Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
7.0 - 12.0 years
12 - 17 Lacs
Hyderabad
Work from Office
Job Statement: NopalCyber makes cybersecurity manageable, affordable, reliable, and powerful for companies that need to be resilient and compliant. Managed extended detection and response (MXDR), attack surface management (ASM), breach and attack simulation (BAS), and advisory services fortify your cybersecurity across both offense and defense. AI-driven intelligence in our Nopal360 platform, our NopalGo mobile app, and our proprietary Cyber Intelligence Quotient (CIQ) lets anyone quantify, track, and visualize their cybersecurity posture in real-time. Our service packages are tailored to client needs and budgets, with external threat analysis provided at no costdemocratizing access to enterprise-grade cybersecurity for all. We are looking for a high-energy, results-oriented GRC professional with 6 to 10 years of experience , combining expertise in IT and Governance, Risk, and Compliance (GRC) . The candidate will report directly to the CISO’s office and contribute to internal audits and projects executed under CISO’s instructions . Key Responsibilities: Serve as a subject matter expert on information and cybersecurity governance, risk, and compliance (GRC) services and solutions. Execute security assessments of on-premise/cloud IT environments aligned with business objectives and regulatory requirements. Conduct testing and validation of IT security controls, documenting findings and preparing detailed reports. Manage and perform internal audits as per the CISO’s directives , contributing to risk posture improvements and present the metrics to the CISO on a regular basis. Apply knowledge of the Digital Personal Data Protection Act, 2023 , and other global data protection laws. Utilize and manage GRC tools and platforms. Conduct security control assessments for web/mobile applications and enterprise systems. Drive third-party risk management and support client-facing initiatives. Deliver complex GRC projects in dynamic, fast-paced environments. Engage in knowledge-sharing forums to strengthen team capabilities. Continuously enhance the cybersecurity strategy based on evolving threats and technologies. Job Requirements: 1. Qualifications: Bachelor’s degree in Engineering or a related technology discipline. Mandatory Certification : Must possess CISA or ISO 27001 Lead Auditor certification. Additional certifications preferred: ISO 27001 Lead Implementer CISSP, CIPP, CCSK, or CCSP Public Cloud certifications (AWS, Azure, GCP) 2. Experience: 6 to 10 years of total experience with proven exposure to both IT and GRC functions . Experience in internal audits, consulting, and cybersecurity risk advisory. 3. Desired Skills: Deep understanding of information security principles and compliance frameworks. Strong understanding of the IT topology and application development principles Hands-on experience with security tools (e.g., vulnerability scanners, code review platforms). Strong exposure to IT/cybersecurity standards: ISO 27001/27005, NIST CSF, PCI DSS, SOC 1/2, GDPR, COBIT. Excellent communication skills, documentation abilities, and stakeholder engagement. Experience in program and project management within cybersecurity initiatives. 4. Personal Attributes: Self-starter with strong problem-solving skills. Highly motivated and able to work with minimal supervision. Strong prioritization and multitasking abilities under pressure.
Posted 11 hours ago
6.0 - 10.0 years
15 - 25 Lacs
Gurugram
Work from Office
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you passionate about cybersecurity and looking for an exciting role where you can make a difference? If so, we have an opportunity for you! As a Security Specialist at Kyndryl, you will play a crucial role in enabling and securing our customer organizations, cultures, and ecosystems. Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and security awareness workshops. You will be tasked with configuring, monitoring, and managing the performance of networks to maintain the quality of services, while also protecting organizational infrastructure from malicious cyber-attacks. As a key member of our team, you will assess, predict, prevent, and manage the risk of IT infrastructure and data, helping our customers stay ahead of the curve and ensure their systems are secure. You will develop and implement security policies and procedures, working closely with other departments to ensure that all security measures are in place and operating effectively. But that is not all – at Kyndryl you will have the opportunity to explore innovation in CyberSecurity data science – taking information that has been gathered and looking for areas to have that “Ah Ha” moment. Drawing conclusions and patterns from the data across single and multiple clients. Creating new ideas in the area of risk management and risk quantification. In addition to your technical responsibilities, you will also play a key role in raising awareness of potential security threats through technical security training on best practices. This is an exciting opportunity to help shape the culture of our clients' organizations and make a tangible impact on their security posture. If you have a passion for cybersecurity – governance, risk and compliance, are looking for a challenging and dynamic role, and want to work with a team of like-minded individuals, then we want to hear from you! Join us as a Security Specialist and help us secure the future of our clients' organizations. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are Required Technical and Professional Experience 5+ years in IT security profile. Education : MCA / B.E. / B. Tech Project Experience : Minimum of 3+ years in security requirements, cyber security, IT security audits, certifications, etc., in at least 2 IT projects Certifications : ISO 27001 & CISSP (Certified Information Systems Security Professional) Responsibilities Facilitate review of the data security architecture as per the requirements. Facilitate review of the configuration of the required IT security infrastructure as per the law or as requested by the client against the acceptance criteria. Monitor activities related to periodic security testing/audits as per client requirements. Implement any new or existing guidelines/policies/acts issued by the Government of India on IT Security. Location : Requires working from Client location in Delhi Preferred Technical and Professional Experience CISSP (Certified Information Systems Security Professional) certification. ISO 27001 Certification. Other relevant certifications like CISM (Certified Information Security Manager) or CEH (Certified Ethical Hacker) can be beneficial. Excellent communication skills to effectively interact with stakeholders and educate employees on security best practices. Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted 11 hours ago
4.0 - 8.0 years
12 - 22 Lacs
Hyderabad
Work from Office
Quest is seeking a motivated self-starter with excellent interpersonal, communication, and presentation skill to join the IT Security Risk and Assurance team to work with internal and external customers to address IT Audit and assurance related requests in the areas of IT, IT security and privacy and compliance. This role will be primarily responsible for responding to, coordinating, and managing IT Security assessment and audit inquiries from our clients and regulators.
Posted 14 hours ago
4.0 - 9.0 years
15 - 30 Lacs
Hyderabad
Work from Office
The primary responsibilities include managing vulnerability assessments using the Qualys tool, creating detailed metrics and reports, and collaborating with relevant teams to ensure timely remediation of identified vulnerabilities. To ensure the organization's IT infrastructure remains secure by proactively identifying, assessing, and mitigating vulnerabilities through effective use of the Qualys tool and coordinated efforts with cross-functional teams. The basic purpose of this position is to safeguard the organization's digital assets by maintaining a robust vulnerability management program that prioritizes risk reduction and compliance with security policies. Perform daily vulnerability assessments, create weekly metrics and reports, and handle ad-hoc requests as they arise. Work on analytical projects to enhance the vulnerability management process and develop strategies to address identified security issues. Prepare and present metrics and reports to senior leadership, showcasing trends in vulnerabilities over the year and how they are being addressed. Produce reports daily, weekly, and as needed on vulnerability assessments and remediation efforts. Responsible for training new hires and occasionally participating in candidate interviews. Technical/Job Specific Knowledge Vulnerability Management: In-depth knowledge of vulnerability assessment, prioritization, and remediation processes. Qualys: Proficiency in using Qualys for scanning, identifying, and managing vulnerabilities across various environments. Security Frameworks: Familiarity with industry standards and frameworks such as OWASP, NIST, and CIS. Network Security: Understanding of network protocols, firewalls, and intrusion detection/prevention systems. Skills Analytical Skills: Strong analytical abilities to identify and assess vulnerabilities and their potential impact. Technical Aptitude: Competence in using security tools and technologies to perform thorough assessments. Problem-Solving: Effective problem-solving skills to develop and implement remediation plans. Communication: Clear and concise communication skills to report findings and collaborate with different teams. Attention to Detail: High level of attention.
Posted 15 hours ago
4.0 - 9.0 years
20 - 25 Lacs
Noida
Work from Office
Location: Noida Experience: Minimum 4- 10 years Responsibilities: Assist in the implementation and maintenance of information security strategies, ensuring alignment with regulatory requirements, industry standards, and business goals. Support the development and enforcement of information security policies, procedures, and best practices to protect data integrity, confidentiality, and availability. Monitor security alerts, analyze potential threats, and assist in incident detection, response, and resolution to mitigate security risks. Conduct risk assessments and vulnerability scans to identify security weaknesses and assist in remediation efforts. Work closely with engineering and IT teams to embed security best practices across the software development lifecycle and cloud infrastructure. Assist in security audits, compliance checks, and regulatory reporting to ensure adherence to RBI guidelines, DPDP Act, ISO 27001, and Cert-IN regulations. Manage and configure security tools such as firewalls, IDS/IPS, SIEM, endpoint protection, and vulnerability scanners. Assist in access control management, ensuring appropriate permissions and role-based access policies are in place. Contribute to security awareness programs, helping employees understand cybersecurity threats and best practices. Stay updated on emerging security threats, attack vectors, and defensive technologies, recommending enhancements to security processes. Qualifications and Skills: Bachelors degree in Information Security, Computer Science, IT, or a related field. Minimum of 4 years of experience in information security, cybersecurity operations, or risk management. Hands-on experience with firewalls, IDS/IPS, SIEM tools, endpoint security, and vulnerability management. Strong understanding of network security, encryption, identity and access management (IAM), and cloud security (AWS, Azure, or GCP). Knowledge of security frameworks such as ISO 27001, NIST, CIS Controls, and RBI IT Guidelines. Exposure to penetration testing, security log analysis, incident response, and threat intelligence. Strong problem-solving, analytical, and communication skills. Relevant certifications preferred (CEH, Security+, CISSP (Associate), CISM). Ability to work in a fast-paced environment, collaborate with cross-functional teams, and maintain a security-first mindset.
