Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 5.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: McAfee DLP. Experience: 3-5 Years.
Posted 1 day ago
3.0 - 5.0 years
7 - 11 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SAP Security. Experience: 3-5 Years.
Posted 1 day ago
8.0 - 10.0 years
12 - 17 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Information Protection. Experience: 8-10 Years.
Posted 1 day ago
8.0 - 10.0 years
12 - 17 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Entra ID. Experience: 8-10 Years.
Posted 1 day ago
8.0 - 10.0 years
12 - 17 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Security Information Event Management. Experience: 8-10 Years.
Posted 1 day ago
8.0 - 10.0 years
12 - 17 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Saviynt. Experience: 8-10 Years.
Posted 1 day ago
10.0 - 14.0 years
30 - 40 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: PKI - Certificate Management. Experience: 10 YEARS.
Posted 1 day ago
7.0 - 12.0 years
12 - 16 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails
Posted 1 day ago
2.0 - 7.0 years
1 - 5 Lacs
Kolkata, Hyderabad, Pune
Work from Office
Security Trust Analyst1 Job Title: Security Trust Analyst Location: Bangalore, India Work Mode: Hybrid (Minimum 2 days/week from office) About the Role We are seeking a Security Trust Analyst to join our Global Trust Office as an individual contributor. In this hands-on role, you will work closely with sales teams and internal security functions to demonstrate that our security and compliance controls meet industry-leading standards. You will also engage with cross-functional stakeholders across Compliance, Legal, Privacy, Product, and Engineering teams. The ideal candidate is detail-oriented, collaborative, and passionate about cybersecurity and compliance, with a strong understanding of industry frameworks such as ISO 27001, PCI DSS, and AICPA SOC . Key Responsibilities Perform first-line review of incoming Trust Office cases in Salesforce, validate case accuracy, and assign for further action. Respond to requests from internal sales teams regarding security and compliance inquiries from customers and prospects. Prepare and distribute weekly reports from Salesforce. Manage distribution of Security and Trust Assurance Packets (STAP) to customers and prospects. Collaborate with internal teams (Security, Product, Engineering, etc.) to communicate and support DocuSigns compliance posture. Contribute to continuous improvement initiatives within the Global Trust Office. Perform additional tasks and responsibilities as assigned. Support after-hours requests on an as-needed basis. What Youll Bring Basic Qualifications: Bachelors degree or equivalent work experience in Computer Science, Cybersecurity, GRC (Governance, Risk & Compliance), or related field. Minimum 2 years of relevant experience in cybersecurity or compliance-related roles. Familiarity with security and compliance frameworks such as:SSAE16, ISO 27001, NIST, PCI DSS, SOC, SIG, CSA, HIPAA, HITRUST, FedRAMP. Experience working in a SaaS or cloud solutions environment. Proficiency with Salesforce and Google Workspace tools. Strong analytical, communication, and presentation skills. Detail-oriented with excellent organizational and time management skills. Comfortable working across cross-functional teams and stakeholders. Strong passion for continuous learning and improvement. Understanding of the role of supply chain security in customer assurance. Work Environment Hybrid Work Model: This is a hybrid position requiring a presence in the Bangalore office a minimum of 2 days per week , with flexibility for remote work based on team and business needs. Location - Pune,Hyderabad,Kolkata,Jaipur,Chandigarh
Posted 1 day ago
2.0 - 4.0 years
2 - 4 Lacs
Mumbai
Work from Office
Minimum 2-4 years of experience in Security Operations Centre Experience across SOC domains use case creation, incident management, threat hunting, threat intelligence etc. Solid understanding of cyber security, network security, end point security concepts Good understanding of recent cyber threats, latest attack vectors Must have experience in any one SIEM (Splunk), EDR and SOAR solution Must have experience in leading/managing SOC shifts Experience in shift roster creation, resource management etc. Will be responsible for critical incident investigation, use case review, mentoring Shift Leads, SLA management etc.
