
Bengaluru
Work from Office
Environment: Key Skills: Java, Spring/Spring Boot, REST APIs, Microservices DataBase: SQL/NoSQL databases Cloud: CI/CD, cloud platforms (AWS/GCP/Azure) What you will do: Consistently delivers solid quality in both design and implementation and helps the team shape what is built how, in particular: Develops quality software (including effective test code) according to clean code principles and Blue Yonder standards. Provides input for the prioritization of issues in the backlog and autonomously pulls issues or supports other team members as appropriate. Participates in team activities such as backlog grooming, planning, daily stand-ups, and retrospectives. Translates business requirements to user stories and actively seeks feedback by the stakeholders. Takes the lead in designs of individual stories and translates the design to subtasks. Considers aspects of information security while coding and reviewing others code. Keeps up to date with technology and researches latest trends in the industry. Is perceived as the expert in a small area and is the go-to person for related implementational and operational issues. Raises operational concerns during design phases. Produces actionable user stories to relieve operational pain. Plans and performs more complex changes and manages stakeholder expectations. Independently resolves incidents, drives associated post-mortem analyses, and ensures outcome is actionable for the team. Strives to replace service requests with self-service functionality and automation. Understands cost structure of delivered services and makes cost data transparent to users. What we are looking for: B. tech graduate in computer or related field with 6-8 years of experience as Java Backend developer. Actively provides feedback during code reviews. Onboards new members to the team and helps develop junior engineers. Understands functional and technical requirements of software components. Participates in team hiring activities. Feeds larger refactoring opportunities into the teams backlog. Evolves the team s continuous integration pipeline and fixes broken builds. Performs benchmark analyses, identifies hot spots, and derives appropriate measures to improve performance. Demonstrates problem solving and innovation ability. Acts according to company and team visions and requires user stories to adhere to those visions. Has a deep understanding of their team s problem domain. Clearly understands and communicates the impact of changes in the team s deliverables on other teams and customers. Timely and proactively communicates impediments to commitments and helps others to overcome theirs.
Posted 2 weeks ago
3.0 - 5.0 years
5 - 7 Lacs
Guwahati
Work from Office
The primary objective of the Security & Loss Prevention coordinator is to ensure the protection of people & assets of Amazon s LM nodes in accordance with global Security guidelines and Policies The role is cross-functional and requires deep collaboration and influencing ability with stakeholders from business and corporate functions. To Assist Security Manager, in day to day activities, planning, sourcing and executing the process and procedure. The Security Coordinator along with Security Team works together to ensure and maintain high quality and timely support to the Operations of the organization 1. Security Operation Rationalization & Review of Guard Force Profiling of Guard Force Implementation & Follow-up of Security Plan Review of Post Site Instruction Reports Daily, Weekly, Monthly, Half yearly and Annual Security Team is ensuring that SLAs for all processes are being taken care of Ensure all posts are 4M & 5S compliant 2. Audits/Certifications Keeping the plans & SOPs updated Periodical Check of Documentation Preparation of Documents for Internal & External Audits 3. Process Improvement & Loss Prevention Program Process Review & Necessary Improvements Process Improvisation Quarterly Assessment Loss Prevention Report Loss Prevention Audits 4. Security System Ensure 95 % serviceability of all Systems Ensure 100% Training of all security guards Hygiene Status Report & Operational Effectiveness of Security gadgets. Preventive maintenance Schedule for all Security Gadgets & its Improvements Monthly Review Meeting with AMC Vendor and Updates New Projects & Completion report 5. Security Stores and Assets Maintenance of updated Assets list Maintenance Schedule of Assets & Security Gadgets Work with the Operations, HR and Safety team to ensure losses are controlled. Dive deep on the possible losses coming up and ensuring logical closure Liaise with local law enforcement for support if required Communicate and empower the guards to make them capable to arrest any anomalies at facility. Keep the shrink and loss below the thresh hold for positive deviation. Graduation with minimum 3 years of experience in the field of Security, Loss Prevention, Shrinkage, Asset Protection, Investigations, Inventory management. University degree level or equivalent through experience and professional certification. A minimum of 35 years in law enforcement or security-related profession. Extensive and up to date knowledge of security equipment and technology. Experience in managing or coordinating security investigations of complex nature. Knowledge of information security processes and systems. Experience in security auditing. Exposure to MNC culture and dynamics.
Posted 2 weeks ago
7.0 - 9.0 years
12 - 16 Lacs
Bengaluru
Work from Office
Manager - Technology Risk Assessment Team - Technology Risk & Compliance ,Compliance Location - Bangalore The PhonePe Technology Risk and Compliance team plays a critical role in the successful execution of the firm's compliance mission. The Tech Risk and Compliance function ensures the development and maintenance of a strong compliance culture by developing and maintaining program infrastructure that identifies, measures and monitors compliance with applicable laws, regulations and rules that govern our business globally. Compliance teams work closely with Engineering, SREs, business, legal and other functions to provide expertise on regulatory compliance matters; assess and measure compliance and related risks and monitor and test the adequacy of the firm's compliance control environment. Roles and Responsibilities: To review PhonePe products, processes and environment from the perspective of security, regulatory compliance and best practices. To conduct due diligence on new and existing technology implementations across business units at PhonePe. To provide support to internal departments in areas of compliance with regulatory bodies (i.e. RBI, NPCI, SEBI, IRDAI, UIDAI), and implementation of security related requirements from circulars issued by regulators. To collaborate with product/business/engineering teams to implement compliance plans to mitigate risks in the early stage of product development To create control frameworks in guidance of the team and conduct gap assessment against security practices, various regulatory guidelines and compliance requirements Must Haves: 7 to 9 years of relevant work experience, B. Tech Prior people management experience. Strong understanding of ITGC domains and business processes. Experience in managing audits and implementing cyber security controls, NIST, PCI DSS standards, ISMS etc., Certifications such as ISO 27001 / CISA / CISM / CISSP preferred. High ethical standards and are able to work diligently to complete your duties. Analytical mind able to see the complexities of procedures and regulations. Demonstrate the ability to plan and execute projects with minimal management support. PhonePe Full Time Employee Benefits (Not applicable for Intern or Contract Roles) Insurance Benefits - Medical Insurance, Critical Illness Insurance, Accidental Insurance, Life Insurance Wellness Program - Employee Assistance Program, Onsite Medical Center, Emergency Support System Parental Support - Maternity Benefit, Paternity Benefit Program, Adoption Assistance Program, Day-care Support Program Mobility Benefits - Relocation benefits, Transfer Support Policy, Travel Policy Retirement Benefits - Employee PF Contribution, Flexible PF Contribution, Gratuity, NPS, Leave Encashment Other Benefits - Higher Education Assistance, Car Lease, Salary Advance Policy Working at PhonePe is a rewarding experience! Great people, a work environment that thrives on creativity, the opportunity to take on roles beyond a defined job description are just some of the reasons you should work with us. Read more about PhonePe on our blog. Life at PhonePe PhonePe in the news
Posted 2 weeks ago
4.0 - 6.0 years
12 - 16 Lacs
Bengaluru
Work from Office
