Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 8.0 years
8 - 15 Lacs
Hyderabad
Hybrid
Job Description : Approve, within the given mandate, all tier 2-4 Vendor assessments. Advice Global TPCRM and Global DPO on tier 1 Vendor assessments. Collect and evaluate latest Vendor Assurance documents (ISO 27001 certificates and SOC2 statements, tier 1-2) and store them. Escalate high risks to Global TPCRM and Global DPO Launch relevant Vendor assessments (internal and external) Support business departments (Global and OPCOs) and Vendors filling in Vendor assessments Reports: Monthly reporting on Key Performance Indicators (KPI) Reports on Vendor risks, threats or findings Exp : 3+ years Expertise with Vendor Risk Management, GRC, and ISO 27001. Shift timing : 1.00 PM-10 PM IST Hybrid mode of work Location : Hyderabad Notice Period : Immediate- 30 days only.
Posted 1 month ago
6.0 - 9.0 years
8 - 10 Lacs
Chennai
Work from Office
We Have opening on both L2/L3 SOC Analyst Experienced SOC L3 Analyst is needed to expand our group. You will oversee managing and resolving complicated cybersecurity events that have been escalated from L1 and L2 Analysts as an L3 Analyst. To find the underlying cause of security events and offer suggestions for correction, you will be expected to conduct extensive investigations and forensic analyses. Key Responsibilities for this job: Represent the highest level of escalation for cybersecurity issues. To identify the underlying causes of occurrences, carry out comprehensive investigations and forensic analysis. Provide remediation advice and collaborate with L1 and L2 analysts to implement it into practice. Create and maintain playbooks and incident response plans. Conduct penetration tests and vulnerability assessments. Analyze and evaluate the organization's cybersecurity threats. Take part in security audits and assessments. Create and uphold security standards, rules, and procedures. Instruct and guide young analysts in incident response best practices. Knowledge and experience required: Bachelor's degree in computer science, Cybersecurity, or a related field. 5+ years of experience in a SOC environment, with a focus on incident response and forensic analysis. Strong knowledge of cybersecurity frameworks, such as NIST and ISO. Experience working with security tools such as SIEM, IDS/IPS, endpoint detection and response, and firewalls. Excellent analytical and problem-solving skills. Strong communication and collaboration skills. Relevant certifications, such as CISSP, GCIA, GCIH, and/or CISA are highly preferred. Preferred Tool: Rapid7, LogRhythm, Sentinel, Fortinet SOAR, etc Shift flexibility, including weekends and holidays (24*7) Jumping on the call with Vendors and other teams to discuss issues with partners/ to get their requirements and deliver the same in the form of projects Tuning of rules, filters, and policies for detection-related security technologies to improve accuracy and visibility. Providing weekly/monthly reports to the Upper Management.
Posted 1 month ago
1.0 - 6.0 years
1 - 4 Lacs
Mumbai, Thane, Navi Mumbai
Work from Office
This Opportunity is with a leading Fintech Company for their office in Thane location Role: SOC Executive Experience: 1 - 5 Years Job Description: Job Purpose: We are seeking a proactive and detail-oriented SOC Analyst with hands-on experience in SIEM tools such as ManageEngine Event Log Analyzer and SISA MDR. The ideal candidate will be responsible for monitoring, analysing, and responding to security incidents and events, managing alert configurations, and maintaining SOC operations including dashboards, asset inventories, and firewall analysis. This role is critical in the early detection and response to cybersecurity threats and in ensuring the overall security posture of the organization. Roles & Responsibilities: Operate and manage SIEM tools including ManageEngine EventLog Analyzer and SISA MDR to monitor and analyze security events in real-time. Deploy, configure, and manage log sources, and generate actionable reports using EventLog Analyzer. Perform in-depth log analysis and search for specific security events or anomalies within the SIEM environment. Onboard new devices and applications into the SIEM system, ensuring comprehensive log collection and visibility. Configure and fine-tune alert rules to identify potential threats and reduce false positives. Develop, maintain, and regularly update SOC dashboards to reflect current threat status and incident trends. Coordinate with support teams to raise Service Request Forms (SRFs), track ticket resolutions, and manage incident lifecycle activities. Define security policies and conduct vulnerability assessments using Nessus, analysing scan results for remediation planning. Continuously monitor SOC for suspicious activities such as DDoS attacks, port scanning, and unauthorized access attempts. Maintain an accurate asset inventory for SOC systems (desktops, laptops, servers) and verify that all Windows systems are properly licensed. Act as a first-level responder during security incidents, escalating issues such as bandwidth spikes, firewall violations, network outages, and unauthorized activities. Monitor and analyse firewall logs using FortiAnalyzer, identifying top sources/destinations, bandwidth-heavy applications, critical threats, and policy violations. Qualification/ Knowledge/ Skills/ Experience: Bachelors degree in information security, Computer Science, or related field. 1-2 years of relevant work experience. Proven experience with SIEM platforms (ManageEngine, SISA MDR) and vulnerability scanning tools (Nessus). Strong understanding of network protocols, firewall technologies, and incident response procedures. Experience in log analysis, alerting configuration, and SOC monitoring. Knowledge of Fortinet firewalls and experience with FortiAnalyzer preferred. Familiarity with security standards and compliance requirements. Good communication and documentation skills. Preferred Certifications: CompTIA Security+ / CySA+ EC-Council CEH GIAC (GCIH, GCIA) ManageEngine or Fortinet product certifications (preferred). Interested Candidates can share their CV's at priyal@topgearconsultants.com
Posted 1 month ago
5.0 - 9.0 years
5 - 8 Lacs
Hyderabad
Work from Office
Experience in ISO 27001:2022, Internal audits, risk management, incident handling activities Should work in flexible shifts & worked for global clients. Preferred having worked in Core IT services (ITSM, IT administration, Network handling)
Posted 1 month ago
0.0 years
18 - 20 Lacs
Bengaluru
Work from Office