Posted 1 day ago
7.0 - 12.0 years
9 - 17 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails
Posted 1 day ago
8.0 - 10.0 years
22 - 27 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Threat Protection Experience: 8-10 Years
Posted 1 day ago
8.0 - 10.0 years
22 - 27 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: ServiceNow SecOps Experience: 8-10 Years
Posted 1 day ago
8.0 - 10.0 years
22 - 27 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Palo Alto Networks - Firewall Experience: 8-10 Years
Posted 1 day ago
8.0 - 10.0 years
22 - 27 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Data Security Consulting Experience: 8-10 Years
Posted 1 day ago
3.0 - 8.0 years
5 - 10 Lacs
Bengaluru
Work from Office
Job Title : Data Privacy Manager (C1) - India Legal Compliance This position demands a global perspective, focusing on compliance with data privacy laws across regions, including GDPR in Europe, DPDP in India, CCPA in California, and other international mandates. The Data Privacy Manager must ensure the protection of Personally Identifiable Information (PII) and Sensitive Personal Information (SPI), fostering a robust framework that mitigates risks and strengthens the organizations security posture. Position Overview The Data Privacy Manager is responsible for overseeing the organizations efforts to ensure the protection of sensitive data, compliance with data privacy regulations, and alignment with industry best practices. This role plays a crucial part in maintaining trust with customers, partners, and employees by protecting personal and confidential information. Key Responsibilities Compliance and Regulation Management Monitor and ensure adherence to data protection regulations such as GDPR, DPDP (India), CCPA, HIPAA, or other applicable laws. Creating, maintaining, and updating data privacy policies, procedures, and guidelines to align with legal requirements and industry best practices. Conducting privacy impact assessments (PIAs) and data protection impact assessments (DPIAs) to identify and mitigate potential risks associated with data processing activities. Stay updated on changes in data privacy laws and advise the organization accordingly. Conduct regular audits and risk assessments to identify failure modes and areas of improvement. Strategic Leadership Lead initiatives to promote a culture of data privacy and protection within the organization. Collaborate with cross-functional teams, including IT, legal, and HR, to ensure data privacy compliance across all departments. Develop strategies for data governance and ensure alignment with organizational goals. Privacy by Design Ensuring privacy is embedded into the design and development of new products and services. Incident Response and Prevention Managing data breach incidents, including investigation, remediation, and reporting to relevant authorities. Training and Awareness Organize training sessions and workshops to educate employees on data privacy standards and practices. Ensure that all parties handling sensitive data are aware of their responsibilities under relevant laws and company policies. Vendor Management Overseeing the privacy practices of third-party vendors and ensuring they meet the organization's data protection standards. Educational Requirements A bachelor's degree or higher in fields like Law, Information Technology and Computer Science or a similar field is preferred. Technical Skills: Familiarity with data security concepts like encryption, data masking, anonymization, and pseudonymization is necessary, as well as knowledge of IT systems and data management. Analytical and Problem-Solving Skills: The ability to identify and address data privacy risks and challenges. Communication Skills: Being able to clearly explain complex privacy concepts and policies to various audiences. Certifications: Privacy certifications like CIPP, CIPM, or CIPT can demonstrate expertise in data privacy principles and practices. Soft Skills: Collaboration: Working effectively with various teams across the organization, including IT, Legal, HR, and Marketing. Attention to Detail: Meticulousness is essential when dealing with sensitive data and regulatory compliance. Leadership and Organizational Skills: Overseeing privacy program implementation and managing teams effectively. Ethical Mindset: Handling sensitive information responsibly and upholding privacy rights
Posted 1 day ago
10.0 - 16.0 years
60 - 90 Lacs
Bengaluru
Remote
Principal Product Manager Experience: 10 - 16 Years Exp Salary : INR 60-90 Lacs per annum Preferred Notice Period : 60 Days Shift : 9:30 AM to 6:30 PM IST Opportunity Type: Remote Placement Type: Permanent (*Note: This is a requirement for one of Uplers' Clients) Must have skills required : Information Security OR threat products AND Product Management OR Product Manager Role Overview Description About the role Netskope Product Managers use their passion for enterprise/cloud networking and security to bridge customer business requirements with key market trends, and deliver world-class products to market. You will work closely with customers and prospects to present our solutions and understand their requirements, and you will partner with engineering, marketing and the field to define the product roadmap, launch the product and develop an effective GTM plan. Please note this team is hiring across all levels, and candidates are individually assessed and appropriately levelled based upon their skills and experience. We are hiring a highly skilled Principal Product Manager with Cyber Security experience to lead our product strategy for enhanced visibility and threat detection. This crucial role demands in-depth knowledge of cybersecurity, networking, and particularly cloud-native security. The ideal candidate will own the entire product lifecycle, requiring a blend of business acumen, technical expertise, and a strong customer and market focus to present security solutions, define product requirements, and oversee successful product launches. This position involves close collaboration with engineering, sales, and marketing teams to translate business objectives into clear technical specifications. What you will be doing Define the product vision and roadmap for data & threat products. Conduct market research and competitive analysis to identify opportunities and trends. Collaborate with engineering, design, and marketing teams to deliver successful product launches. Gather and prioritise product requirements and user stories. Collaborates with UX/UI designers and development teams to build delightful end-user experiences. Act as the primary point of contact for cybersecurity products within the organisation. Present product updates and strategies to stakeholders. Monitor product performance and make data-driven decisions for improvement. Required skills and experience Mandatory: 10+ years of work experience in the Software/IT industry is mandatory. 5+ years of Product Management experience is mandatory. Experience and interest in getting your hands dirty (do User Acceptance Testing, do live demos to prospects and field teams, review product documentation, high-level UX wire-framing) on high-tech products is mandatory. Experience representing the customer; experience being the champion and voice of customers by building impactful, personal relationships with customers, engineering teams, and the field, in addition to bringing the customers voice into the creation process. Experience in fast-paced environments with overlapping projects/deliverables. Desirable: 2+ years of experience building or product managing cybersecurity products is desirable. 2+ years of experience building or product managing SIEM, detection-based products is desirable. 2+ years of experience in a customer-facing technical role TPM/TME/or Solution Architect pre-sales roles is desirable. 2+ years of experience working at high-tech startups is desirable. Previous experience in a technical role (e.g., Development, QE, system engineering, solutions architecture, support, R&D) is desirable. AI/ML experience is desirable. Skills: Strong analytical and problem-solving skills are required. Strong interpersonal skills, leading and contributing to cross-functional teams. Very strong (written and verbal) communication and presentation skills. Self-motivated and entrepreneurial mindset. Education & Travel: BS/BA in Computer Science or business required, MS or MBA preferred Ability to travel up to 25% (to USA, domestic customers/trade shows) Benefits: Competitive salary and benefits package. Opportunity to work on cutting-edge cybersecurity technologies. Collaborative and dynamic work environment. How to apply for this opportunity: Easy 3-Step Process: 1. Click On Apply! And Register or log in on our portal 2. Upload updated Resume & Complete the Screening Form 3. Increase your chances to get shortlisted & meet the client for the Interview! About Our Client: Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. Fast and easy to use, the Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. About Uplers: Our goal is to make hiring and getting hired reliable, simple, and fast. Our role will be to help all our talents find and apply for relevant product and engineering job opportunities and progress in their career. (Note: There are many more opportunities apart from this on the portal.) So, if you are ready for a new challenge, a great work environment, and an opportunity to take your career to the next level, don't hesitate to apply today. We are waiting for you!