Associate Manager - Data Privacy : We are seeking a highly motivated and detail-oriented Associate Manager to join our DataPrivacy team. This role involves assisting in the development, implementation, and maintenanceof our data privacy program. As an Associate Manager - Data Privacy, you will help driveprivacy initiatives and ensure organizational compliance with applicable data protectionregulations, including Indias Digital Personal Data Protection Act (DPDPA). The ideal candidatewill have a strong understanding of data privacy laws, regulations and best practices, coupledwith excellent communication, critical thinking, and analytical skills. On a day-to-day basis, youwill be expected to leverage your expertise in privacy laws, concepts, and industry standards tounderstand and navigate complex environments and ensure robust privacy practices. LocationBangalore, HQ, full-time Reports toSenior Manager - Data Privacy FunctionData Privacy, Data Governance, and Data Ethics | Compliance Key Responsibilities: Assist in the development and implementation of privacy program components, includingdrafting and refining policies, procedures, and templates; assist in DPDPAimplementation efforts Collaborate with business and product teams to assess and understand theorganizations use of personal data; serve as the key privacy advisor and point ofcontact for internal stakeholders, guiding privacy-related decisions. Research and monitor evolving privacy laws, regulations, and industry practices / trends,and analyse their impact on our business. Conduct Data Protection Impact Assessments (DPIAs) and risk assessments toproactively address and mitigate privacy risks. Enhance the organizations existing consent management framework in alignment withlegal and regulatory requirements, ensuring seamless integration across functions. Review privacy clauses in vendor contracts and ensure compliance with data protectionrequirements; provide assistance on the third party risk management process to mitigateprivacy risks. Help investigate and manage privacy incidents, including support with reporting andresolution. Support in handling data principle requests and ensure timely responses; assist inaddressing queries related to data privacy rights and data protection practices. Assist with continuous monitoring and testing of existing privacy controls implementedacross businesses, identify gaps, and initiate corrective measures. Assist data discovery activities across the enterprise; ensure maintenance of personaldata inventory. Assist design and delivery of mandatory privacy training and role-specific awarenessprograms to increase privacy awareness. Qualifications and : Bachelors / Masters Degree in Computer Science, Law, Information Security, Privacy,or related fields 4-6 years of overall experience working in the Privacy domain In-depth knowledge of global privacy laws and frameworks, including GDPR, DPDPA,CCPA, Information Technology Act, and regulations from RBI, SEBI, IRDAI and otherregulators Strong documentation and communication skills and proficiency with frameworkdevelopment, assessments, and policy and procedure documentation; advancedworking knowledge of MS Office applications Team player; ability to interface and build relationships with stakeholders Strong bias for action with exceptional problem solving skills Good to have: Professional certifications such as DCPP, DCPLA, CIPP/E, CIPM, CIPT, or equivalentare desirable Experience working in the FinTech industry and understanding of various products andservices PhonePe Full Time Employee Benefits (Not applicable for Intern or Contract Roles) Insurance Benefits - Medical Insurance, Critical Illness Insurance, Accidental Insurance, Life Insurance Wellness Program - Employee Assistance Program, Onsite Medical Center, Emergency Support System Parental Support - Maternity Benefit, Paternity Benefit Program, Adoption Assistance Program, Day-care Support Program Mobility Benefits - Relocation benefits, Transfer Support Policy, Travel Policy Retirement Benefits - Employee PF Contribution, Flexible PF Contribution, Gratuity, NPS, Leave Encashment Other Benefits - Higher Education Assistance, Car Lease, Salary Advance Policy Working at PhonePe is a rewarding experience! Great people, a work environment that thrives on creativity, the opportunity to take on roles beyond a defined job description are just some of the reasons you should work with us. Read more about PhonePe on our blog. Life at PhonePe PhonePe in the news
Posted 2 weeks ago
10.0 - 15.0 years
30 - 35 Lacs
Pune
Work from Office
: Job Title- Information Security Specialist Corporate Title- Assistant Vice President Location- Pune, India Role Description Information Security Production Services (IS PS) supports all divisions with information security relevant areas, like Application user recertification and other identity & access management areas. IS PS is seeking an Information Security Analyst for Application Onboarding. Job Summary We are seeking a highly motivated and skilled information Security Specialist Assistant Vice President to join our CSO Unified Onboarding Team. The Successful candidate will play a key role in ensuring the timely and compliant onboarding of applications into the banks centralized Identity and Access Management Platforms Specifically Recertification, Request and Approval, and Segregation of Duties control systems. This position requires a strong background in information security practices, stakeholder management, and project execution. The selected candidate will be expected to operate with minimal supervision, take ownership of critical onboarding workstreams and act as a delegate for the manager when needed, including representing the team in leadership meetings, managing escalations and mentoring junior team members. What well offer you 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities Drive the end-to-end onboarding of applications to central IAM platforms, ensuring alignment with enterprise security policies and compliance mandates. Act as the primary liaison between the Unified Onboarding Team and Business/application stakeholders to gather requirements, communicate timelines and resolve onboarding-related issues. Serve as the primary point of contact for stakeholders, including business application owners, control owners and technical teams. Provide subject matter expertise in recertification, access request workflows and segregation of duties controls. Support stakeholders through the onboarding lifecycle by offering guidance, answering queries and coordinating with control owners and technical teams. Ensure that all onboarding activities are tracked, documented and completed within defined timelines. Ensure documentation, tracking and reporting of onboarding progress, risks and delays. Escalate risks and delays appropriately, ensuring visibility to leadership and mitigation strategies are in place. Collaborate with internal information security, risk, audit, and compliance teams to ensure regulatory obligations are being met. Identify and implement process improvements to streamline onboarding and enhance user experience. Maintain awareness of regulatory updates, internal policy changes and IAM best practices to ensure continual alignment. Take ownership of escalated onboarding cases and drive them to resolution through effective collaboration and decision-making Support resource planning, work allocation and overall team coordination in alignment with program priorities. Proactively identify process gaps and lead continuous improvement initiatives within the team. Monitor team workload and onboarding metrics and prepare periodic status reports and executive summaries as required. Your skills and experience Bachelors degree in information technology, Cybersecurity, Computer Science or a related field. Should have 10+ years of total work experience or at least 8+ years of relevant experience in similar role. Strong working knowledge of recertification processes, access request and approval mechanisms and segregation of duties control. Excellent interpersonal skills with a track record of strong stakeholder management. Exceptional communication skills, able to present technical concepts clearly and confidently to non-technical stakeholders. Proven experience with task prioritization, independent decision making and escalation management. Ability to manage multi-tasks assignments and efficiently prioritize workload with limited supervision and resilient under pressure. Ability to build a network in the business and among business managers, project managers and subject matter experts Flexible, pro-active and innovative How well support you About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htm We strive for a culture in which we are empowered to excel together every day. This includes acting responsibly, thinking commercially, taking initiative and working collaboratively. Together we share and celebrate the successes of our people. Together we are Deutsche Bank Group. We welcome applications from all people and promote a positive, fair and inclusive work environment.