Posted 16 hours ago
2.0 - 6.0 years
5 - 9 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 16 hours ago
15.0 - 20.0 years
45 - 60 Lacs
Mumbai
Work from Office
The role holder will be part of a small team responsible for the implementation, management and innovation of 2nd line of defense risk management within the Information and Communication Technology (ICT) space, focusing on Operational Resilience at the Group. Responsibilities will include second line of defense oversight for Operational Resilience Domains such as Business Continuity/DR, IT Resilience, Cyber Resilience (including Cyber Fraud), Third Party Resilience and Crisis Management. The role holder will work with colleagues in Group RISK ORM Operational Resilience team, in support of and in close co-operation with RISK ORM ICT in Regions, as well as 1st line of defense ICT, business and offshoring teams and stakeholders. The candidate shall be an all-round specialist in Information and Communication Technologies, which include IT Processes (Architecture, Network, Systems, Application), Governance, Cyber Security and Operational Resilience related subjects. The candidate shall play a leading role in the successful completion of assigned assessments from start to finish and shall be competent to strengthen team spirit, improve team skills on different ICT subjects and ensure the quality, relevance and traceability of all identified gap. As a subject matter expert on ICT, the successful candidate shall stimulate and bring knowledge and innovation to the RISK ORM ICT Operational Resilience, in supporting of RISK ORM ICT Regional teams, helping to elevate the knowledge base and skills of the team. Responsibilities Governance & Oversight Provide IT & Cyber risk management (especially related to Operational Resilience) consulting to the business, technical and operations groups Provide direction, support and oversight with respect to management of security and technology risks of core systems and applications, and its resiliency Drive effective implementation and communication of Operational Risk Management (especially Operational Resilience related) policies and guidelines Risk management environment Identification & Assessment: Ensure that the identification and assessment of operational risks are effectively done across the organisation by correlating input from Audit Findings, Internal Loss Data Collection & Analysis, External Data Collection & Analysis, Risk Control Self Assessments, Business Process Mapping, KPIs & KRIs, Scenario Analysis, Quantified Measurement & Comparative Analysis Monitoring & Reporting: Implement a process to regularly monitor operational risk profiles and material exposure to losses and provide appropriate reporting mechanisms to the board, senior management and the business lines. Data capture and operational risk reporting should be continuously enhanced and provide a feedback loop to enhance risk management policies, procedures and practices. Control & Mitigation: Improve the effectiveness of the Internal Controls programme by reviewing the control environment, risk assessment process, control activities, information and communication and monitoring activities. Assess operational risk response strategies. Validate risk transfer options. Risk Disclosure: Provide updates on regulatory and financial disclosure while complying with external and regulatory communications standards and disclosing the operational risk management framework of the bank in a manner that complies with the formal disclosure policy approved by the board of directors. Defines approach for determining what operational risk disclosures are made and the internal controls over the disclosure process. Implement a process to assess the appropriateness of the disclosure, including the verification and frequency. Operational Resilience Manage the delivery, testing and management of Operational Resilience risk policies, standards and associated controls Perform gap assessment of Operational Resilience regulations, standards and guidelines of assigned territories and ensure compliance through 1st Line of Defence Manage assurance/oversight of Operational Resilience directly owned controls and in-directly owned Resilience controls and ensure these controls are tested for operational effectiveness Provide active advisory, partnership, challenge or approval to applicable risk owners to ensure appropriate prioritization and resolution Perform relevant 2nd Line Of defence thematic or issue based deep dives Support the business in identifying (through control testing) Resilience gaps in process, controls and also in remediating these Contribute to the design, development and specification of new/redesigned processes, systems, information, risk controls, testing regimes, documentation and supporting materials Crisis Management: Ensure 2nd line of defence risk oversight of Crisis Management program Contribute to the development of the crisis management framework; including: policies, standards, aide memoires, SOPs, playbooks, escalation protocols, etc. Support the delivery of independent crisis exercises and test incident and crisis response capability. Develop and implement process for validating effectiveness of the crisis management program. Participate in After Action Reviews. Build and establish networks and relations with other key internal stakeholders Third Technology Risk: Provide 2nd line of defence risk oversight of Third Party Cyber & Tech Risk program Conduct independent technology and cyber risk assessment of Outsourcing risks 2nd LoD Thematic review of critical suppliers from a Cyber & Tech Risk perspective Assist Global Head in developing Group wide 2nd LoD framework and policies regarding Third Party Tech Risk programs Contributing Responsibilities Governance & Oversight Contribute to the establishment of an IT & Cyber Risk Management program for the bank within the three lines of defence model in alignment with the Group Risk Management Framework Assist with establishing and oversight of the Operational Risk Management infrastructure and ensure practices are consistent with regulatory expectations and industry sound practices Risk management environment Operational Resiliency: Support the regional oversight of Group/Regional operational resiliency program to ensure the ability of the bank to operate on an ongoing basis and limit the losses in the event of severe business disruption. Coordinate with the first and third lines of defence to test these plans to ensure coverage and adequacy. Technical & Behavioral Competencies SKILLS, EXPERIENCE AND COMPETENCIES Skills Required: 15 years or more experience or practical understanding in IT, IT Security or other ICT domains required The successful candidate will have a proven track record in managing risk and technology in large/global organizations with robust knowledge of technology, risks and controls, IT and security architecture, operational resilience, and third party technology risk management. Prior ICT risk experience (IT, DR/BCM, Cyber security, Third Party, etc.) and exposure to Financial Services industry is a requirement. Experience with risk management tools and information systems is beneficial. Generic Requested Skills Excellent stakeholder management skills Demonstrates a high level of commitment and self-motivation Able to manage workload and set realistic and achievable targets Eye for detail and ability to process high quantity of documents and correlate them Highly organized and able to multi-task Able to express views clearly and fluently both orally and in writing, considering the audience and avoiding technical jargon when necessary and appropriate Able to work under pressure in international environment Able to interface and coordinate work efficiently and effectively with senior business and technology partners Excellent communication and influencing skills, including ability to articulate complex issues and incorporate feedback Good team player, Strong stakeholder management, relationship building, influencing, facilitating and presenting skills Has the proven ability to think outside of the box, challenge industry norms and adapt quickly to evolving requirements Is self-aware, anticipates problems, adapts and meets them head on. Is solutions focused measures their output on whether issues, problems or challenges are resolved as a criteria for success Works iteratively, delivering quickly and frequently to produce high quality documents and outputs which require little to no rework Technical Skills Experience in business process re-engineering, experience with functional and enterprise technical architecture, good understanding of large-scale technology infrastructure Understanding of emerging technologies e.g. IoT, Cloud, etc. Understanding of ISO 2700X series of standards and guidelines Significant experience in the field of Technology Risk Management, Operational Resilience, Cyber, Information Security and Crisis Management. Strong Risk mindset with understanding of applicable Technology Risk and Resilience regulatory requirements Proficiency in IT Service Management, Service Continuity domains Experience within a regulated environment such as financial services industry Conduct: Demonstrate proactivity, transparency and accountability for identifying and managing conduct risks Consider the implications of actions on colleagues, partners and clients before making decisions and escalate issues to manager when unsure Specific Qualifications (if required) Graduate or Post-graduate qualification in ICT domains, risk management or control function Skills Referential Behavioural Skills : (Please select up to 4 skills) Attention to detail / rigor Decision Making Communication skills - oral & written Ability to collaborate / Teamwork Transversal Skills: (Please select up to 5 skills) Ability to anticipate business / strategic evolution Ability to inspire others & generate people's commitment Ability to develop others & improve their skills Analytical Ability Ability to develop and leverage networks Education Level: Bachelor Degree or equivalent Experience Level At least 15 years Project Management Skills The successful candidate will have one or more of the following professional qualifications:
Posted 17 hours ago
3.0 - 6.0 years
12 - 22 Lacs
Hyderabad
Work from Office
Shift Day Quest Diagnostics Third-Party Vendor Risk Management Program performs the critical function of assessing the risks of new and existing vendors. The IT Security Sr. Specialist II will be responsible for working with business partners and purchasing to evaluate the risk posture of the vendors and to ensure that appropriate risk assessments, the contract and ancillary risk assessment documents are reviewed and implemented. General Job Responsibilities: Conduct supplier risk assessments in line with Quest Diagnostics IT Security Policies and Procedures including due diligence, risk evaluation, findings management, and remediation. Quality Assurance efforts including but not limited to data integrity, metrics development, findings management, reassessment tracking and vendor off-boarding. Contribute to third-party risk management program development and process enhancements Develop working knowledge of Quest Diagnostics business and operations to ensure alignment of due diligence reviews and risk assessments with the needs of the business Special Projects as assigned.