Posted 2 days ago
10.0 - 16.0 years
60 - 90 Lacs
Bengaluru
Remote
Principal Product Manager Experience: 10 - 16 Years Exp Salary : INR 60-90 Lacs per annum Preferred Notice Period : 60 Days Shift : 9:30 AM to 6:30 PM IST Opportunity Type: Remote Placement Type: Permanent (*Note: This is a requirement for one of Uplers' Clients) Must have skills required : Information Security OR threat products AND Product Management OR Product Manager Role Overview Description About the role Netskope Product Managers use their passion for enterprise/cloud networking and security to bridge customer business requirements with key market trends, and deliver world-class products to market. You will work closely with customers and prospects to present our solutions and understand their requirements, and you will partner with engineering, marketing and the field to define the product roadmap, launch the product and develop an effective GTM plan. Please note this team is hiring across all levels, and candidates are individually assessed and appropriately levelled based upon their skills and experience. We are hiring a highly skilled Principal Product Manager with Cyber Security experience to lead our product strategy for enhanced visibility and threat detection. This crucial role demands in-depth knowledge of cybersecurity, networking, and particularly cloud-native security. The ideal candidate will own the entire product lifecycle, requiring a blend of business acumen, technical expertise, and a strong customer and market focus to present security solutions, define product requirements, and oversee successful product launches. This position involves close collaboration with engineering, sales, and marketing teams to translate business objectives into clear technical specifications. What you will be doing Define the product vision and roadmap for data & threat products. Conduct market research and competitive analysis to identify opportunities and trends. Collaborate with engineering, design, and marketing teams to deliver successful product launches. Gather and prioritise product requirements and user stories. Collaborates with UX/UI designers and development teams to build delightful end-user experiences. Act as the primary point of contact for cybersecurity products within the organisation. Present product updates and strategies to stakeholders. Monitor product performance and make data-driven decisions for improvement. Required skills and experience Mandatory: 10+ years of work experience in the Software/IT industry is mandatory. 5+ years of Product Management experience is mandatory. Experience and interest in getting your hands dirty (do User Acceptance Testing, do live demos to prospects and field teams, review product documentation, high-level UX wire-framing) on high-tech products is mandatory. Experience representing the customer; experience being the champion and voice of customers by building impactful, personal relationships with customers, engineering teams, and the field, in addition to bringing the customers voice into the creation process. Experience in fast-paced environments with overlapping projects/deliverables. Desirable: 2+ years of experience building or product managing cybersecurity products is desirable. 2+ years of experience building or product managing SIEM, detection-based products is desirable. 2+ years of experience in a customer-facing technical role TPM/TME/or Solution Architect pre-sales roles is desirable. 2+ years of experience working at high-tech startups is desirable. Previous experience in a technical role (e.g., Development, QE, system engineering, solutions architecture, support, R&D) is desirable. AI/ML experience is desirable. Skills: Strong analytical and problem-solving skills are required. Strong interpersonal skills, leading and contributing to cross-functional teams. Very strong (written and verbal) communication and presentation skills. Self-motivated and entrepreneurial mindset. Education & Travel: BS/BA in Computer Science or business required, MS or MBA preferred Ability to travel up to 25% (to USA, domestic customers/trade shows) Benefits: Competitive salary and benefits package. Opportunity to work on cutting-edge cybersecurity technologies. Collaborative and dynamic work environment. How to apply for this opportunity: Easy 3-Step Process: 1. Click On Apply! And Register or log in on our portal 2. Upload updated Resume & Complete the Screening Form 3. Increase your chances to get shortlisted & meet the client for the Interview! About Our Client: Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. Fast and easy to use, the Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. About Uplers: Our goal is to make hiring and getting hired reliable, simple, and fast. Our role will be to help all our talents find and apply for relevant product and engineering job opportunities and progress in their career. (Note: There are many more opportunities apart from this on the portal.) So, if you are ready for a new challenge, a great work environment, and an opportunity to take your career to the next level, don't hesitate to apply today. We are waiting for you!