Posted 2 weeks ago
5.0 - 10.0 years
13 - 18 Lacs
Mumbai
Work from Office
: Job TitleNFRM Information Security & Technology Risk Specialist LocationMumbai, India Corporate TitleAssociate Role Description An Information Technology & Security Risk Specialist to join the 2nd LoD Information Security & Technology Risk Team. The team is global, this role is within the Mumbai team (currently 1 person) which is being built out to support the global team. Should have a proven depth of knowledge and keen interest of Information Security and Technology and their application in large financial institutions. Working with other team members the role will input subject matter expertise and drive innovative approaches in applying risk management in an evolving threat environment. The team has a global footprint in Frankfurt, Singapore, London, Mumbai and USA. What well offer you 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities Provide data and analytics reporting to support the team in monitoring the Information Security and Technology Risk Appetite, breaches and remediation. Where required support the implementation of automated data and analytics reporting process. Support the team delivery of Non-Financial Risk Management (NFRM) priorities such as risk & control assessments, scenario analysis, risk appetite. Monitor and challenge 1LOD Risk and Control Assessments (including results of 1LOD control testing/assurance). Perform 2LOD control assurance through targeted reviews of areas of concern. Gain an understanding and be able to articulate key Information Security and Technology regulatory requirements across APAC/MEA and their impact and implementation into the Information Security and Technology Risk Framework. Your skills and experience University degree (Computer Science, Business Administration or equivalent). Majors in Information Security and / or Risk Management are a plus. Experience (5+ years) in Information Security or Information Technology with experience in the Finance industry and/or a major Technology or Consultancy company preferred. Experience in IT Risk Frameworks such COBIT 2019 is ideal 3+ yrs Understanding and experience of technology from either a support, development or business analysis perspective Some level of technical understanding and training either as a data analyst, developer, business analyst or project manager are a plus. Knowledge of Information Security and Technology industry regulatory standards and/or Risk Frameworks (e.g. EBA Guidelines ISO / 27000 Series, COBIT 2019, DORA) are a plus. Experience of technology coding e.g python, java is a plus Understanding of IT controlsSDLC, managing technology obsolescence, disaster recovery is a plus Knowledge of Digital transformation, Private and Public Cloud, AI tooling a plus Relevant professional certifications e.g. CISSP, CISA, CISM, CRISC, ITIL, ISO27001 Lead Auditor or similar are a plus. Experience of working in large global teams yet comfortable working independently without day-to-day oversight and steer. Strong communication skills (English required). How well support you
Posted 2 weeks ago
5.0 - 8.0 years
30 - 35 Lacs
Pune
Work from Office
: Job Title Information Security Specialist Corporate Title Assistant Vice President LocationPune, India Role Description Everyday DB observes thousands of cyber security intrusion attempts. Deutsche Banks COO Chief Security Office (CSO) integrates both Corporate Security (CS) and Information Security (CISO) as both teams are responsible for mitigating these risks. The CSO team enables the business of Deutsche Bank by providing agile security operational capabilities. With their expertise in Threat Intelligence, Cyber Threat Analytics, Malware Response & Research, Security Monitoring, Incident Response, Forensics and Vulnerability Management, they provide global services from key locations in Frankfurt, Jacksonville and Singapore while leveraging offshore capabilities in Pune and Bucharest. Deutsche Bank AG is looking for Cyber Security professional to support the banks global security monitoring and threat detection capabilities. This role requires a heavy focus on all areas of security monitoring, risk management on privileged access management and familiarity with regulations impacting technology (e.g. MAS TRM Guidelines), requiring at least 5 to 8 years of experience. Candidate will be responsible to provide an oversight of the various security monitoring process to manage security risks and to drive the organizations compliance to regulatory and audit requirements including facilitation of audit activities, address process related queries and drive automation and audit remediation projects. The candidate will need to drive process improvements, procedure document updates, KPI monitoring and operations team management. Candidate will engage across all functional areas of business, operations, and global technologies working in a dynamic, multi-OS environment. This role will play a vital role in present organizations compliance to regulators and managing interactions with auditors. The chosen candidate will be required to provide a degree of strategic, tactical, and day-to-day operational experience to enhance the overall security monitoring, detection, and mitigation process. Candidate must also possess excellent soft skills and verbal communications dealing with senior executive management, customers, clients, auditors, and third-party vendors. What well offer you , 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities Oversee the performance, efficiency, and accuracy of security monitoring operations team ensuring SLAs are met. Proactively review, propose, and implement process changes and monitoring improvements to remediate most significant risks including audit findings, self-identified issues, compliance issues, control gaps and regulatory requirements. Identify opportunities for streamlining of control processes, develop and socialize potential risk mitigation strategies particularly in privileged access management (e.g., bypass monitoring, session log review), and work with various divisions to execute. Improve the delivery of effective control process through technical review and process quality checks. Provide support in the delivery of effective governance including tracking and reporting. Ensure proper training of monitoring teams on new coverage and use cases. Offer subject-matter expertise and act as escalation point when required. Prepare and present monthly functional and operational report. Manage stakeholder queries, facilitate audit activities, and address data requests in a timely manner. Collaborate across CSO and technology teams to respond to internal and external audits, and regulatory inquiries and assessments. Drive automation projects and manage audit remediation deliverables to closure. Practice and promote good risk culture and risk management to manage the risks within banks appetite. Act as primary point-of-contact for regulatory inquiries and engagements. Collaborate with internal and external auditors and stakeholders, providing necessary evidence and artefacts, to facilitate audit processes. Your skills and experience Minimum 5 to 7 years of working Experience with security monitoring platforms and workflows. Proven Experience in area of privileged access management specifically in session log review and bypass monitoring. Proven experience and In-depth knowledge of technology regulations and understanding of regulatory risk management specially of MAS requirements and guidelines. Proven experience and strong understanding of audit process and compliance monitoring and reporting. Analytical mindset and ability to identify, assess and address compliance gaps and security risks. Strong operational background in risk analysis and risk identification. Degree from a university or major course work in computer science, networking, engineering, or other computer-related field of study. One of the following certifications will be an advantageCISSP, CISM, CISA, CRISC Expectations It is the Banks expectation that employees hired into this role will work in the office at least 2-3 days a week in accordance with the Banks hybrid working model. How well support you . . . .