Posted 17 hours ago
9.0 - 14.0 years
10 - 13 Lacs
Gurugram, Delhi / NCR
Work from Office
Responsible for ISO 27001 based ISMS implementation & Sustenance. Responsible for advising Business continuity planning, IT Disaster recovery planning.
Posted 2 days ago
2.0 - 5.0 years
5 - 9 Lacs
Hyderabad
Work from Office
Overview. ormation Security Analyst: Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Researches attempted or successful efforts to compromise systems security and designs countermeasures. Maintains hardware, software and network firewalls and encryption protocols. Administers security policies to control physical and virtual access to systems. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Job Code Tip: May be internal or external, client-focused, working in conjunction with Professional Services and outsourcing functions. May include company-wide, web-enabled solutions. Individuals whose primary focus is on developing, testing, debugging and deploying code or processing routines that support security protocols for an established system or systems should be matched to the appropriate Programmer or Programmer/Analyst family in the Information Technology/MIS functional area, Responsibilities. Should have process knowledge and technical knowledge on any of the SIEM tools ( like Qradar, LogRhythm, AlienVault, Splunketc). L2/L3 level is added advantage, Should have process knowledge and technical knowledge in AV tools like Symantec, McAfee, Trend Microetc, L2/L3 level is added advantage, Should have knowledge in managing Vulnerability tools and various remediation efforts, Review security logs generated by applications, devices and other systems, taking action or escalating to appropriate teams as needed, Enforce incident response service level agreement, Work with the global IT Security team to analyze, test and recommend tools to strengthen the security posture of the company. Create and maintain operational reports allowing IT management team to understand the current and historical landscape of the IT security risks. Vulnerability management assessment and remediation. Participate in daily and ad-hoc meetings related to cyber security, controls and compliance, processes and documentation related tasks. Research the latest information technology (IT) security trends. Help plan and carry out an organization’s way of handling security. Develop security standards and best practices for the organization. Recommend security enhancements to management or senior IT staff. Document security breaches and assess the damage they cause, Performs other duties as assigned. Qualifications. Tech, B. 2-5 years’ Experience working in a Security Operations Center. 2 years minimum in the computer industry. Knowledge working with complex Windows environments. Knowledgeable in various security frameworks such as NIST 800-53 / NIST 800-171 / ISO27001. Knowledge in design and administration of security tools. Good written and verbal communication skills. Show more Show less
Posted 3 days ago
4.0 - 8.0 years
11 - 15 Lacs
Gurugram
Work from Office
Dentsply Sirona is the world’s largest manufacturer of professional dental products and technologies, with a 130-year history of innovation and service to the dental industry and patients worldwide. Dentsply Sirona develops, manufactures, and markets a comprehensive solutions offering including dental and oral health products as well as other consumable medical devices under a strong portfolio of world class brands. Dentsply Sirona’s products provide innovative, high-quality and effective solutions to advance patient care and deliver better and safer dentistry. Dentsply Sirona’s global headquarters is located in Charlotte, North Carolina, USA. The company’s shares are listed in the United States on NASDAQ under the symbol XRAY.. Bringing out the best in people. As advanced as dentistry is today, we are dedicated to making it even better. Our people have a passion for innovation and are committed to applying it to improve dental care. We live and breathe high performance, working as one global team, bringing out the best in each other for the benefit of dental patients, and the professionals who serve them. If you want to grow and develop as a part of a team that is shaping an industry, then we’re looking for the best to join us.. Working At Dentsply Sirona You Are Able To. Develop faster with our commitment to the best professional development.. Perform better as part of a high-performance, empowering culture.. Shape an industry with a market leader that continues to drive innovation.. Make a difference -by helping improve oral health worldwide.. Scope. The SAP GRC & Authorization Expert role is working on GRC Access control and SAP S/4 and the connected system in security and authorization management. In this role, you will design and implement robust GRC and authorization solutions, ensuring compliance with audit guidelines and enhancing our IT security framework.. Key Responsibilities. The job holder must have the following expertise:. Deep understanding of SAP authorization concept.. Knowledge of Segregation of Duties (SOD) with an understanding of business processes and applicable mitigating controls.. Understanding of periodic SAP security reviews/audits.. Experience with BRF+ and MSMP.. Firefighter configuration and maintenance.. GRC request administration and GRC (12.0) configuration.. Risk analysis configuration.. Experience in maintaining GRC risk library, roles and authorizations.. Experience in role design.. Preferred understanding on FIORI apps.. Handling high-priority requests.. Liaising with ABAP/Functional team on customized t-code development.. Clear understanding of business roles and processes.. Support team members on technical issues.. Understanding and working experience with a ticketing tool (Service-Now).. Excellent expertise in SAP GRC Access Control and SAP authorization/security.. Role design and Segregation of Duties conflict remediation related projects.. User and authorization management for SAP systems.. Review critical and sensitive authorizations.. Ensure high level of compliance and user support.. Maintain Data.. The SAP GRC & Security Expert will be responsible for the availability and integrity of security.. Other responsibilities as assigned.. Typical Background. Education. Bachelor’s degree in a related area (Computer Science, Computer Engineering, Information Technology. Language skill. English Advanced (C1), any other language is an advantage.. Years And Type Of Experience. Experience in 5 years of experience in similar role.. Experience with SAP GRC and S4/Hana.. Key Required Skills, Knowledge And Capabilities. Internationally and culturally aware. The ability to handle multiple and shifting priorities without losing focus is necessary.. Ability to communicate complicated issues in an easy to understand and concise method.. Pro-active, positive attitude, high-energy, motivated, enthusiastic with an outgoing, can-do attitude.. Personal computer skills are required and advanced skills with excel, word and access is a must.. Key Leadership Behaviors. Teamwork – Defines success in terms of the whole team. Customer Focus – Is dedicated to meeting the expectations and requirements of internal and external customers and seeking to make improvements with the customer in mind. Strategic Thinking – Applies experience, knowledge, and perspective of business and external or global factors to create new perspectives and fresh thinking. Problem Solving – Can analyze problems and put together a plan for resolution within her scope of responsibility. Drive for Results – Can be counted on to reach goals successfully. Accountability – Acts with a clear sense of ownership. Innovation and Creativity – Brings creative ideas to work and acts to take advantage of opportunities to improve business. Leading Change – Adapts to changing priorities and acts without having the total picture. Consistently meets Dentsply Sirona standards, ethics and compliance requirements. Self-motivated, conscientious with a desire to exceed. DentsplySirona is an Equal Opportunity/ Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, sexual orientation, disability, or protected Veteran status. We appreciate your interest in DentsplySirona.. If you need assistance with completing the online application due to a disability, please send an accommodation request to careers@dentsplysirona.com. Please be sure to include “Accommodation Request” in the subject.. Show more Show less
Posted 3 days ago
2.0 - 5.0 years
3 - 7 Lacs
Bengaluru
Work from Office
We're Celonis, the global leader in Process Mining technology and one of the world's fastest-growing SaaS firms. We believe there is a massive opportunity to unlock productivity by placing data and intelligence at the core of business processes and for that, we need you to join us.. The Team:. As a member of the Information Security Organization at Celonis, you'll collaborate closely with various departments and customers to communicate and demonstrate the security posture of our products. This position is part of the Security Enablement team within the broader Security GRC (Governance, Risk, and Compliance) Department. The Information Security team plays a critical role in ensuring Celonis' technology and information assets are appropriately guarded from external and internal threats. The Security GRC Department you'll be joining is responsible for maintaining existing security attestations at Celonis globally, balancing risk with appropriate controls and assessing control effectiveness.. The Role:. As Associate Security Enablement Analyst within the Information Security GRC team, you will act as a key interface between Celonis and its customers, helping to demonstrate the strength of our security posture and ensuring a smooth, informed, and confident customer journey. In this role, you’ll handle a broad range of customer-facing security activities—from responding to security questionnaires and audits, to building scalable processes and content for security communications. You’ll work closely with internal stakeholders across Legal, Operations, and Engineering, playing a critical role in reinforcing trust and transparency around our security practices. This position is ideal for someone who thrives at the intersection of security, communication, and customer success.. The work you’ll do:. Customer Security Requests: Respond quickly and accurately to customer security inquiries, supporting business development and customer success efforts.. Technical Security Communication: Independently address technical questions from customers, ensuring their security requirements are clearly understood and met.. Audit Support: Support customer audits and remote assessments by preparing and delivering relevant security documentation and evidence.. Security Questionnaires: Lead the completion of security questionnaires and related documentation, particularly those focused on cloud security.. Cross-Functional Collaboration: Work with Legal, Operations, and Cloud Engineering to develop and maintain standardized materials that clearly explain our security controls and practices.. Knowledge Management: Build and maintain a centralized knowledge base covering key Information Security topics, making resources easily accessible to internal and external stakeholders.. Enablement & Culture: Contribute to internal initiatives that strengthen Celonis’s security culture, operational maturity, and external security presence—whether