Posted 2 days ago
10.0 - 16.0 years
60 - 90 Lacs
Bengaluru
Remote
Principal Product Manager Experience: 10 - 16 Years Exp Salary : INR 60-90 Lacs per annum Preferred Notice Period : 60 Days Shift : 9:30 AM to 6:30 PM IST Opportunity Type: Remote Placement Type: Permanent (*Note: This is a requirement for one of Uplers' Clients) Must have skills required : Information Security OR threat products AND Product Management OR Product Manager Role Overview Description About the role Netskope Product Managers use their passion for enterprise/cloud networking and security to bridge customer business requirements with key market trends, and deliver world-class products to market. You will work closely with customers and prospects to present our solutions and understand their requirements, and you will partner with engineering, marketing and the field to define the product roadmap, launch the product and develop an effective GTM plan. Please note this team is hiring across all levels, and candidates are individually assessed and appropriately levelled based upon their skills and experience. We are hiring a highly skilled Principal Product Manager with Cyber Security experience to lead our product strategy for enhanced visibility and threat detection. This crucial role demands in-depth knowledge of cybersecurity, networking, and particularly cloud-native security. The ideal candidate will own the entire product lifecycle, requiring a blend of business acumen, technical expertise, and a strong customer and market focus to present security solutions, define product requirements, and oversee successful product launches. This position involves close collaboration with engineering, sales, and marketing teams to translate business objectives into clear technical specifications. What you will be doing Define the product vision and roadmap for data & threat products. Conduct market research and competitive analysis to identify opportunities and trends. Collaborate with engineering, design, and marketing teams to deliver successful product launches. Gather and prioritise product requirements and user stories. Collaborates with UX/UI designers and development teams to build delightful end-user experiences. Act as the primary point of contact for cybersecurity products within the organisation. Present product updates and strategies to stakeholders. Monitor product performance and make data-driven decisions for improvement. Required skills and experience Mandatory: 10+ years of work experience in the Software/IT industry is mandatory. 5+ years of Product Management experience is mandatory. Experience and interest in getting your hands dirty (do User Acceptance Testing, do live demos to prospects and field teams, review product documentation, high-level UX wire-framing) on high-tech products is mandatory. Experience representing the customer; experience being the champion and voice of customers by building impactful, personal relationships with customers, engineering teams, and the field, in addition to bringing the customers voice into the creation process. Experience in fast-paced environments with overlapping projects/deliverables. Desirable: 2+ years of experience building or product managing cybersecurity products is desirable. 2+ years of experience building or product managing SIEM, detection-based products is desirable. 2+ years of experience in a customer-facing technical role TPM/TME/or Solution Architect pre-sales roles is desirable. 2+ years of experience working at high-tech startups is desirable. Previous experience in a technical role (e.g., Development, QE, system engineering, solutions architecture, support, R&D) is desirable. AI/ML experience is desirable. Skills: Strong analytical and problem-solving skills are required. Strong interpersonal skills, leading and contributing to cross-functional teams. Very strong (written and verbal) communication and presentation skills. Self-motivated and entrepreneurial mindset. Education & Travel: BS/BA in Computer Science or business required, MS or MBA preferred Ability to travel up to 25% (to USA, domestic customers/trade shows) Benefits: Competitive salary and benefits package. Opportunity to work on cutting-edge cybersecurity technologies. Collaborative and dynamic work environment. How to apply for this opportunity: Easy 3-Step Process: 1. Click On Apply! And Register or log in on our portal 2. Upload updated Resume & Complete the Screening Form 3. Increase your chances to get shortlisted & meet the client for the Interview! About Our Client: Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. Fast and easy to use, the Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. About Uplers: Our goal is to make hiring and getting hired reliable, simple, and fast. Our role will be to help all our talents find and apply for relevant product and engineering job opportunities and progress in their career. (Note: There are many more opportunities apart from this on the portal.) So, if you are ready for a new challenge, a great work environment, and an opportunity to take your career to the next level, don't hesitate to apply today. We are waiting for you!