Posted 2 weeks ago
8.0 - 13.0 years
30 - 35 Lacs
Bengaluru
Work from Office
: Job TitleApplication Security Specialist Corporate TitleAssistant Vice President LocationPune/Bangalore India Role Description DWS is evolving and expanding its internal information security team. In the CSO Information Security Assurance division, your role will involve assessing the implementation of controls to ensure adherence to Information Security Policies and Procedures. This verification process utilizes the most advanced compliance data sources (i.e., compliance evaluation based on operational data, self-assessment, and independent reviews) to determine whether the necessary information security controls have been established in DWSs applications, infrastructure, and IT processes, including EUDA/EUMA. In this context, it evaluates associated risks and identifies vulnerabilities related to unimplemented controls. The service also offers guidance on training and the application of security controls. What well offer you 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities Your main responsibility will be to adhere to the Information Security roadmap for the applications (ensuring information security compliance) based on IS principles (confidentiality, integrity, and availability), and to verify their alignment with DWS/DB policies. Assist application team with the applications that are scheduled for migration/re-migration projects ensuring that its IS Criticality ratings are updated according to the DWS/DB IS criticality methodology. Take part in CSO assurance meetings associated with secure architecture design, new product approvals or other risk review discussions to prevent any delays or escalations arising from non-compliance. Assist the DWS CSO in executing the hybrid model as outlined for decisions related to the Aurora Operating Model, ensuring proper alignment with DB CSO ORR controls. Perform security assurance tasks on DWS CSO solutions, business applications, and IT infrastructure located within the Proteus environment. Conduct a security assessment when retiring business applications or IT applications in the Proteus environment. Aid in resolving regulatory findings and guarantee that there are no outstanding audit issues. Act as a liaison among key role holders such as ITAOs and TISOs to create a secure environment by assessing the Information Security needs. Provide support for the governance of EUDA within a DWS Unit. Contribute to the creation, testing, and management of IS Security Compliance campaigns in accordance with business needs (including documentation and training). Oversee Assurance processes and evidence evaluations throughout DWSs application portfolio to aid in reducing risks linked to non-compliant controls for all DWS entities. Assist in ensuring consistency with all other Control Functions for Operational Readiness. Security compliance reporting is a crucial aspect of the security assurance team. Therefore, you are required to work on the promptness of reporting, the precision of the content, and the comprehensiveness of risk and controls. Ensure automation in reporting and delivering value. Your skills and experience Clear understanding of information security risk and compliance framework. Experience in application security assessment activities. Minimum 8-14 years experience in Information security management area. Understanding on how application security policies, standards, requirements and controlsare defined. Strong Microsoft office (excel macro), automation and analytics experience. Experience in working with information security governance solutions. Experience in CISO Application Security Governance process design Proven experience with Information Security Standards implementation (e.g. ISO27001, ) Proven experience in implementing Risk management standards Any globally recognized information security certification (highly preferred) Graduation and above (preferably IT, Computer science) Understanding of current industry and agency standards, best practices, and/or frameworks i.e.MITRE ATT&CK, NIST, DORA, ENISA, ISO27001, SOC2, SoX, PCI, etc. Dedicated to undertaking any assigned tasks or projects related to CSO. Ability to explain, document and present Information Security risks in a clear, concise and understandable manner, ability to present a big picture and connect the dots Detailed oriented, collaborative and team oriented, ability to manage conflicts with Senior stakeholders Must work independently and can collaborate comfortably in a matrix organization with international teams. Excellent verbal and written communication skills, including the ability to effectively participate in and sometimes lead discussions and meetings with internal and/or executive management and other groups involved in Physical Security/technology control assessments. Structured and reliable work style How well support you About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htm
Posted 2 weeks ago
3.0 - 5.0 years
7 - 12 Lacs
Coimbatore
Work from Office
Role is SAP subject matter expert/architect role for Security. Key responsibilities will involve working with Business Stakeholders, understanding requirements, translating user requirements into SAP IT scope, assessing impact on application & connected systems, estimating high level schedule and efforts to implement solution and ensure successful technical delivery Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Candidate must have min. 3-5 years of solid SAP Security Implementation experience with focus on Role authorizations. Solid implementation and hands-on experience in ECC 6.0 role build. Experience in working with stakeholders and leading SAP security projects. Sound understanding of SOD - segregation of duties. Support technical requirement gathering, develop prototypes/PoCs/recommend solutions with limited information from the business, delivery quality technical specifications and documentation Preferred technical and professional experience SOX/GRC Control experience
Posted 2 weeks ago
8.0 - 13.0 years
8 - 12 Lacs
Bengaluru
Work from Office
The IBM Cloud Object Storage team is seeking an experienced Security Developer As a Security developer, you will be part of a highly focused, self-managed team that designs, develops and tests secure solutions created for IBM Cloud Object Storage workloads. Responsible for all aspects of security and compliance activities. Provide feedback to architects regarding any issues that can cause any security and complinace Gaps. Manage projects with various priority levels and timelines from start to finish. Demonstrate best practices in all aspects of administration. Leverage various security tools to secure the offerings and make sure offering is adhered to the best security and compliance priniciples. Continuously stay abreast of new security and complinace guidelines to ensure more secure offering. Must collaborate with other departments to resolve complex issues and be detail oriented. Ability to automate security and complinace solutions to repetitive problems/tasks. Required education Bachelor's Degree Required technical and professional expertise Upto 8+ Years of working experience with Security and Compliance activities Programming Skills: Python Shell Scripting Other Skills: In depth Knowledge of end to end Security and Complinace activities such as Threat Models, Security Privacy by Design. Knowledge of Security scanning tools such as Nessus scanner, SonarQube, NMap. In depth Security concepts (Includes deep understanding of identity mgmt/authentication, authorization, firewall, auditing, secure communication, managing certificates, password management) Excellent presentation and soft skills Security Domain ExpertizeUnderstand of cryptographic key management and it's lifecycle and also security architecture. In depth knowledge of Hardware Security Modules, PKCS #11 APIs, Trusted Execution Environments, Quantum Safe Algorithms Strong English communication skills both written and verbal Preferred technical and professional experience General understanding of private /public / hybrid cloud concepts In depth understanding of HW servers and server components General understanding of open source projects; experience with open source community contribution can be an added advantage Indepth Security concepts and hands on experience on Certificate management/authentication, authorization, firewall, auditing, secure communication, password management)
Posted 2 weeks ago
4.0 - 8.0 years
10 - 15 Lacs
Bengaluru
Work from Office
Vulnerability Identification & Assessment: Manage and oversee vulnerability scanning tools (Qualys, Tenable, Rapid7, etc.). Analyze vulnerability data from multiple sources and assess the impact on business operations. Perform risk assessments and categorize vulnerabilities based on severity and exploitability. Remediation & Risk Mitigation:Collaborate with IT and development teams to ensure timely remediation of identified vulnerabilities. Prioritize vulnerabilities based on risk to the business and potential exploitability. Track remediation efforts and ensure proper closure of security gaps. Process & Policy Development:Define and maintain vulnerability management policies, standards, and procedures. Establish workflows for vulnerability detection, reporting, remediation, and validation. Ensure compliance with security frameworks such as NIST, CIS, ISO 27001, and regulatory standards like GDPR, HIPAA, and PCI-DSS. Security Monitoring & Threat Intelligence Integration:Work with threat intelligence teams to understand emerging threats and vulnerabilities. Ensure vulnerability management aligns with incident response and threat-hunting processes. Continuously enhance detection mechanisms to improve vulnerability discovery and response. Compliance & Audit Readiness:Ensure that vulnerability management practices align with regulatory and compliance requirements. Maintain records of assessments, remediation efforts, and compliance reports for audits. Support internal and external audits related to vulnerability management. Reporting & Metrics: Develop and present vulnerability status reports to security leadership and executive teams. Track key performance indicators (KPIs) related to vulnerability remediation SLAs and risk reduction Provide insights on security posture improvements based on trend analysis. Security Awareness & Collaboration:Conduct training sessions to educate teams on vulnerability risks and remediation best practices. Work closely with DevSecOps, SOC, and infrastructure teams to integrate security best practices into the development lifecycle Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Vulnerability Management Preferred technical and professional experience Qualys
Posted 2 weeks ago
2.0 - 7.0 years
6 - 10 Lacs
Bengaluru
Work from Office