through team development, internal enablement, or customer-facing improvements.. Privacy & GenAI Readiness: Collaborate with cross-functional teams to support privacy-related initiatives and emerging GenAI-related security considerations, ensuring alignment with evolving regulatory and customer expectations.. The qualifications you need:. University degree in the field of Information Technology and Management, Business Administration, or a similar field. Experience working with Security Questionnaires, IT projects, RFX. Work experience in the field of IT Security, Auditing, Cloud Security or similar. Excellent communication skills in English (spoken and written). Excellent ability to communicate with clients, relevant departments, collaborators and other relevant actors. High professional responsibility and excellent skills to work independently. Excellent skills to learn quickly and adapt to new tasks. Ability to learn topics related to Cloud, Infrastructure, and IT Security. Ability to work under pressure andin a dynamic work environment. Excellent communication skills in German (has the advantage). What Celonis Can Offer You:. Pioneer Innovation: Work with the leading, award-winning process mining technology, shaping the future of business.. Accelerate Your Growth: Benefit from clear career paths, internal mobility, a dedicated learning program, and mentorship opportunities.. Receive Exceptional Benefits: Including generous PTO, hybrid working options, company equity (RSUs), comprehensive benefits, extensive parental leave, dedicated volunteer days, and much more.. Prioritize Your Well-being: Access to resources such as gym subsidies, counseling, and well-being programs.. Connect and Belong: Find community and support through dedicated inclusion and belonging programs.. Make Meaningful Impact: Be part of a company driven by strong values that guide everything we do: Live for Customer Value, The Best Team Wins, We Own It, and Earth Is Our Future.. Collaborate Globally: Join a dynamic, international team of talented individuals.. Empowered Environment: Contribute your ideas in an open culture with autonomous teams.. About Us:. Celonis makes processes work for people, companies and the planet. The Celonis Process Intelligence Platform uses industry-leading process mining and AI technology and augments it with business context to give customers a living digital twin of their business operation. It’s system-agnostic and without bias, and provides everyone with a common language for understanding and improving businesses. Celonis enables its customers to continuously realize significant value across the top, bottom, and green line. Celonis is headquartered in Munich, Germany, and New York City, USA, with more than 20 offices worldwide.. Get familiar with the Celonis Process Intelligence Platform by watching this video.. Celonis Inclusion Statement:. At Celonis, we believe our people make us who we are and that “The Best Team Wins”. We know that the best teams are made up of people who bring different perspectives to the table. And when everyone feels included, able to speak up and knows their voice is heard that's when creativity and innovation happen.. Your Privacy:. Any information you submit to Celonis as part of your application will be processed in accordance with Celonis’ Accessibility and Candidate Notices. By submitting this application, you confirm that you agree to the storing and processing of your personal data by Celonis as described in our Privacy Notice for the Application and Hiring Process.. Please be aware of common job offer scams, impersonators and frauds. Learn more here.. Show more Show less
Posted 3 days ago
9.0 - 14.0 years
8 - 12 Lacs
Mangaluru
Work from Office
Summary Of The Position:. This position requires candidate should be Graduate/Post Graduate on Engineering / Computer Science with at least 10 + years of experience in managing Information Security / Cyber Security for an enterprise level.. Lead and manage day-to-day security operations and ensure the implementation and enforcement of security measures across the organization. Role will involve assessing vulnerabilities, managing security incidents, and overseeing a team of security professionals. Collaborate closely with IT, risk management, and other business units to maintain a secure infrastructure and ensure compliance with relevant security standards and regulations.. Qualification, Certifications and Knowledge level. Tech/ B. Certifications: CEH / GSEC / CISM or other relevant security. 10 years of experience in cybersecurity or information security roles.. Strong knowledge of SIEM, firewalls, IDS/IPS, vulnerability management, and encryption.. Experience with security frameworks such as NIST, ISO 27001, SOC 2 or CIS.. Hands-on experience with incident response and management.. Prior experience in a leadership or managerial role within security operations is preferred.. Good understanding of IT/IS & Cyber risks. Experience in risk management processes and reporting. Experience in third-party risk management frameworks & processes. Good Communication Skills. Ability to work independently and to take emergent decisions on his/her own. Ability to work collaboratively with internal and external stakeholders to achieve a mutually beneficial result. Good team player, hardworking, enthusiastic with good attitude. Experience:. 10-12 years of relevant work experience in Information Security / IT Security and risk management functions.. Roles & Responsibilities:. Security Operations Management:. Oversee daily security operations and lead the Security Operations Center (SOC) team.. Develop and enforce security policies, procedures, and guidelines.. Manage vulnerability scanning, penetration testing, and threat monitoring activities.. Ensure all security tools (firewalls, IDS/IPS, DLP, SIEM) are properly configured, maintained, and updated.. Incident Response And Management:. Lead investigations and response to security incidents, breaches, or cyberattacks.. Perform root cause analysis and post-incident reporting.. Ensure incident response plans are regularly tested and optimized.. Threat And Vulnerability Management:. Manage and review system vulnerabilities and threats and implement risk mitigation strategies.. Perform regular risk assessments and security audits to identify and address security gaps.. Collaborate with DevOps and infrastructure teams to integrate security best practices in all systems.. Compliance And Governance:. Ensure compliance with security regulations, standards, and frameworks (ISO 27001, NIST, GDPR, etc.).. Maintain up-to-date documentation of security controls and processes.. Coordinate internal and external security audits, including audits related to compliance.. Leadership And Team Development:. Supervise and mentor junior security analysts and engineers.. Provide guidance on career development, training, and certifications.. Collaborate with HR and senior leadership to define security team goals and objectives.. Vendor And Stakeholder Management:. Liaise with third-party vendors to assess security tools and technologies.. Work closely with other business units, such as IT, legal, and finance, to ensure security objectives are aligned with business priorities.. Security Awareness And Training:. Develop and implement IT security awareness training programs for employees.. Foster a culture of security awareness across the organization.. Perform a phishing simulation exercise at the organizational level and assess the associated risks.. Summary Of The Position:. This position requires candidate should be Graduate/Post Graduate on Engineering / Computer Science with at least 10 + years of experience in managing Information Security / Cyber Security for an enterprise level.. Lead and manage day-to-day security operations and ensure the implementation and enforcement of security measures across the organization. Role will involve assessing vulnerabilities, managing security incidents, and overseeing a team of security professionals. Collaborate closely with IT, risk management, and other business units to maintain a secure infrastructure and ensure compliance with relevant security standards and regulations.. Qualification, Certifications and Knowledge level. Tech/ B. Certifications: CEH / GSEC / CISM or other relevant security. 10 years of experience in cybersecurity or information security roles.. Strong knowledge of SIEM, firewalls, IDS/IPS, vulnerability management, and encryption.. Experience with security frameworks such as NIST, ISO 27001, SOC 2 or CIS.. Hands-on experience with incident response and management.. Prior experience in a leadership or managerial role within security operations is preferred.. Good understanding of IT/IS & Cyber risks. Experience in risk management processes and reporting. Experience in third-party risk management frameworks & processes. Good Communication Skills. Ability to work independently and to take emergent decisions on his/her own. Ability to work collaboratively with internal and external stakeholders to achieve a mutually beneficial result. Good team player, hardworking, enthusiastic with good attitude. Experience:. 10-12 years of relevant work experience in Information Security / IT Security and risk management functions.. Roles & Responsibilities:. Security Operations Management:. Oversee daily security operations and lead the Security Operations Center (SOC) team.. Develop and enforce security policies, procedures, and guidelines.. Manage vulnerability scanning, penetration testing, and threat monitoring activities.. Ensure all security tools (firewalls, IDS/IPS, DLP, SIEM) are properly configured, maintained, and updated.. Incident Response and Management:. Lead investigations and response to security incidents, breaches, or cyberattacks.. Perform root cause analysis and post-incident reporting.. Ensure incident response plans are regularly tested and optimized.. Threat and Vulnerability Management:. Manage and review system vulnerabilities and threats and implement risk mitigation strategies.. Perform regular risk assessments and security audits to identify and address security gaps.. Collaborate with DevOps and infrastructure teams to integrate security best practices in all systems.. Compliance and Governance:. Ensure compliance with security regulations, standards, and frameworks (ISO 27001, NIST, GDPR, etc.).. Maintain up-to-date documentation of security controls and processes.. Coordinate internal and external security audits, including audits related to compliance.. Leadership and Team Development:. Supervise and mentor junior security analysts and engineers.. Provide guidance on career development, training, and certifications.. Collaborate with HR and senior leadership to define security team goals and objectives.. Vendor and Stakeholder Management:. Liaise with third-party vendors to assess security tools and technologies.. Work closely with other business units, such as IT, legal, and finance, to ensure security objectives are aligned with business priorities.. Security Awareness and Training:. Develop and implement IT security awareness training programs for employees.. Foster a culture of security awareness across the organization.. Perform a phishing simulation exercise at the organizational level and assess the associated risks.. UnifyCX is an emerging Global Business Process Outsourcing company with a strong presence in the U.S., Colombia, Dominican Republic, India, Jamaica, Honduras, and the Philippines. We provide personalized contact centers, business processing, and technology outsourcing solutions to clients worldwide. In nearly two decades, unifyCX has grown from a small team to a global organization with staff members all over the world dedicated to supporting our international clientele.. At UnifyCX, we leverage advanced AI technologies to elevate the customer experience (CX) and drive operational efficiency for our clients. Our commitment to innovation positions us as a trusted partner, enabling businesses across industries to meet the evolving demands of a global market with agility and precision.. UnifyCX is a certified minority-owned business and an EOE employer who welcomes diversity.. Show more Show less