Posted 2 days ago
5.0 - 9.0 years
0 Lacs
pune, maharashtra
On-site
You will be responsible for conducting application security reviews for Web, Mobile (Android and iOS), and API technologies. Your role will involve assessing and identifying potential vulnerabilities in the technology being developed before implementation. You should have expertise in application security testing methodologies such as SAST, DAST, and MAST, with experience in web application, API security, and mobile application security testing according to industry standards like OWASP top 10, SANS top 25, etc. It would be beneficial to have knowledge of programming and scripting languages such as Java, JavaScript, Angular, Spring Boot, Kotlin, and Swift. Familiarity with tools like Burp Suite, Postman, SoapUI, Checkmarx, Netsparker, Nexus IQ, Kryptowire for security testing and analyzing scanned reports is essential. Moreover, a strong understanding of application security tooling and experience in driving automation within the delivery environment is required. You must hold industry-recognized Information Security and Cyber Security qualifications such as CISSP, CISA, OSCP, GIAC GPEN, GIAC GMOB. A deep understanding of security industry trends, major vulnerabilities, and security threat landscape is crucial. Knowledge of Zero Trust security principles and practical implementations is necessary. While a degree is desirable, it is not mandatory. Experience in supporting major programs, security architecture, creating security designs, and displaying positive leadership behaviors related to risk management and mitigation is expected. Proficiency in collaboration tools like SharePoint, Teams, Confluence, and JIRA is advantageous. Hands-on experience in working with DevOps and Agile teams to incorporate security in the software development lifecycle is a key requirement. Additionally, experience in application risk assessment, threat modeling, and working closely with delivery teams for security risk remediation is important. About the Company: Purview is a leading Digital Cloud & Data Engineering company with headquarters in Edinburgh, United Kingdom and a presence in 14 countries including India, Poland, Germany, USA, UAE, Singapore, Australia, among others. The company provides services to Captive Clients and top-tier IT organizations, delivering solutions and resources to clients worldwide. Company Information: Purview Services 3rd Floor, Sonthalia Mind Space Near Westin Hotel, Gafoor Nagar, Hitechcity, Hyderabad Phone: +91 40 48549120 / +91 8790177967 Gyleview House, 3 Redheughs Rigg South Gyle, Edinburgh, EH12 9DQ Phone: +44 7590230910 Email: careers@purviewservices.com Login to Apply!,
Posted 3 days ago
4.0 - 8.0 years
0 Lacs
maharashtra
On-site
As a highly organized Cybersecurity Officer at AmeriPharma, you will play a crucial role in managing system-wide healthcare compliance, information security, and privacy regulations. Reporting to the Director of Regulatory Affairs, you will be responsible for ensuring regulatory excellence, information security, and adherence to federal and state laws. Your primary focus will be on fostering a culture of accountability, trust, and risk management across all IT infrastructures. Your duties will involve developing and managing a comprehensive cybersecurity program in compliance with regulations such as HITECH, providing cybersecurity support during software and network development, conducting security and risk assessments, and managing annual risk assessments, vulnerability management, and penetration testing. You will also be responsible for implementing security measures, overseeing compliance with patient data protection regulations, and managing cyber threats, incident response, and forensic investigations. To be successful in this role, you must have expertise in HIPAA, HITECH, HITRUST, and cybersecurity frameworks, along with extensive experience in risk management, information security, and regulatory compliance auditing. Strong technical knowledge in network security, cloud security, and identity access management is essential, as well as exceptional communication skills and the ability to make strategic, data-driven decisions in high-pressure environments. You will collaborate with IT teams to improve security controls across cloud, network, and endpoints, lead cybersecurity awareness training programs for employees, align cybersecurity initiatives with business objectives, and innovate in cybersecurity frameworks, AI-driven threat detection, and cloud security. Additionally, you will engage with industry leaders and regulatory bodies on emerging cybersecurity threats and develop and test software applications using Agile methodologies. The ideal candidate will have a Bachelor's degree in Computer Science, Information Technology, or a related field, along with certifications such as CompTIA A+, Network+, CISSP, CCNA, MSCE, or MCSD. A minimum of 4 years of experience in Engineering, Software Engineering, or related fields is required, as well as proficiency in cybersecurity tools and platforms. If you are passionate about cybersecurity, have a strong background in regulatory compliance and risk management, and are looking for a challenging and rewarding opportunity to make a difference in healthcare IT security, we invite you to join our dynamic team at AmeriPharma.,
Posted 3 days ago
4.0 - 8.0 years
14 - 18 Lacs
Bengaluru
Work from Office
Not just a job, but a career Yokogawa, award winner for Best Asset Monitoring Technology and Best Digital Twin Technology at the HP Awards, is a leading provider of industrial automation, test and measurement, information systems and industrial services in several industries. Our aim is to shape a better future for our planet through supporting the energy transition, (bio)technology, artificial intelligence, industrial cybersecurity, etc. We are committed to the United Nations sustainable development goals by utilizing our ability to measure and connect. About the Team Our 18,000 employees work in over 60 countries with one corporate mission, to "co-innovate tomorrow". We are looking for dynamic colleagues who share our passion for technology and care for our planet. In return, we offer you great career opportunities to grow yourself in a truly global culture where respect, value creation, collaboration, integrity, and gratitude are highly valued and exhibited in everything we do. Key Responsibilities: Planning, Governance & Execution: Lead the planning, governance, and execution of activities under the IT Planning & Control Center function. Define and implement