Roles & Responsibilities: 1.Handling alerts and incident on XDR platform 2.Alert & incident triage and analysis 3.Proactively investigating suspicious activities 4.Log all findings, actions taken, and escalations clearly in the XDR and ITSM platform 5.Execute predefined actions such as isolating blocking IPs or disabling user accounts, based on set protocols. 6.Adhere to established policies, procedures, and security practices. 7.Follow-up with tech team for incident closure 8.Participating in daily standup and review meeting 9.L1 Analyst has responsibility to closely track the incidents and support for closure. 10.Escalate more complex incidents to L2 analysts for deeper analysis. 11.Work & support on multiple cybersecurity tool (DLP, GRC, Cloudsec tool, DAM) 12.Handle XDR alerts and followup with customer team for agent updates Key Responsibilities: Security Monitoring & Incident Response Governance Define and maintain security monitoring, threat detection, and incident response policies and procedures.Establish and mature a threat intelligence program, incorporating tactical and strategic threat feeds.Align SOC operations with evolving business risk priorities and regulatory frameworks.Platform & Toolset Management Evaluate, implement, and enhance SIEM platforms, ensuring optimal log ingestion, correlation, and rule effectiveness.Assess and manage deployment of EDR, XDR, SOAR, and Threat Intelligence solutions.Maintain and update incident response playbooks and automation workflows.Ensure consistent platform hygiene and technology stack effectiveness across SOC tooling.SOC Operations & Threat Detection Oversee 24x7 monitoring of security events and alerts across enterprise assets.Lead and coordinate proactive threat hunting across networks, endpoints, and cloud.Manage and support forensic investigations to identify root cause and recovery paths.Govern use case development, log source onboarding, and alert/event triage processes.Regulatory Compliance & Incident Management Ensure timely and accurate incident reporting in compliance with RBI, CERT-In, and other authorities.Retain logs in accordance with regulatory data retention mandates.Enforce and monitor security baselines for endpoints, in line with internal and regulatory standards.Advanced Threat Management & Reporting Plan, conduct, and report on Red Teaming and Purple Teaming exercises to test detection and response capabilities.Participate in and contribute to the Risk Operations Committee (ROC) meetings and initiatives.Review and track SOC effectiveness through KPIs, metrics, and regular reporting dashboards. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Required Qualifications: Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or related field.2 years of experience in SOC management, incident response, or cyber threat detection roles.Hands-on expertise with SIEM (e.g., Splunk, QRadar, Sentinel), EDR/XDR tools, and SOAR platforms.Proven experience in playbook development, forensics, and threat hunting methodologies.Strong understanding of RBI/CERT-In incident reporting guidelines and log retention requirements.Familiarity with MITRE ATT&CK, threat modeling, and adversary emulation techniques. Preferred technical and professional experience Preferred Certifications: GCIA, GCIH, GCFA, CISSP, OSCP, CEH, CHFI, or similar certifications
Posted 2 weeks ago
4.0 - 6.0 years
8 - 12 Lacs
Gurugram
Work from Office
Your Role and Responsibilities As a Network Engineer specializing in Radware Load Balancer and Web Application Firewall (WAF) solutions, you will play a critical role in ensuring optimal network performance, security, and reliability. Your responsibilities include: Load Balancer Management: Deploy, configure, and maintain Radware Server/Link Load Balancer solutions for high availability. Design and implement load balancing solutions aligned with business needs, collaborating with network engineers and system administrators. Monitor and troubleshoot network issues related to load balancing, ensuring timely resolution. Conduct regular audits and assessments to optimize load balancer configurations. Provide technical support and mentorship to junior team members. Stay updated on industry trends and best practices in networking technologies. Web Application Firewall (WAF) Administration: Oversee the deployment, configuration, and management of Radware WAF solutions. Ensure the secure operation and maintenance of WAF infrastructure. Monitor WAF alerts and incidents to protect web applications from cyber threats. Investigate and respond to security incidents involving WAF. Develop and implement security policies to safeguard web applications. Conduct periodic security audits and assessments to maintain compliance. Work closely with IT and security teams to integrate Radware WAF into the cybersecurity architecture. Optimize WAF policies to reduce false positives and improve accuracy. Provide training and documentation for WAF management and promote security awareness within the organization. Required education Bachelor's Degree Preferred education Bachelor's Degree Required technical and professional expertise 4 to 6 years of hands-on experience with Link Load Balancer (LLB) solutions. Strong understanding of WAN connectivity optimization, failover management, and ISP link aggregation. Expertise in troubleshooting and performance tuning of load balancing solutions. Radware LB certification Preferred technical and professional experience Experience in hybrid cloud or multi-site network architectures. Knowledge of MPLS, SD-WAN, and WAN optimization tools. Familiarity with network audits and compliance initiatives (ISO, PCI, etc.) Should be BE/B.Tech /MCA/BCA
Posted 2 weeks ago
0.0 - 5.0 years
2 - 7 Lacs
Ahmedabad
Work from Office
Software Development HR Finances Sales Tele-calling Customer Relations Digital Marketing Conventional Marketing Software Security Business Analysis Graphics Design Customer Support
Posted 2 weeks ago
5.0 - 8.0 years
10 - 15 Lacs
Pune
Work from Office
About Tarento: Tarento is a fast-growing technology consulting company headquartered in Stockholm, with a strong presence in India and clients across the globe. We specialize in digital transformation, product engineering, and enterprise solutions, working across diverse industries including retail, manufacturing, and healthcare. Our teams combine Nordic values with Indian expertise to deliver innovative, scalable, and high-impact solutions. Were proud to be recognized as a Great Place to Work , a testament to our inclusive culture, strong leadership, and commitment to employee well-being and growth. At Tarento, you ll be part of a collaborative environment where ideas are valued, learning is continuous, and careers are built on passion and purpose. Key Accountabilities Technical lead for PROS application managing dynamic pricing for bp Aviation Managing reliability of service and delivering to agreed SLA Liaising with platform and security teams for patching and vulnerability management The safety of our people and our customers is our highest priority. The role will advocate and lead in this and promote a culture of security and safety in everything that we do. Work as part of evolving multi disciplinary teams which may include Software Engineers, Enterprise Technology Engineers, Designers, SecOps, and Product owners to deliver value through the application of specialist skills Work with vendors and partners providing market solutions to optimize the usage and value which can be delivered from the appropriate technology platform Ensure operational integrity of what you build, assuring operational compliance with architectural and security standards, as well as compliance and policy controls refined by Strategy. Mentor others and become a conduit to connect the broader organization. Define and document standard run books and operating procedures. Create and maintain system information and architecture diagrams. Essential Experience and Job Requirements 5+ Years experience in PROS pricing management and optimization tool Demonstrable Knowledge in the application of modern Service Delivery methods - Site Reliability Engineering to traditional ITIL, and understanding of Product Based delivery Strong Communications skills and a high EQ with the ability to operate across complex business environments and stakeholders up to senior executive level Desirable criteria Broader development experience in one or more object-oriented or applicable programming languages (e.g. Python, Go, Java, C/C++) Project Management experience delivering IT led projects Broad experience contributing and collaborating to assist design, plan, implement, maintain, and document services and solutions Core Skills Expectations : Agile Core Practices Technical Specialism Configuration management and release Documentation and knowledge sharing Information security Metrics definition and Instrumentation Service operations and resiliency Source control and code management Testing and Quality Assurance Coaching Collaboration Facilitation
Posted 2 weeks ago
6.0 - 7.0 years
11 - 13 Lacs
Hyderabad
Work from Office
Some careers shine brighter than others. If you re looking for a career that will help you stand out, join HSBC and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further. HSBC is one of the largest banking and financial services organisations in the world, with operations in 64 countries and territories. We aim to be where the growth is, enabling businesses to thrive and economies to prosper, and, ultimately, helping people to fulfil their hopes and realise their ambitions. We are currently seeking an experienced professional to join our team in the role of Lead DevSecOps Engineer In this role, you will: Collaborating with various layers of Linux management teams and across Cybersecurity and other IT teams to develop solutions that protect the organization. Design and drive the implementation of service offerings, capability uplifts, and process improvements to protect the bank for a continuously changing threat landscape. Providing thought leadership, consultation and subject matter expertise to the organization on Cybersecurity/Endpoint Security/Antimalware issues. Reviewing, analyzing and documenting the current baseline and developing the target technology posture. Performing gap analysis of the current baseline against the target architecture. Reviewing, designing and re-engineering domain processes with new technologies and solutions to improve domain performance. Providing centralized, global cybersecurity services to the organization and reducing associated costs Operating a first line of defense to ensure compliance with IT requirements. Implementing and maintaining an effective engagement model across all regions, global businesses, and global functions. Researching, engaging, and managing third party vendors where relevant to support functional objectives. Providing thought leadership to the function and broader Cybersecurity organization, driving transformational change and capability uplift across the bank. Requirements To be successful in this role, you should meet the following requirements: 5+ years hand on experience with Linux, preferably with some experience in information security, focused on endpoint security and antimalware controls and solutions. Exposure to CrowdStrike or similar endpoint protection tooling beneficial. Exposure to cloud infrastructure and tools including AWS, Azure, GIT, Ansible, Puppet, Jenkins. Demonstrated ability automating common information security tasks in scripting environments/languages such as python, perl, or similar would be advantageous. Demonstrable experience as both an individual contributor and lead implementing and managing endpoint/antimalware security solutions. Experience working cross-functionally to achieve desired outcomes and goals, including working with subject matter experts and leads for other domains/controls to implement security solutions that effectively reduce risk. Experience working with business partners to understand and evaluate cybersecurity requirements and ensuring security solutions best meet those requirements while reducing risk for the organization. Detailed understanding of current security risks, vulnerabilities, and mitigations for common desktop and server operating systems, as well as knowledge of security best practices and common controls/security products. Broad understanding of common network, application, and cloud security controls. Detailed knowledge of networking, operating system, and application development fundamentals, particularly with regard to security of and threats to associated technologies, solutions, and products. Extensive experience with securing endpoints, and supporting, and integrating security products in large networks/environments. Demonstrated ability to perform complex troubleshooting and problem analysis as well as mitigation in large environments and at scale. Extensive experience in evaluating and selecting security products given business/technology needs and goals, including requirements gathering, testing, and working with multiple vendors. Excellent communication and interpersonal skills, with demonstrated experience in interacting with technical leaders and various layers of management. Demonstrated experience in mentoring and offering guidance to team members. Ability to build connections and work collaboratively within and across teams and boundaries. Willingness to continuously learn and share knowledge with other.