Posted 3 days ago
4.0 - 7.0 years
12 - 16 Lacs
Gurugram
Work from Office
Job TitleIT Security Lead. Position typeFull Time. Work LocationGurgaon, India preferred. Working styleHybrid. Cab FacilityYes. Shift Time 12:30-9:30 and as needed. People Manager role: No. Required Education And Certifications Critical For The Role-. Required years of experience -. 3-5 years of relevant experience. AON IS IN THE BUSINESS OF BETTER DECISIONS. At Aon, we shape decisions for the better to protect and enrich the lives of people around the world.. As an organization, we are committed as one firm to our purpose, united through trust as one inclusive, diverse team and we are passionate about helping our colleagues and clients succeed.. Information About The Business. GENERAL DESCRIPTION OF ROLE:. The MetricStream Developer Lead role is responsible for supporting MetricStream, which is Aon's Governance Risk and Compliance (GRC) platform. In this position, you will configure the MetricStream platform to meet requirements, manage a backlog of open tickets, and ensure all delivered areas of functionality are working as expected. You will be responsible for new feature configuration, as well as supporting and troubleshooting existing configuration. In this role, you will work closely with project teams and act as the main point of contact for any MetricStream platform issues or technical questions. The role requires collaboration with the vendor, teams within Aon and Aon leadership. Must have experience with implementing SaaS platforms, working in a DEV environment, global team environment. This is a lead role and will oversee activities of two other roles and will report out on activities to leadership.. JOB RESPONSIBILITIES (List 6-10 Major Responsibilities In The Role). Create and maintain reports, charts, and dashboards. Configure user access roles and permissions. Configure updates to forms, including adding/updating fields and modifying business rules. Create and maintain workflows. Package and deploy configuration between environments. Ensure platform configuration works as expected by writing and executing unit tests and regression tests. Documenting: Documenting every aspect of an application or system as a reference for future maintenance and upgrades. Collaborating: Collaborating with other developers and other professionals. Analyzing user needs: Understanding the needs of clients and users. Recommending changes: Recommending software changes for customers' existing programs and systems. Oversee two other developer roles and ensure they are on track and timely with deliverables. Communication to leadership frequently on tasks and initiatives. SKILLS/COMPETENCIES REQUIRED (List 4-8 skills required to get the job done):. Leadership skills: management of tasks and overseeing others work. Organization, attention to detail. Communication skills. Metrics and reporting. Writing JavaScript functions. Writing XML scripts. Writing complex SQL queries. Experience with data transformation utilizing one or many of the following:. SQL. Java. Shell script. Stored procedures. How We Support Our Colleagues. In addition to our comprehensive benefits package, we are proud to be an equal opportunity workforce. At Aon, we believe a diverse workforce is an innovative workforce. Our agile, inclusive environment allows colleagues to manage their wellbeing and work/life balance while empowering you to be your authentic self.. Furthermore, all colleagues enjoy two “Global Wellbeing Days” each year, encouraging them to take time to focus on themselves. We offer a variety of workstyle options through our Smart Working model, but we also recognize that flexibility goes beyond just the place of work... and we are all for it!. Our continuous learning culture inspires and equips colleagues to learn, share and grow, helping them achieve their fullest potential. As a result, Aon colleagues are more connected, more relevant and more valued.. 2546206. Show more Show less
Posted 3 days ago
3.0 - 6.0 years
6 - 10 Lacs
Bengaluru
Work from Office
WHAT YOU DO AT AMD CHANGES EVERYTHING. We care deeply about transforming lives with AMD technology to enrich our industry, our communities, and the world. Our mission is to build great products that accelerate next-generation computing experiences the building blocks for the data center, artificial intelligence, PCs, gaming and embedded. Underpinning our mission is the AMD culture. We push the limits of innovation to solve the world’s most important challenges. We strive for execution excellence while being direct, humble, collaborative, and inclusive of diverse perspectives.. AMD together we advance_. The Staff Information Security Analyst will be responsible for identifying and defining requirements and engineering solutions to solve the existing threats and security issues of a global organization. This role will initial focus heavily on data protection, leading advancements in data loss prevention, and changing how AMD protects data going forward.. The Person. The ideal candidate will possess strong multi-tasking skills and enthusiasm for details and should think one step ahead of cyber-criminals. They should be well prepared to thrive in a fast-paced environment, possessing strong interpersonal and communication skills. You will use your critical thinking and sense of ownership to focus on long term quality IT security solutions. Are you self-motivated and a team player with proven ability to deliver end-to-end solutions in a high-tech and fast-moving industry? If so, this is a great career opportunity!. Key Responsibilities. The Staff Information Security Analyst responsibilities include, but are not limited to:. Building and growing AMD’s data security capabilities to keep AMD data secure regardless of location.. Identifying, monitoring, and defining the requirements to reduce the overall risk to AMD data, systems, and infrastructure.. Implementing hardware and software solutions to help mitigate a wide variety of information security risks.. Collaborating with other IT teams to align initiatives across the company.. Preferred Experience. Minimum of 5 years of IT security related experience.. Professional experience as a Security Engineer with demonstrated successful leadership and delivery of data protection solutions.. Experience as a customer-facing technical lead, including working with both management-level and development teams.. Senior/advanced related IT or security experience working in one or more Security Domains.. Experience with CASB, DLP, CSPM, Web Proxy.. Hands on experience with Data Classification policies and technologies to address data leakage.. Working knowledge of network topology, protocols, components, and OSI model, and IAM technologies (e.g., PKI, Oauth, OIDC, SAML). Understanding of NIST Cyber Security Framework standard and requirements and ability to apply them to an enterprise environment.. Experience with infrastructure operations and processes associated with IT service management in an Enterprise-level organization.. Experience with cloud services (AWS, Google, Microsoft) and associated networking, as well as collaboration and integration with O365 products.. Hands on experience with Enterprise Linux platforms.. Experience with EDR solutions is a plus.. DLP, CASB. Nice to have: Client proxy, SIEM, File and Removable Media Protection [FRP]. It Would Be Nice If You Also Had. Experience with scripting language (python, PowerShell, etc.).. Strong documentation skills.. Academic Credentials. BS CS preferred but not required.. CISSP, CISA, CISM, CCSK. Benefits offered are described: AMD benefits at a glance.. AMD does not accept unsolicited resumes from headhunters, recruitment agencies, or fee-based recruitment services. AMD and its subsidiaries are equal opportunity, inclusive employers and will consider all applicants without regard to age, ancestry, color, marital status, medical condition, mental or physical disability, national origin, race, religion, political and/or third-party affiliation, sex, pregnancy, sexual orientation, gender identity, military or veteran status, or any other characteristic protected by law. We encourage applications from all qualified candidates and will accommodate applicants’ needs under the respective laws throughout all stages of the recruitment and selection process.. Show more Show less
Posted 3 days ago
1.0 - 4.0 years
4 - 8 Lacs
Chennai
Work from Office
Job Summary:. You will be responsible for managing and maintaining the organization's IT infrastructure, ensuring optimal performance, security, and reliability. This role involves configuring and troubleshooting servers, networks, and enterprise applications, as well as implementing security protocols and system upgrades. You will also provide technical support, automates processes, and collaborate with teams to enhance system efficiency. Strong expertise in Windows administration, virtualization, and IT security is essential.. Responsibilities. Infrastructure Management. Design, install, and configure internal-facing servers, virtual environments, networks, and firewalls.. Proactively maintain and manage server, network, and firewall systems.. Troubleshoot LAN/WAN and backbone infrastructure issues.. Security & Compliance. Monitor M365 security alerts, logs, and reports to detect and respond to security incidents.. Ensure IT infrastructure aligns with ISO 27001 and SOC 2 Type 2 security and compliance standards.. Manage patching and vulnerability remediation for end-user machines, ensuring security updates are tested and deployed efficiently.. Conduct security assessments and audits of M365 configurations and permissions.. Implement security controls in M365, Azure AD, Microsoft Defender, and Azure Information Protection.. Work with security tools (SIEM, IDS/IPS, DLP, endpoint security solutions like Falcon, Endpoint Protector, etc.).. Project & Risk Management. Develop and implement project plans, risk assessments, and contingency plans.. Assist with hardware, firewall, and software vendor evaluation and negotiations.. Support & Maintenance. Provide after-hours support for infrastructure emergencies and occasional weekend maintenance.. Maintain inventory and asset configuration documentation.. Collaboration & Training. Mentor and cross-train team members on existing and new technologies.. Interact with customers and staff at a technical level as required.. Develop and implement security awareness training programs for end-users.. Required Skills. 6+ years of experience in System Administration. Strong understanding of LAN/WAN networking, VLANs, IP subnetting, and 802.1Q trunks.. Experience with Azure & Local Active Directory user and group administration.. Experience in patch and vulnerability management, including OS updates, application patching, and security hardening.. Knowledge of ISO 27001 and SOC 2 Type 2 compliance, including security controls, risk assessments, and audit requirements.. Hands-on expertise in M365 security features and tools.. Strong analytical and problem-solving abilities for assessing security issues.. Excellent communication and collaboration skills.. Ability to work independently and manage tasks in a fast-paced environment.. This role requires a mix of technical expertise, security knowledge, problem-solving skills, and teamwork to ensure a secure and efficient IT infrastructure.. About:. CoreStack provides a NextGen Cloud Governance platform that empowers enterprises to increase top-line revenues and gain a competitive edge through AI-powered real-time cloud governance on autopilot.. CoreStack is successfully deployed with companies across multiple industries such as Healthcare, Financial Services, Retail, Education, Technology, and Government. CoreStack has a stellar leadership team, creative investors, and backed by industry-leading advisors. Gartner recognized CoreStack in the 2020 Cloud Computing Platforms Magic Quadrant. CoreStack is also a recent recipient of the 2021 Gold Stevie American Business Awards in the Cloud Infrastructure category and 2021 Gold Globee Winner of the Most Innovative Company of the Year in IT Cloud/SaaS, Tech Ascension Award 2022, CoreStack Wins DataCloud Global Award 2022 and 19th Annual 2023 Silver Globee Winner® Cybersecurity Awards.. Show more Show less