standardized policies, templates, and project delivery frameworks . Maintain dashboards and reports for project tracking, risk management, and financial oversight . Ensure all projects meet company quality, budgetary, and compliance standards . IT Asset Management: Oversee the full lifecycle management of IT assets , including procurement, deployment, tracking, maintenance, and decommissioning. Ensure asset compliance with corporate policy, audit controls , and ISO 27001:2022 requirements. IT Service Management (ITSM): Implement and support ITIL-based service management processes aligned with ISO 20000:2018 standards. Manage and monitor ITSM activities such as incident, change, problem, and knowledge management using tools like ServiceNow, Remedy, or Jira. Drive continuous improvement initiatives to enhance service quality and operational efficiency. Compliance: ISO 27001:2022 & ISO 20000:2018 Actively participate in internal audits, risk assessments, and compliance evaluations under ISO 27001:2022 (Information Security) and ISO 20000:2018 (Service Management). Maintain evidence and documentation for controls, policies, asset protection , and incident response. Support external audits, lead corrective/preventive actions (CAPA) , and monitor closure effectiveness. IT Budgeting & Procurement: Develop, manage, and track annual IT budgets , forecasts, and cost allocations across business units. Drive procurement processes - including vendor coordination, PO lifecycle management , and licensing/renewal tracking . Identify opportunities for cost optimization , standardization, and license compliance. Operations & Resource Planning: Lead resource planning, onboarding, and utilization tracking aligned with project and business needs. Coordinate timesheet governance, billing validation , and third-party resource management. Interface with project and delivery teams to align execution with demand planning and capacity. Technical & Functional Expertise: Support strategic IT initiatives such as server/cloud migrations, infra transformation , and ERP integration. Ensure service delivery excellence in IT helpdesk and infrastructure management environments. Qualifications & Experience: Education: B.Tech/B.E. in Information Technology, Computer Science, or a related discipline. Experience: Minimum 6 years of experience in IT planning, operations, or project management. Strong hands-on experience with ISO 27001:2022 , ISO 20000:2018 , ITSM , and Asset Management . Strong project management skills including stakeholder management, communication, and collaboration . Excellent verbal and written communication skills with the ability to engage cross-functional teams. Demonstrated ability to manage IT budgets, procurement cycles , and vendor contracts. Certifications: ITIL Foundation (mandatory) PMP / PRINCE2 (preferred) ISO 27001:2022 Lead Auditor / Internal Auditor (preferred) ISO 20000:2018 Foundation or Auditor (preferred) Yokogawa is an Equal Opportunity Employer. Yokogawa wants a diverse, equitable and inclusive culture. We will actively recruit, develop, and promote people from a variety of backgrounds who differ in terms of experience, knowledge, thinking styles, perspective, cultural background, and socioeconomic status. We will not discriminate based on race, skin color, age, sex, gender identity and expression, sexual orientation, religion, belief, political opinion, nationality, ethnicity, place of origin, disability, family relations or any other circumstances. Yokogawa values differences and enables everyone to belong, contribute, succeed, and demonstrate their full potential. Are you being referred to one of our rolesIf so, ask your connection at Yokogawa about our Employee Referral process!
Posted 3 days ago
4.0 - 13.0 years
40 - 50 Lacs
Bengaluru
Work from Office
Position Summary... This role is suitable for a backend Java developer with strong knowledge of highly scalable APIs. Role demands to think from a customers experience perspective. The role requires working on the micro services based serving layer of Personalization Products. The associate may be involved in one or more business applications which are part of personalization portfolio. The associate would be working in a Global Team working closely in a distributed setup across timezone. What youll do... About Team: Personalization team at Walmart is dedicated to the mission of knowing our customers better and making it frictionless and faster for them to get what they want while building a trusted partnership with Walmart. We help bring a seamless experience to our customers irrespective of how and where they engage with us while shopping online or picking groceries at stores. We thrive to provide each customer with a journey tailored to their individual needs, preferences and routines. We operate at the intersection of huge Walmart assortment, millions of customers, thousands of stores and Walmart associates - a multi-layer multi-objective problem space which has a unique impact on Global customer base and powers assisted AI for our associates. The Personalization team consists of big data geeks, application engineers, scientists and product visionaries all working together to design, prototype and build technology-driven products and experiences that will change the future landscape of e-commerce. We are focused on building an intelligent system that will enable 1:1 personalized customer experience, from finding the product to delivering it to the customer. We are building state-of-the-art probabilistic models and engineering marvels to serve our customer needs by leveraging cutting edge machine learning, deep learning, reinforcement learning, natural language processing, entity-relationship extraction and knowledge representation. This will span many markets, business models and form factors; therefore, we are looking for scientists and engineers who will bring not only an abundance of experiences in technologies, but an abundant curiosity to innovate. What youll do: Design, develop, launch, sustenance and modernization of the highly scalable P13N Unified services and solve complex software systems problems by leveraging state-of-the-art technology. Provide technical direction, architecture leadership and expertise to the team. Drive projects of high visibility across the organization. Mentor and grow team members while working in an agile environment and ensure best engineering practices are followed. Participate in medium- to large-scale, complex, cross-functional projects by reviewing project, product and business requirements; translating requirements