Posted 2 weeks ago
2.0 - 7.0 years
4 - 8 Lacs
Bengaluru
Work from Office
Educational Bachelor of Engineering,Bachelor Of Technology,Master Of Engineering,Master Of Technology,Bachelor Of Computer Science,Master of Computer Science Service Line Cyber Security Responsibilities A day in the life of an Infoscion As part of the Infosys consulting team, your primary role would be to actively aid the consulting team in different phases of the project including problem definition, effort estimation, diagnosis, solution generation and design and deployment You will explore the alternatives to the recommended solutions based on research that includes literature surveys, information available in public domains, vendor evaluation information, etc. and build POCs You will create requirement specifications from the business needs, define the to-be-processes and detailed functional designs based on requirements. You will support configuring solution requirements on the products; understand if any issues, diagnose the root-cause of such issues, seek clarifications, and then identify and shortlist solution alternatives You will also contribute to unit-level and organizational initiatives with an objective of providing high quality value adding solutions to customers. If you think you fit right in to help our clients navigate their next in their digital transformation journey, this is the place for you! Additional Responsibilities: Ability to work with clients to identify business challenges and contribute to client deliverables by refining, analyzing, and structuring relevant data Awareness of latest technologies and trends Logical thinking and problem solving skills along with an ability to collaborate Ability to assess the current processes, identify improvement areas and suggest the technology solutions One or two industry domain knowledge Technical and Professional : Primary skills:Technology-Finacle-Core-Payments-Real Time Gross Settlement-Master,Technology-Infrastructure Security-Security Incident and Event Management (SIEM),Technology-Infrastructure Security-Virtual Private Network, Firewall,Technology-Network-Firewall_and_Media-Check Point,Technology-Network-Firewall_and_Media-Juniper-Firewall,Technology-Network-Firewall_and_Media-Palo Alto Preferred Skills: Technology-Infrastructure Security-Security Incident and Event Management (SIEM)-IBM Qradar Technology-Infrastructure Security-Virtual Private Network Firewall-Zscaler ZPA Technology-Network-Firewall_and_Media-Check Point-firewall Technology-Network-Firewall_and_Media-Juniper-Firewall-firewall Technology-Network-Firewall_and_Media-Palo Alto Technology-Infrastructure Security-Secure Web Gateway-Zscaler ZIA
Posted 2 weeks ago
6.0 - 9.0 years
8 - 11 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
Location: Bangalore Experience: 6 - 9 Years The Role Principal Cybersecurity Edge Security Ops The job involves performing functions related to Network and Perimeter specialized Security Engineers including Web Application Firewall, Email Security, , Network and cloud security Cyber Incident Response. Looking for an energetic, hard charging individual able to keep up in an exciting and fast-moving security operations team that is engaged in several high-profile security projects to enhance Fidelity s security posture. The candidate will be immersed in a quick changing environment in a very rapid changing threat landscape, working with numerous security professionals. The qualified candidate must be adaptable and able to work in a fast-paced environment where learning new skills and understanding new system architectures quickly is a key to success. The Team The Principal Cybersecurity Analyst will be working on external defense team to ensure indications of compromise are promptly identified and stakeholders are informed with actionable and complete information. This role will assist and coordinate with incident response staff, threat intelligence, vulnerability management, and perimeter security teams during response activities and cyber investigations. This position works closely with our ISO for each Business Unit and directly with internal and external customers. The Expertise You Have Technical: Perimeter and cloud security Expert with an outstanding understanding of the latest practices and trends in edge security. Strong experience in Web application firewall and API Security. Good exposure to how to proactively combat OWASP top 10, Account take over , API and other bot external attacks . Evaluate, deploying and managing Akamai / AWS / Azure Web Application Firewall security configuration. Good knowledge of Email Security (EOP), Email Security Network IDS/IPS, WAF, DDoS Control and Cloud Security. Advance experience on Splunk or other SIEM (Security information and event management) Monitoring. Log Analysis Expertise - Web logs, NetFlow and Packet Analysis Analyzing web traffic patterns to improve protections. Reviewing policy enforcement change requests; interviewing submitters who have requested security configuration changes and require additional requirements gathering. Knowledge of Agile, DevSecOps, Open Source and a programming language is of substantial advantage Manage Cyber Incidents and other service incidents for WAF and other security technologies Behavioral Positive personality and can-do attitude; you also have good communication skills with an excellent command of the English language. Open-minded, empathic and a team-mate with a partnering approach and an enthusiastic and motivated personality, with demonstrated experience in solving complex challenges Intellectually curious and therefore remain abreast of new technologies and developments relating to technical products that might be used enterprise wide and software delivery methodologies Proficient in balancing business partner views and interests Team player with excellent interpersonal & communication skills (written and verbal) Senior technical and non-technical Stake holder management skills The Skills You Bring 7 to 9 years of security experience desired, preferably in a matrix-driven corporate environment. Mandatory is WAF Operations and E Mail Security is Secondary. Security experience with any WAF provider, API definitions, custom rules, writing bot management rules and analyzing traffic logs. Proven experience troubleshooting and simulating HTTP client requests (e.g., curl, postman, HAR file analysis). Strong understanding of core networking concepts (e.g. - TCP/IP, DNS, HTTP, proxy, load-balancing, etc.). Functional experience with Splunk, SIEM, or other log aggregation & analysis technologies. Experience with cloud solutions such as AWS or other IaaS/PaaS/SaaS environments. Ability to interact with both technical and non-technical staff, including management and executives, with experience articulating technical material in business terms. Functional understanding of network controls and policies to stop cyber threats. Familiarity with external facing security controls that can stop external attacks that may occur: such as WAF tuning, Bot management, API protection, network policy governance, troubleshooting, and incident response. Familiarity with criminal activities and the attacks that may occur in each layer of the OSI model. Ability to make information security risk determinations based on intelligence analysis. Understanding cyber threats, malicious cyber threat actor motivations, and capabilities relevant to regions of interest.