Posted 3 days ago
3.0 - 8.0 years
7 - 12 Lacs
Mumbai
Work from Office
Position Purpose The key objective of this role is to ensure that processes across IT operate securely. The remit extends across all aspects of IT security (i.e. policies and procedures, authorization and administration of accesses, networks and firewalls, servers and workstations, operation systems, databases and applications), wherever applicable and covers all IT teams and usage of the IT platform by other departments. Another key objective is to ensure that IT maintains an appropriate level of security in compliance with company policy and requirements from regulatory & market authorities and in accordance with recommendations from General Inspection, Compliance, Internal Audit and External Auditors. This role also contributes to the design, testing and roll-out of security controls such as access management, exception management, data leakage prevention, etc. in accordance with established regional processes Responsibilities Direct Responsibilities 1. IT Risk Management - Inform APAC IT Security Risk Management team about any new projects or major change within India for further risk assessment. - Ensure risk assessment on the in-scope projects, third-party vendors and the deviation of policies & best practice is properly conducted. Ensure the recommendation issued for projects and security exceptions / risk acceptances are properly followed up. - To translate policy statements into local guidelines and procedures in order to produce enforceable actions - To enforce an efficient user account management process in order to authorize and control users accesses and habitations to IT Systems - To monitor and ensure immediate and accurate reporting of any SIPL IT Security related incident (intrusion, virus, etc.) to the regional & global IT Security and Incident Management processes. - To be part of the network rules review and recertification process, by reviewing and approving all network access requests (including firewall, proxy and SMTP requests), and perform periodical review. - To work in partnership with the Business Lines, Organization & Methods, Information Systems, and others to draw up measures for implementing the Company's Information Systems Security Directives. Especially to participate to all projects in order to ensure respect of good IT Security practices - To occasionally participate in regional security risk assessment activity of business line applications - To work with different stakeholders and assist India CIO to implement the IT risk management framework - To conduct necessary security controls, reviews, assessment to ensure the best security practice is in place . 2. IT Security Control Design, Testing and Implementation - To gather control requirements based on regulatory guidelines and business needs - To assist in the design of local and business-specific security controls - To contribute to the processing of day-to-day security events, leading or supporting security investigations and escalation to relevant stakeholders (Business, Compliance, Legal, HR, IT) - To maintain exception management workflows and to track local exceptions and their recertification - To produce periodic KPI and KRI dashboards and distribute them to local management 3. Coordination & Cooperation - To actively coordinate and cooperate with other IT and APAC Security teams to ensure best IT Security practices, deliveries and a smooth interaction - To work closely with IT Infrastructure & Production team, as well as Business Lines IT teams for closure of non-compliant issues found within scope of responsibilityTo assist the production & follow up of Security Dashboard by APAC SecurityTo maintain an IT Security Awareness training program towards all local employees - To assist SIPL COO/CIO for the production of required and requested reporting to the local regulatory & market authorities - To answer requests raised by Internal Audit and Risk and to promptly close findings and recommendations 4. Team management - As team head to supervise and lead the SIPL information security team: - Ensure the team's mandated learnings (eLearning, classroom training) are completed before due date - Ensure block leave and carryover leave are managed per policy - Ensure timesheets are recorded in Clarity - Identify development and training plan for the team - Create succession plan and backup plan for the team - When necessary, manage low performers with development plans and keep track of the progress (if applicable) 5. Permanent Control Aspects - Direct contribution to BNPP operational permanent control framework. - Responsible for the implementation of operational permanent control policies and procedures in day-to-day business activities, such as Control Plan - Responsible for ensuring team members (if applicable) to comply with regulatory requirements and internal guidelines. - Responsible for reporting all incidents according to the Incident Management System - Responsible for ensuring job descriptions are written, distributed and updated - Ensure audit recommendations are resolved within the specific timeline. Contributing Responsibilities 1. Cooperation - To improve IT quality and process generally 2 . Compliance & Control - Comply with the BNPP IT Security policies - Comply with the BNPP standards of Code of Conduct - Comply with regulatory requirements and internal guidelines. - Ensuring appropriate escalation to management and/or Permanent Control (or Compliance as appropriate) as soon as an issue is identified - Minimizing operational failure, including but not exclusively, the risk of fraud, by helping to devise, and by implementing, sufficient regular controls 3 . Committees - Participate and contribute to different committees related to the job scope, including but not limited to IT management, IT risk management (TRM), country supplier risk management, data governance, data protection, local outsourcing management, etc. Technical & Behavioral Competencies - To be knowledgeable of IT Security concepts. - To know IT Security regional roadmap. - To maintain a good knowledge of the technologies, systems, integration and workflows of the IT Security program. - To know the organization of global IT Security, as well as regional Security, who to action depending on the matter and to maintain good relationships with IT Security managers. - To know program management methodology. - To know how to define an action plan and to follow up on progress. - To be organized and meticulous. - To know how to communicate clear instructions and follow up while delegating appropriately. Negotiation skills. Specific Qualifications (if required) - Securities practitioner qualification is a must; - Strong local regulatory experience on SEBI is required - Bachelors degree in Computer Science, Information Security or equivalent experience - Holder of information security and risk management (e.g. CISM, CISSP, etc.) preferred Skills Referential Behavioural Skills : (Please select up to 4 skills) Ability to collaborate / Teamwork Communication skills - oral & written Decision Making Personal Impact / Ability to influence Transversal Skills: (Please select up to 5 skills) Ability to understand, explain and support change Ability to manage a project Ability to develop and adapt a process Ability to inspire others & generate people's commitment Ability to manage / facilitate a meeting, seminar, committee, training Education Level: Bachelor Degree or equivalent (3 years) Experience Level At least 7 years
Posted 3 days ago
2.0 - 5.0 years
7 - 11 Lacs
Gurugram
Work from Office
About NCR Atleos Key Responsibilities Security Administration Design, Engineer and manage security solutions.Configure, monitor, and troubleshoot systems to ensure optimal performance and security.Plan and execute upgrades, patches, and other maintenance activities for security tooling.Collaborate with the cybersecurity team to ensure robust security measures and compliance with industry standards.Technical Support and Troubleshooting:Provide advanced technical support for AWS cloud networking issues.Mentor and guide junior engineers and IT support staff. Documentation and Reporting Create and maintain comprehensive documentation of configurations, procedures, and processes.Generate regular reports on system performance, security incidents, and maintenance activities. Qualifications Education :Bachelors degree in computer science, Information Technology, Cybersecurity, or a related field; or equivalent work experience. Experience :At least 3 years of hands-on experience in Cyber Security. Technical Skills: Strong understanding of network protocols and services (TCP/IP, DNS, VPN, etc.).Knowledge of scripting languages (PowerShell, Python) for automation. Key Competencies Problem-Solving Skills: Strong analytical and troubleshooting abilities to diagnose and resolve complex technical issues. Communication Skills: Excellent verbal and written communication skills, with the ability to explain technical concepts to non-technical stakeholders. Project Management Ability to manage multiple projects and priorities in a fast-paced environment. EEO Statement NCR Atleos is an equal-opportunity employer. It is NCR Atleos policy to hire, train, promote, and pay associates based on their job-related qualifications, ability, and performance, without regard to race, color, creed, religion, national origin, citizenship status, sex, sexual orientation, gender identity/expression, pregnancy, marital status, age, mental or physical disability, genetic information, medical condition, military or veteran status, or any other factor protected by law. Statement to Third Party Agencies To ALL recruitment agenciesNCR Atleos only accepts resumes from agencies on the NCR Atleos preferred supplier list. Please do not forward resumes to our applicant tracking system, NCR Atleos employees, or any NCR Atleos facility. NCR Atleos is not responsible for any fees or charges associated with unsolicited resumes.