into technical solutions; gathering requested information (for example, design documents, product requirement); designing robust and scalable architectures; writing and developing code; conducting unit testing; communicating status and issues to team members and stakeholders; collaborating with cross functional teams; troubleshooting open issues and bug-fixes; enhancing design to prevent re-occurrences of defects; ensuring on-time delivery. What youll bring: Good knowledge of lambda architecture. Proficient in building scalable Microservices using Spring framework. Strong Expertise in Java, Object Oriented ; Functional Programming, Design Patterns. In depth knowledge of No-SQL and RDBMS technologies. Proficient with event driven architecture using Kafka. Advanced knowledge of complex software design, distributed system design, design patterns, data structures and algorithms. Working knowledge in container and cloud native technologies Kubernetes, Docker. Experience with CI/CD tools such as Jenkins and Maven. Strong expertise with Cloud Technologies like Azure and GCP. Experience in monitoring production system and using different systems like Grafana, Prometheus. Strong inclination towards exploring and learning new technologies. You have strong written and oral communication skills. Experience with all phases of the software development life cycle, best practices, and Agile Software Development. About Global Tech. Imagine working in an environment where one line of code can make life easier for hundreds of millions of people and put a smile on their face. Thats what we do at Walmart Global Tech. Were a team of 15,000; software engineers, data scientists and service professionals within Walmart, the worlds largest retailer, delivering innovations that improve how our customers shop and empower our 2.3 million associates. To others, innovation looks like an app, service or some code, but Walmart has always been about people. People are why we innovate, and people power our innovations. Being human-led is our true disruption. We are people-led and tech-empowered. We train our team in the skillsets of the future and bring in experts like you to help us grow. We have roles for those chasing their first opportunity as well as those looking for the opportunity that will define their career. Here, you can kickstart a great career in tech, gain new skills and experience for virtually every industry, or leverage your expertise to innovate at scale, impact millions and reimagine the future of retail Flexible, hybrid work: We use a hybrid way of working that is primarily in office coupled with virtual when not onsite. Our campuses serve as a hub to enhance collaboration, bring us together for purpose and deliver on business needs. This approach helps us make quicker decisions, remove location barriers across our global team and be more flexible in our personal lives. Benefits: Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include a host of best-in-class benefits maternity and parental leave, PTO, health benefits, and much more. Equal Opportunity Employer: Walmart, Inc. is an Equal Opportunity Employer By Choice. We believe we are best equipped to help our associates, customers, and the communities we serve live better when we really know them. That means understanding, respecting, and valuing unique styles, experiences, identities, ideas, and opinions while being welcoming of all people. Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Minimum Qualifications:Option 1: Bachelors degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 3years experience in software engineering or related area at a technology, retail, or data-driven company. Option 2: 5 years experience in software engineering or related area at a technology, retail, or data-driven company. Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, GISF, CISSP, CCSP, or GSEC, Master s degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 1 year s experience leading information security or cybersecurity projects Information Technology - CISCO Certification - Certification Primary Location... BLOCK- 1, PRESTIGE TECH PACIFIC PARK, SY NO. 38/1, OUTER RING ROAD KADUBEESANAHALLI, , India
Posted 3 days ago
0.0 - 3.0 years
3 - 7 Lacs
Bengaluru
Work from Office
Associate- Talent Acquisition Operations Back to job search results Tesco India Bengaluru, Karnataka, India Full-Time Apply by 13-Jul-2025 About the role We are seeking a detail-oriented and customer-focused Associate to join our Query Management Team. This role is ideal for someone who thrives in a fast-paced environment, is eager to learn, and is committed to providing timely, accurate, and high-quality support to internal stakeholders. You will be responsible for resolving queries efficiently while meeting key What is in it for you At Tesco, we are committed to providing the best for you. As a result, our colleagues enjoy a unique, differentiated, market- competitive reward package, based on the current industry practices, for all the work they put into serving our customers, communities and planet a little better every day. Our Tesco Rewards framework consists of pillars - Fixed Pay, Incentives, and Benefits. Total Rewards offered at Tesco is determined by four principles - simple, fair, competitive, and sustainable. Salary - Your fixed pay is the guaranteed pay as per your contract of employment. Performance Bonus - Opportunity to earn additional compensation bonus based on performance, paid annually Leave & Time-off - Colleagues are entitled to 30 days of leave (18 days of Earned Leave, 12 days of Casual/Sick Leave) and 10 national and festival holidays, as per the company s policy. Making Retirement Tension-FreeSalary - In addition to Statutory retirement beneets, Tesco enables colleagues to participate in voluntary programmes like NPS and VPF. Health is Wealth - Tesco promotes programmes that support a culture of health and wellness including insurance for colleagues and their family. Our medical insurance provides coverage for dependents including parents or in-laws. Mental Wellbeing - We offer mental health support through self-help tools, community groups, ally networks, face-to-face counselling, and more for both colleagues and dependents. Financial Wellbeing - Through our financial literacy partner, we offer one-to-one financial coaching at discounted rates, as well as salary advances on earned wages upon request. Save As You Earn (SAYE) - Our SAYE programme allows colleagues to transition from being employees to Tesco shareholders through a structured 3-year savings plan. Physical Wellbeing - Our green campus promotes physical wellbeing with facilities that include a cricket pitch, football field, badminton and volleyball courts, along with indoor games, encouraging a healthier lifestyle. You will be responsible for We are seeking a detail-oriented and customer-focused Associate to join our Query Management Team. This role is ideal for someone who thrives in a fast-paced environment, is eager to learn, and is committed to providing timely, accurate, and high-quality support to internal stakeholders. You will be responsible for resolving queries efficiently while meeting key You will need Ticketing System Proficiency Experience in coordinating with multiple stake holders Query Categorization & Prioritization Experience in delivery of change projects First-Time Resolution (FTR) Experience working with Legal & Information security, Customer service orientation compliance teams preferred Proficient in Microsoft Office Excellent verbal and written communication in English Quality Assurance Analysis and Problem Solving Eye for detail About us Tesco in Bengaluru is a multi-disciplinary team serving our customers, communities, and planet a little better every day across markets. Our goal is to create a sustainable competitive advantage for Tesco by standardising processes, delivering cost savings, enabling agility through technological solutions, and empowering our colleagues to do even more for our customers. With cross-functional expertise, a wide network of teams, and strong governance, we reduce complexity, thereby offering high-quality services for our customers. Tesco in Bengaluru, established in 2004 to enable standardisation and build centralised capabilities and competencies, makes the experience better for our millions of customers worldwide and simpler for over 3,30,000 colleagues. Tesco Business Solutions: Established in 2017, Tesco Business Solutions (TBS) has evolved from a single entity traditional shared services in Bengaluru, India (from 2004) to a global, purpose-driven solutions-focused organisation. TBS is committed to driving scale at speed and delivering value to the Tesco Group through the power of decision science. With over 4,400 highly skilled colleagues globally, TBS supports markets and business units across four locations in the UK, India, Hungary, and the Republic of Ireland. The organisation underpins everything that the Tesco Group does, bringing innovation, a solutions mindset, and agility to its operations and support functions, building winning partnerships across the business. TBSs focus is on adding value and creating impactful outcomes that shape the future of the business. TBS creates a sustainable competitive advantage for the Tesco Group by becoming the partner of choice for talent, transformation, and value creation Apply
Posted 3 days ago
2.0 - 6.0 years
6 - 10 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
To design, implement, and maintain robust cybersecurity and information security frameworks that protect Sol-Millennium s global digital infrastructure and sensitive data assets. The position plays a critical role in enabling secure digital transformation, maintaining compliance with international data protection regulations, and protecting the trust of customers and stakeholders through proactive threat management and governance. Develop, enforce, and maintain information security policies, standards, and controls aligned with industry best practices (e.g., NIST, ISO 27001). Identify, evaluate, and remediate system and application vulnerabilities, prioritizing the resolution of known opportunities. Configure and maintain core security infrastructure, including firewalls, SIEM, IDS/IPS, endpoint protection, and identity access controls. Monitor threat intelligence feeds and respond to real-time threats; support the implementation of a 24/7 Security Operations Center (SOC) or SIEM platform. Conduct risk assessments, security audits, and compliance reviews across cloud, on-premises, and hybrid environments. Ensure adherence to international security and privacy regulations such as GDPR, HIPAA, and other applicable regional standards. Lead phishing simulation exercises and drive end-user cybersecurity awareness programs. Collaborate with DevOps and IT teams to embed security controls into CI/CD pipelines (DevSecOps). Support compliance audits and maintain regulatory remediation tracking. Identify and mitigate risks related to: Legacy systems and misconfigurations , which expose critical attack surfaces. Delayed breach detection , which can significantly increase operational and reputational impact. Unpatched known vulnerabilities , which leave extended exposure windows for attackers. Outdated software components , often exploited in ransomware attacks across endpoints and servers. Database vulnerabilities , ensuring proper hardening and access control. Third-party SaaS platforms , enforcing secure configurations and vendor risk management. Evaluate third-party vendors for alignment with internal data security and privacy standards. Develop and operationalize incident response know how. Coordinate the design or vendor selection of a 24/7 Security Operations Center and SIEM platform. Lead remedy efforts for legacy applications and infrastructure with a focus on misconfigurations and technical debt reduction Establish and report on key security metrics, phishing simulation failure rates, and policy audit results Assess and monitor third-party platforms and SaaS tools for security risks, and enforce secure vendor onboarding standards Essential tools hands on, Qualys/Nessus/Rapid7 Microsoft Sentinel Metasploit Framework/Burp Suite/Nmap Microsoft Defender for Endpoint Wireshark Azure Active Directory/Ping Identity Microsoft Defender for Cloud Microsoft Purview Compliance Manager Microsoft Threat Intelligence Microsoft Defender XDR Qualifications: Minimum 5 years of experience in both Information Security and Cybersecurity roles Hands-on experience with SIEM tools, endpoint protection, firewalls, and network security Solid understanding of security governance, data classification, IAM, and compliance frameworks Demonstrated ability to handle incident response and lead vulnerability remediation efforts
Posted 3 days ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
31458 Jobs | Dublin
Wipro
16542 Jobs | Bengaluru
EY
10788 Jobs | London
Accenture in India
10711 Jobs | Dublin 2
Amazon
8660 Jobs | Seattle,WA
Uplers
8559 Jobs | Ahmedabad
IBM
7988 Jobs | Armonk
Oracle
7535 Jobs | Redwood City
Muthoot FinCorp (MFL)
6170 Jobs | New Delhi
Capgemini
6091 Jobs | Paris,France