Posted 2 weeks ago
5.0 - 10.0 years
7 - 12 Lacs
Gurugram
Work from Office
Company description Resources is the backbone of Publicis Groupe, the world s third-largest communications group. Formed in 1998 as a small team to service a few Publicis Groupe firms, Re:Sources has grown to 5,000+ people servicing a global network of prestigious advertising, public relations, media, healthcare, and digital marketing agencies. We provide technology solutions and business services including finance, accounting, legal, benefits, procurement, tax, real estate, treasury, and risk management to help Publicis Groupe agencies do their best: create and innovate for their clients. In addition to providing essential, everyday services to our agencies, Re:Sources develops and implements platforms, applications, and tools to enhance productivity, encourage collaboration, and enable professional and personal development. We continually transform to keep pace with our ever-changing communications industry and thrive on a spirit of innovation felt around the globe. With our support, Publicis Groupe agencies continue to create and deliver award-winning campaigns for their clients. Overview Hands on Experience on Handling Windows File Server, Backup, Restoration Attributes/behaviours Demonstrated service excellence Ability to work in remote environment Strong Written and Oral communication Energetic and driven personality The key accountabilities for this role are; Should have Excellent Experience in MS Office/Outlook, Email Configuration, Backup Experience in Android & I-OS mobile OS, Mail & Apps troubleshooting Experience in Ticket process and SLA - Incidents / service requests, Escalation Matrix Experience of handling Asset/inventory record process, movements etc. Knowledge of Patch management, Antivirus Troubleshooting Troubleshooting and installation of Network MFD Printers Awareness of Information security policy and adherenc Qualifications Experience/Qualifications Bachelor s degree in Computer Science, Information Systems or Engineering Minimum 1.5+ years experience of troubleshooting Windows and MAC OS Knowledge Should have exposure to basic network troubleshooting, VPN, Remote Support Coordination with IT vendor for warranty support and call logging Skills (including technology)
Posted 2 weeks ago
3.0 - 7.0 years
5 - 9 Lacs
Hyderabad
Work from Office
Skills) In Primary Posting Language (Include Requirements For Education, Experience And Skills) Senior Manager, Cybersecurity Engineering The Opportunity Based in Hyderabad, join a global healthcare biopharma company and be part of a 130- year legacy of success backed by ethical integrity, forward momentum, and an inspiring mission to achieve new milestones in global healthcare. Be part of an organisation driven by digital technology and data-backed approaches that support a diversified portfolio of prescription medicines, vaccines, and animal health products. Drive innovation and execution excellence. Be a part of a team with passion for using data, analytics, and insights to drive decision-making, and which creates custom software, allowing us to tackle some of the worlds greatest health threats. Our Technology Centers focus on creating a space where teams can come together to deliver business solutions that save and improve lives. An integral part of our company s IT operating model, Tech Centers are globally distributed locations where each IT division has employees to enable our digital transformation journey and drive business outcomes. These locations, in addition to the other sites, are essential to supporting our business and strategy. A focused group of leaders in each Tech Center helps to ensure we can manage and improve each location, from investing in growth, success, and well-being of our people, to making sure colleagues from each IT division feel a sense of belonging to managing critical emergencies. And together, we must leverage the strength of our team to collaborate globally to optimize connections and share best practices across the Tech Centers. Role Overview We are seeking a motivated and skilled Zero Trust Security Engineer with a background in SASE solution with Zscaler. As a Zero Trust Security Engineer, you will assist in designing, implementing, and maintaining our SASE solution with Zscaler across our organization. What will you do in this role: Support the design, implementation, and maintenance of comprehensive Zscaler architecture and integration to enhance overall security. Assist in the implementation of Zero Trust strategies, including End point, Network security, cloud configuration, intrusion detection and prevention systems, and secure remote access. Collaborate with cross-functional teams to integrate Zero Trust principles and network security solutions into various infrastructure components, systems, and applications. Assist in the implementation and configuration of network security tools, ensuring proper monitoring, detection, and response capabilities. Stay up to date with the latest advancements and trends in Zero Trust, Cloud, network security, and related technologies, and assist in evaluating their applicability to the organization. Collaborate with external vendors, consultants, and internal stakeholders to evaluate, implement, and manage network security solutions. Provide support and assistance to IT and security teams for the successful implementation and operation of Zero Trust principles and network security solutions. Contribute to the documentation of the Zero Trust architecture, network security implementation, and maintenance processes. What should you have: Bachelors degree in Information Technology, Computer Science or any Technology stream. Advanced hands on 3 yrs of experience and skills with Zscaler design and deployment. Knowledge of Zero Trust principles, methodologies, and technologies, as well as a basic understanding of network security solutions and endpoint security (any Microsoft technologies-DLP/ SSCM / INTUNE). Overall exp: 3-7 yrs with good communication skills. Familiarity with network security tools and technologies, including firewalls, intrusion detection and prevention systems (IDPS), network segmentation, and secure remote access solutions. Strong problem-solving and analytical skills, with the ability to learn and apply new concepts quickly. Good communication and collaboration skills, with the ability to work effectively in a team environment. Bachelors degree in computer science, information technology, or a related field. Relevant certifications, such as Zscaler, CISSP, CIAM, or similar certifications are a plus. Our technology teams operate as business partners, proposing ideas and innovative solutions that enable new organizational capabilities. We collaborate internationally to deliver services and solutions that help everyone be more productive and enable innovation. Who we are: What we look for: #HYDIT2025 Current Employees apply HERE Current Contingent Workers apply HERE Search Firm Representatives Please Read Carefully Employee Status: Regular Relocation: VISA Sponsorship: Travel Requirements: Flexible Work Arrangements: Hybrid Shift: Valid Driving License: Hazardous Material(s): Required Skills: Computer Science, Cybersecurity, Design Applications, Endpoint Security, Information Security, Intrusion Detection, Intrusion Prevention System (IPS), Management Process, Network Security, Network Security Management, Network Security Tools, Network Troubleshooting, Program Implementation, Security Operations, Security Platforms, SLA Management, Software Development, Software Development Life Cycle (SDLC), System Designs, Technical Advice, Vulnerability Remediation, Vulnerability Scanning, Zero Trust Architecture Preferred Skills: Job Posting End Date: 07/31/2025 *A job posting is effective until 11:59:59PM on the day BEFORE the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date.