Posted 3 days ago
5.0 - 10.0 years
9 - 14 Lacs
Navi Mumbai
Work from Office
Role & responsibilities To manage cyber threats and ensure that risks are controlled as per Organisation Risk appetite Manage security projects and day-day operations that involves security activities planned and BAU Manage vendors providing security products and services. Track vendor performance as per deliverables and committed SLAs/ TAT Manage technology / IT risks ensuring that critical security issues and risks are prioritized and fixed as per TAT/ SLA Manage the Vulnerability Management domain in CISO team to ensure that all identified vulnerabilities are fixed in time Manage advanced cyber threat intel tools/ services to ensure that all reported risks are addressed in time Support Business and other functions in audits/ assessments / advisory / implementation of security controls and processes to be implemented Preferred candidate profile Technical and hands on experience in Vulnerability & Risk management using security tools and solutions Technical knowledge on security fundamentals and emerging cyber threats
Posted 3 days ago
9.0 - 13.0 years
18 - 22 Lacs
Bengaluru
Work from Office
Date 20 Jun 2025 Location: Bangalore, KA, IN Company Alstom Req ID:482643 Job Title:IAM Architect OVERALL PURPOSE OF THE ROLE Take on a new challenge and apply your comprehensive IAM knowledge in a new cutting-edge field. Youll work alongside innovative, supportive, and solution-driven teammates. You'll spearhead the development and governance of identity and access management, ensuring alignment with our IAM security policy. Day-to-day, youll work closely with teams across the business (HR, Sourcing, Master Data managers, IS&T, business representatives), design IAM mechanisms and tools, and lead the functional and technical roadmap. Organisation structure (job belongs to..) Digital Services Reports directly to: Identity & Access Lead Architect Roles and Responsibility The IAM Architect has under his responsibility Collaborating on the definition of IAM standards Validating architecture against Security Policy Enhancing the global IAM architecture Supporting security aspects of IT projects related to IAM Perform Technical review and Impact assessment for all changes and new requirement. Update the design document and maintain Support level 5 expertise for IAM platforms and topics Ensure critical applications are well integrated with the good level of IAM control and governance ( access review, good approval workflow) based on policy and instruction. Contribute & validate new security solutions like B2B Operations and B2B SSO in IAM. PAM architecture & domain expertise Collaborate and support for troubleshooting and manage issues related to identities, authentication/authorization and access permissions. Able to analyse risks and to design an appropriate IAM security pattern (provisioning, habitation workflow, authentication, master data authorities, segregation of duty, Privileged Access Management, federation) Youll specifically take care of coordinating with stakeholders on IAM Architecture topics, managing identity lifecycle processes, and working with external/internal resources to support the Alstom IAM program. Recommend solutions for complex operational problems & implement industry best practices The IAM Architect would contribute actively to the security aspects related to IAM in Alstoms IT projects ISSCQ produce all Information System Security and Compliance Questionnaire at the initial phase of all projects Risk analysis perform risk analysis and identify mitigation plan when relevant Security Acceptance make the right decision considering the residual risk and the asset value Experience We value passion and attitude over experience. Thats why we dont expect you to have every single skill. Instead, weve listed some that we think will help you succeed and grow in this role Bachelors/Masters degree in Engineering/Technology or related field Overall 10+years of work experience, 4-5 years of experience in IAM architecture/security activities, with an IT Security background Expertise in IAM concepts and architecture Knowledge of ISO 27002 and ISO 27005 standards Professional industry standard certifications like CISSP, CISA, CEH, GIAC, CISM, etc. will be an added advantage Experience on IAM solutions within Saviynt AAG, Microsoft Azure or other IAG solution Experience on PAM (Privilege Access Management) solutions (eg Cyberark, BeyondTrust) Subject-matter expertise across all IAM topics as it relates to both cloud and on-premises enterprise technology, and the relationship between the architectures. Professional & concise communication (written & verbal) Technical Competencies Experience on operations IAM solutionsLevel 3 Experience on IAM solutions withinSaviynt AAG, Microsoft Azure or other IAG solutionLevel 3 Very Good understanding of Identity & access governance, Multi-Factor authentication and Privileged Access ManagementLevel 4 Good understanding on technologies related to Identity and access management, such as e.g. API ,AD,LDAP,SQL Level 4 Intimately familiar with IAM functional process and design (SOD, Workflow approval, MFA,..) Level 4 Good understanding on functional concept of Identity and access management (workflows, SOD, recertification access, provisioning, auto-correlation access, )Level 4 Very good understanding on security IAM principals and design (e.g network, ) Level 4 2-3 years of IAM Saviynt software experience is appreciated:Level 2 Behavioural Attributes Ability to work global with functional as well as technical teams in a dynamic environment Eye for details, structured and process oriented Demonstrated drive for continuous learning, results-orientation, and teamwork Influence stakeholders for improving and sustaining performance Demonstrate a positive mindset, high levels of character and integrity, and a keen awareness of continuous improvement Advise and collaborate with others to develop strong, positive working relationships across all levels of the organization to drive success of projects and efforts Offer creative, innovative, data-based solutions by focusing on forward progress and creativity, even when working through complex, often competing needs. You dont need to be a train enthusiast to thrive with us. We guarantee that when you step onto one of our trains with your friends or family, youll be proud. If youre up for the challenge, wed love to hear from you! Important to note As a global business, were an equal-opportunity employer that celebrates diversity across the 63 countries we operate in. Were committed to creating an inclusive workplace for everyone.
Posted 3 days ago
5.0 - 8.0 years
14 - 24 Lacs
Chennai
Work from Office
Hiring for Job Title: Senior DevOps Engineer Chennai-work from office Experience: 5 to 8 Years Salary: Max up to 24 lpa Key Responsibilities Design, implement, and manage CI/CD pipelines using GitHub Actions, integrating build, test, and deployment for microservices. • Automate infrastructure provisioning using Terraform across AWS and Azure environments. • Manage and scale Kubernetes (EKS/AKS) clusters, including secure networking, ingress controllers, and resource optimization. • Build and publish Docker images to Amazon ECR and Azure Container Registry, and manage container lifecycles. • Configure and manage custom domain mappings, SSL certificates, and DNS routing for production workloads. • Set up and manage centralized logging with Fluent Bit, CloudWatch, Loki, and monitoring with Prometheus and Grafana. • Manage cloud-native services like RDS, S3, CloudFront, and Azure SQL/PostgreSQL. • Implement secure access management, secret handling, and IAM role policies across environments. • Ensure production readiness with automated deployment approvals, rollback strategies, and pipeline auditability. • Lead troubleshooting and debugging of deployment failures and runtime incidents. • Collaborate closely with backend/frontend engineering teams to streamline deployments and improve Required Skills • Cloud Platforms: Strong hands-on experience with AWS and Azure (incl. ACR, AKS, ECR, EC2, RDS, NAT Gateway, etc.) • CI/CD: GitHub Actions (advanced workflows, manual triggers, secrets, environment-based deployments) • IaC: Terraform (multi-region/multi-AZ VPC, subnets, clusters, EKS/AKS setup) • Containers: Docker, Helm, Kubernetes (EKS/AKS), Ingress (NGINX, ALB), autoscaling • Monitoring & Logging: Fluent Bit, Prometheus, Grafana, Loki, CloudWatch • Security: IAM roles, secret management, SSL (PFX/CRT), domain validation • Scripting: Bash, PowerShell (optional), basic Node.js familiarity is a plus • Source Control: GitHub, GitHub Apps and self-hosted runners • Other Tools: MongoDB Atlas Please call sneha 9884344611 for more Info Regards sneha 9884344611
Posted 3 days ago
2.0 - 7.0 years
4 - 9 Lacs
Chennai
Work from Office
Position Purpose The BNP Paribas Fortis IT department is working in Agile mode, which offers a challenging and motivating environment where teams and employees are empowered to manage their own technical domain. You will work in the IT Security Production Tribe, within the squad Responsibilities Direct Responsibilities The candidate will guarantee the respect of asset information security and ensure correct implementation of the security model. The mission of the IAM Asset Security Consultant is to define and promote the Asset Modeling (AM) frameworks for coordinating and planning a service oriented approach: Taking ownership about the AM process and keeping it updated/improved. Ensuring that the necessary AM procedures exist, are communicated and used by the security community Provide guidance, training and support to the security community in the implementation and operation of the security modelling; Assist and advice the Asset Business responsible and IT developers in defining logical & technical permission management inside the assets (applications, packages, systems, file shares, ). Assess, challenge and validate request to change security on assets according the Information Security Policy Execute daily checks to keep the overall asset models under control Technical & Behavioral Competencies Mandatory: + 2 years experience in security technology and processes (Identity & Access Management aspects, Segregation of Duties, Role Based Access Control) Knowledge of the Information Security Standards & Frameworks Preferable: Expertise in MS Active Directory OR Websphere OR Mainframe OR Linux/Unix OR Oracle OR Cloud computing + experience with MS Excel and SQL requests. Specific