Posted 2 weeks ago
2.0 - 7.0 years
4 - 9 Lacs
Gurugram
Work from Office
Join a Team That s Passionate About Making Lives Better! At Bill Gosling Outsourcing, we believe that success starts with an amazing team. We are a global leader in outsourcing solutions, we focus on making lives better, one connection at a time. We provide tailored solutions to businesses around the globe, specializing in customer care, sales, and financial services. We re looking for enthusiastic, driven individuals to join our dynamic work environment where fun meets results ! Interacts with customers/ customer information on a daily basis, promptly responding to all inquiries in a courteous and efficient manner. Provides information to customers about product features. Helps customers when they are faced with problems or need information and/or ensure customer information is updated accurately. What Youll Do: Interacts with customers/ customer information on a daily basis, promptly responding to all inquiries in a courteous and efficient manner. Provides information to customers about product features. Helps customers when they are faced with problems or need information and/or ensure customer information is updated accurately. Help customers with complaints and questions, give customers information about products and services Ensure to deliver BGO and client metrics and expectations on a regular basis. Ensure customer satisfaction and provide professional customer support Update customer files with appropriate information and ensure information being placed in customer files follow regulatory, client specific, and corporate guidelines Engage with customers on all inbound/outbound calls, emails, and other channels of communication applicable and/ or supports to update customer s account information Champion company core values and other company programs Other duties as assigned Education North America - Minimum High School Diploma or equivalent is required Philippines - Minimum of 2 years post-secondary or equivalent is required Costa Rica - No Minimum requirement United Kingdom - No Minimum requirement Trinidad & Tobago - Minimum 3 CSEC passes English is compulsory in all locations Experience Previous experience in an Agent/Customer Service Representative is preferred but not required Certificates/Licenses There are no personal certification or licensing requirements for this job. What Were Looking For: INFORMATION SECURITY RESPONSIBILITIES All Information security responsibilities can be located in The Book of Bill (Global) and The Book of Bill (Global) - French. Please note that Information security responsibilities are based on role. Why Join Us? Growth Opportunities : We believe in promoting from within and providing opportunities for career advancement. Comprehensive Training : We offer extensive paid training to ensure you re equipped for success. Team-Oriented Culture : Work in a collaborative, supportive environment with peers who are passionate about what they do. Diversity & Inclusion: We celebrate the unique perspectives and contributions of all our employees. Fun Workplace: Join a vibrant team that knows how to have fun! From team engagement activities to social events, we foster a lively and inclusive work environment where you ll build strong connections. State-of-the-Art Offices: Work in our modern, well-equipped offices designed to enhance collaboration and productivity. Rewarding Work: Help businesses grow while making a real difference in people s lives! Get to Know Us Better! Follow us to get an insider view of our team in action, our values in motion, and a sneak peek into what makes us an awesome place to work! Twitter & Instagram: bgocareers Facebook: Bill Gosling Outsourcing LinkedIn: Bill Gosling Outsourcing Website - https: / / www.billgosling.com / careers By applying to this position, you acknowledge that you have read and understood Bill Gosling Outsourcing s Privacy Policy and consent to the collection, use, and storage of personal information in accordance with the policy. At Bill Gosling Outsourcing, we believe that diversity makes us stronger. We welcome applicants from all backgrounds and are committed to creating an inclusive and supportive workplace where everyone can thrive. Regardless of your race, gender, age, ability status, or any other characteristic, you are valued here. If you require accommodations at any stage of the hiring process, we are happy to work with you to ensure you have the support you need - just let us know. Bill Gosling Outsourcing - Where your career thrives!
Posted 2 weeks ago
0.0 - 1.0 years
1 - 3 Lacs
Chennai
Work from Office
We are seeking a qualified and passionate Assistant Professor in the field of Information Security and Digital Forensics. This full-time faculty role involves a dynamic mix of teaching, research, mentoring, and academic leadership, aimed at equipping students with cutting-edge knowledge and practical skills in the cybersecurity and digital forensics domains. Key Responsibilities: 1) Teaching & Curriculum Development 2) Design and deliver engaging lectures in Information Security and Digital Forensics. 3) Develop and continuously update curriculum to align with current industry standards and emerging technologies. 4) Supervise undergraduate and postgraduate student projects and theses. 5) Research & Innovation 6) Student Mentorship & Engagement 7) Mentor and guide students academically and professionally. 8) Organize and lead weekly training programs and workshops in information security and digital forensics at HQ. Industry Tools & Technologies Maintain proficiency in and teach the use of modern digital forensics and cybersecurity tools, including: FTK, EnCase, Cellebrite, XRY (Forensics) VA/PT tools, Nmap, Splunk (Security assessment and monitoring) Continuous Learning & Contribution Stay current with advancements in the field and integrate emerging trends and tools into teaching and research activities. Participate in academic committees, accreditation processes, and departmental development initiatives.
Posted 2 weeks ago
8.0 - 12.0 years
35 - 50 Lacs
Chennai
Work from Office
Job Summary GRC Consultant Responsibilities Job Summary We are seeking an experienced IT GRC Manager to lead our Governance Risk and Compliance initiatives The candidate will be responsible for developing and implementing IT GRC strategies ensuring compliance with regulatory requirements and managing risk across the organization This role requires a deep understanding of IT governance frameworks risk management practices and compliance standards Key Responsibilities Governance Develop and maintain IT governance frameworks policies and procedures Ensure alignment of IT strategies with business objectives Oversee the implementation of IT governance initiatives and monitor their effectiveness Risk Management Identify assess and manage IT risks across the organization Develop and implement risk mitigation strategies Conduct regular risk assessments in according with NIST standard and audits to ensure compliance with internal and external standards Compliance Ensure compliance with relevant regulatory requirements eg GDPR HIPAA SOX Develop and maintain compliance documentation and reports Coordinate with internal and external auditors to facilitate compliance audits Leadership Lead and mentor a team of IT GRC professionals Collaborate with crossfunctional teams to promote a culture of risk awareness and compliance Provide regular updates to senior management on IT GRC activities and initiatives Qualifications Strong knowledge of IT governance frameworks eg COBIT ITIL Experience with regulatory compliance standards eg GDPR HIPAA SOX Excellent analytical problemsolving and communication skills Relevant certifications eg CISA CRISC CISM are a plus Skills Strong leadership and team management skills Ability to work collaboratively with crossfunctional teams Proficiency in risk assessment and management tools Excellent organizational and project management skills Strong attention to detail and ability to manage multiple priorities
Posted 2 weeks ago
0.0 - 1.0 years
6 - 8 Lacs
Noida
Work from Office
Key Responsibilities: Application Management: Oversee the end-to-end lifecycle of business applications, ensuring their performance, security, and continuous availability. Technology Optimization: Lead efforts to optimize application performance and ensure scalability to meet future business needs. Troubleshooting & Support: Provide level 2/3 support for technical issues related to applications, minimizing downtime and ensuring business continuity. System Upgrades & Patches: Manage the rollout of system updates, software patches, and enhancements with minimal disruption to business operations. Autosys - minimum 2 years experience, Unix - 2 years, WCC exposure
Posted 2 weeks ago
9.0 - 13.0 years
27 - 32 Lacs
Bengaluru
Work from Office
Key Responsibilities: Application Management: Oversee the end-to-end lifecycle of business applications, ensuring their performance, security, and continuous availability. Technology Optimization: Lead efforts to optimize application performance and ensure scalability to meet future business needs. Troubleshooting & Support: Provide level 2/3 support for technical issues related to applications, minimizing downtime and ensuring business continuity. System Upgrades & Patches: Manage the rollout of system updates, software patches, and enhancements with minimal disruption to business operations. Autosys - minimum 2 years experience, Unix - 2 years, WCC exposure.
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
31458 Jobs | Dublin
Wipro
16542 Jobs | Bengaluru
EY
10788 Jobs | London
Accenture in India
10711 Jobs | Dublin 2
Amazon
8660 Jobs | Seattle,WA
Uplers
8559 Jobs | Ahmedabad
IBM
7988 Jobs | Armonk
Oracle
7535 Jobs | Redwood City
Muthoot FinCorp (MFL)
6170 Jobs | New Delhi
Capgemini
6091 Jobs | Paris,France