Qualifications (if required) Agile environment Follows the Customer processes for projects, incident and change management. Being standalone and team worker, analytical minded, meet commitment, ability to work in a dynamic and multi-cultural environment, flexible, customer-oriented, understand risk awareness. Motivated self-starter, process-oriented with high attention to detail Quick self-starter, pro-active attitude. Good communication skills, Good analytical and synthesis skills. Autonomy, commitment, and perseverance. Ability to work in a dynamic and multicultural environment. Flexibility (in peak periods extra efforts may be required). Open minded and show flexibility in self-learning new technologies/tools. You are customer minded and can translate technical issues into non-technical explanations. You are always conscious about continuity of services. You have a very good team spirit and share your knowledge and experience with other members of the team. Working in collaboration with team. Client-oriented, analytical, initiative oriented and able to work independently. Be flexible and ready to provide support outside of Business hours (on-call). Able to take additional responsibility. Able to work from base location Chennai/Mumbai (Whichever is your base location) during hybrid model. You are flexible and ready to provide support outside of Business hours (on-call). Skills Referential Behavioural Skills : (Please select up to 4 skills) Ability to collaborate / Teamwork Communication skills - oral & written Organizational skills Client focused Transversal Skills: (Please select up to 5 skills) Ability to understand, explain and support change Ability to develop and adapt a process Ability to anticipate business / strategic evolution Analytical Ability Ability to manage a project Education Level: Bachelor Degree or equivalent
Posted 3 days ago
3.0 - 5.0 years
5 - 7 Lacs
Mangaluru, Mysuru, Bengaluru
Work from Office
Job Title: Systems Administrator Job Summary: We are seeking a skilled Systems Administrator to design, implement, and manage IT infrastructure and support services The ideal candidate will have experience in Identity and Access Management (IAM), IT security, cloud platforms, and automation tools such as Terraform You will collaborate with security, infrastructure, and application teams to enhance IT policies, automation, and integrations while providing technical support across the organization Key Responsibilities: System Administration & IT Infrastructure: Deploy, configure, and maintain IT systems, including servers, networks, and cloud environments Implement and manage IT security policies to protect systems and data Monitor system performance, troubleshoot issues, and ensure high availability Automate system administration tasks using scripting and Infrastructure as Code (IaC) tools like Terraform Manage patching, updates, and software deployments IAM Administration & Security Compliance: Design and implement IAM solutions, including user provisioning, SSO, MFA, and RBAC Integrate IAM solutions with enterprise applications, cloud platforms, and directories (OKTA) Ensure compliance with security frameworks (SOC2, ISO 27001, NIST, etc ) Conduct audits, monitor access logs, and respond to security incidents Technical Support & Collaboration: Provide Tier 2/3 technical support, resolving escalated IT service requests Assist with remote troubleshooting and user support using remote access tools Collaborate with IT teams (network, security, systems) to address and resolve complex technical problems Document all troubleshooting steps and solutions in the IT support ticketing system Provide guidance and mentorship to Tier 1 support staff Maintain and update IT knowledge base articles, FAQs, and support documentation Assist in onboarding and provisioning IT resources for new employees or company expansions Stay updated on the latest technologies, tools, and industry best practices Required Skills & Experience: 3-5+ years of experience in IT system administration and support Experience with IAM solutions, including OKTA (SSO, MFA, SCIM provisioning, and identity governance) Proficiency in IT security best practices and compliance frameworks Experience with cloud environments (AWS, Azure, GCP) and securing cloud identities Strong knowledge of operating systems (Windows, macOS, Linux) and networking concepts Scripting experience in Python, PowerShell, or Bash is a plus Strong analytical, troubleshooting, and problem-solving skills Preferred Qualifications: OKTA Certified Administrator / OKTA Certified Developer certification Experience with CI/CD pipelines, Git, and DevOps workflows Knowledge of Privileged Access Management (PAM) solutions Experience in implementing Just-In-Time (JIT) access Bachelors degree in Information Technology, Computer Science, or a related field (or equivalent work experience) Experience with IT ticketing systems (e g , ServiceNow, Zendesk, JIRA, etc ) Excellent problem-solving skills and attention to detail Strong communication skills, both verbal and written, to explain complex issues to non-technical users Ability to prioritize and manage multiple tasks simultaneously Strong customer service orientation and interpersonal skills
Posted 3 days ago
12.0 - 15.0 years
35 - 40 Lacs
Mumbai
Work from Office
About the role As a Network Engineer in the banks security operations center (SOC), the individual will be responsible to oversee the implementation and maintenance of all the underlying IT Network infrastructure necessary to send logs from all the log sources to the banks new SIEM platform. You will be responsible to ensure that the banks new SIEM platform will be able to ingest logs from all the network devices such as routers, switchers, load balancers, WIFI access points, Proxy, etc. as well as security solutions such as NAC, IPS, WAF, etc. Key Responsibilities Business Understanding Responsible to ensure connectivity from all the banks IT systems and applications (whether on cloud or on-prem) to the banks SIEM platform. General upkeep of the SIEM platforms health and availability. Responsible to ensure the upkeep of banks inventory to reflect the correct status of which systems are reporting logs to the SIEM. Collaborate Work with the vendor and local technology departments to troubleshoot any connectivity issues restricting the sharing of logs from any of the log sources into the banks SIEM solution. Qualifications & Skills Educational Qualification Engineering Graduate in CS, IT, EC or InfoSec, CyberSec or MCA equivalent. Certifications a) CCNA b) CCNP Security c) Any Cloud security certifications (AWS, GCP, Azure, OCI) d) Certificate of administration of any of the commonly used firewalls (Checkpoint, Juniper, Cisco, etc.) e) ITIL Compliance Knowledge of cloud security best practices and compliance requirements. Understanding of ITIL processes such as change management, Problem management, Incident management is necessary. Strong understanding of cybersecurity principles will be required. Communication Skills Excellent communication and interpersonal skills. Synergize with the Team Background of working in an IT or cyber security department of a bank or working extensively with the Cyber security team in working on cyber security platforms/tools will be an added advantage. Experience Overall 8 + Years of experience in IT Security with a comprehensive knowledge of network architecture, Network security and security solutions used by an enterprise Security Operations Center. Hands-on experience with monitoring, network diagnostic and network analytics tools Technical Skills Deep understanding of networking technologies of routing, switching, wireless, as well as cloud models (SAAS, PAAS, IAAS). Understanding of ITIL processes such as change management, Problem management, Incident management is necessary.
Posted 4 days ago
8.0 - 10.0 years
27 - 30 Lacs
Gurugram
Work from Office
NAB is looking for Security Assurance Consultant to join our dynamic team and embark on a rewarding career journey Undertake short-term or long-term projects to address a variety of issues and needs Meet with management or appropriate staff to understand their requirements Use interviews, surveys etc. to collect necessary data Conduct situational and data analysis to identify and understand a problem or issue Present and explain findings to appropriate executives Provide advice or suggestions for improvement according to objectives Formulate plans to implement recommendations and overcome objections Arrange for or provide training to people affected by change Evaluate the situation periodically and make adjustments when needed Replenish knowledge of industry, products and field
Posted 4 days ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The IT security job market in India is booming with the increasing digitization and cyber threats. Organizations across various industries are actively looking for skilled professionals to secure their digital assets and protect sensitive information. If you are considering a career in IT security, India offers a plethora of opportunities for growth and advancement in this field.
The average salary range for IT security professionals in India varies based on experience and expertise. Entry-level positions typically start around INR 3-5 lakhs per annum, while experienced professionals can earn up to INR 15-20 lakhs per annum.
In the field of IT security, a typical career path may include roles such as: - Junior Security Analyst - Security Engineer - Security Consultant - Security Architect - Chief Information Security Officer (CISO)
Apart from technical skills in IT security, professionals are also expected to have knowledge in: - Network Security - Cybersecurity - Risk Management - Compliance - Incident Response
As you prepare for IT security roles in India, remember to showcase your technical skills, knowledge of cybersecurity best practices, and problem-solving abilities during interviews. Stay updated with the latest trends in the field and demonstrate a passion for safeguarding digital assets. With dedication and continuous learning, you can embark on a successful career in IT security in India. Good luck!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
17069 Jobs | Dublin
Wipro
9221 Jobs | Bengaluru
EY
7581 Jobs | London
Amazon
5941 Jobs | Seattle,WA
Uplers
5895 Jobs | Ahmedabad
Accenture in India
5813 Jobs | Dublin 2
Oracle
5703 Jobs | Redwood City
IBM
5669 Jobs | Armonk
Capgemini
3478 Jobs | Paris,France
Tata Consultancy Services
3259 Jobs | Thane