Join us as a Site Reliability Engineer You ll manage the provision of stable, resilient, reliable applications with the end goal of minimising disruption to Customer Colleague Journeys (CCJ) We ll look to you to identify and automate manual tasks and implement observability solutions, ensuring a thorough understanding of CCJ across applications This associate vice president level role is a great chance to work in a supportive environment with opportunities to advance your personal and career development Were offering this role at associate vice president level What youll do As a Site Reliability Engineer, you ll collaborate with feature teams to understand application changes, participate in delivery activities, and address production issues to assist in the delivery of change that does not negatively affect the customer experience. Youll contribute to site reliability operations which will include production support, incident response, on-call rota, toil reduction, and application performance. Youll also proactively lead improvement to release quality into production and provide highly available, performing, and secure production systems. Other responsibilities will include: Delivering automation solutions to minimise and eliminate manual tasks associated with maintaining and supporting the applications Ensuring in-depth understanding of the full tech stack on which the application resides and depends on Identifying alerting and monitoring requirements for an application, based on sound understanding of customer journeys Evaluating the resilience of the end-to-end tech stack on which the applications depend, and addressing weaknesses Seeking to reduce frequency of hand-offs in the end-to-end resolution of customer-impacting incidents The skills youll need To succeed in this role, you ll need at least eight years of experience in support live production services serving customer journeys with a demonstrable knowledge of ITIL processes and IT Security principles along with tools and techniques to prevent compliance breaches. You ll also need: Coding experience and the ability to build, test, scan, and deploy a .NET and JavaScript application Experience in deployment and release services, automation and troubleshooting Experience of using industry standard engineering tooling Experience of Azure Cloud and full-stack observability using tools such as Log Analytics, Application Insights and Grafana Strong verbal and written communication skills
Posted 1 month ago
3.0 - 7.0 years
3 - 7 Lacs
Pune
Work from Office
About the Role We are seeking a skilled Senior Security Analyst to join our SOC team. The ideal candidate will have a strong background in SOC operation and ensure that the SOC team is performing its functions as required and to trouble shoot incidents and events. As a Senior Security Analyst shall also act as the technical SME, and handle critical SOC task, Incident, guiding Level 1 and Level 2, customer communications. Key Roles & Responsibilities: Incident Response and Management Lead the investigation of high-severity security incidents and breaches. Provide expert analysis for complex incidents that L1 and L2 analysts cannot resolve. Develop and execute incident response procedures, including containment, eradication, and recovery. Ensure proper escalation processes are followed for incidents requiring higher expertise. Communicate with stakeholders, such as management and IT teams, to ensure appropriate handling of incidents. Threat Hunting and Analysis Perform proactive threat hunting activities to identify potential vulnerabilities, threats, and attacks before they happen using Splunk / QRadar SIEM. Use threat intelligence feeds to enrich SOC operations and identify emerging threats. Analyze large volumes of security data to detect patterns and anomalies. Security Tool Management Oversee and optimize the usage of security monitoring tools such as Splunk/ QRadar SIEM (Security Information and Event Management), IDS/IPS (Intrusion Detection/Prevention Systems), and endpoint protection systems. Configure, update, and fine-tune security tools to improve detection capabilities and reduce false positives. Recommend new security tools and technologies to improve SOC operations. Log and Event Analysis Review logs from various sources (network, endpoints, servers, etc.) to identify security incidents. Ensure accurate log data collection and retention practices are followed. Provide in-depth analysis of security alerts and generate reports. Vulnerability Management Conduct vulnerability assessments and prioritize remediation activities for critical vulnerabilities. Collaborate with the IT and development teams to address security flaws and implement patches. Collaboration and Escalation Serve as the point of escalation for L1 and L2 SOC analysts when complex issues arise. Collaborate with other security teams, such as network security, application security, and IT operations, to ensure a comprehensive defense strategy. Work with external partners, including Managed Security Service Providers (MSSPs), to coordinate incident management and threat intelligence sharing. Security Policies and Best Practices Review and recommend improvements to security policies, procedures, and best practices. Ensure that the organization's security policies are being followed and advise on improvements. Conduct regular security awareness training for SOC staff and the broader organization. Reporting and Documentation Generate detailed reports on incidents, security posture, and threats for senior management and relevant stakeholders. Maintain incident logs and documentation to comply with regulatory and internal policies. Ensure all incidents are well-documented with root cause analysis, remediation efforts, and lessons learned. Continuous Improvement Analyze the effectiveness of the SOC's operations and suggest improvements to processes, workflows, and technologies. Stay updated on the latest cyber threats, tools, and techniques. Assist with the development and execution of simulations, exercises, and training to improve SOC capabilities. Compliance and Regulatory Requirements Ensure compliance with SLAs for all projects. Ensure SOC operations meet industry compliance requirements (e.g., GDPR, HIPAA, PCI DSS). Help in audits and compliance assessments related to security operations. Mentoring and Training Provide mentorship and training to junior SOC analysts (L1 and L2). Share knowledge on advanced attack techniques, response strategies, and threat detection methods. Report deviations and concerns to the SOC Manager Basic Qualifications: B.E/B.Tech in Computer Science, Information Technology, Cybersecurity, or a related field. 5+ year of experience and strong foundational knowledge in security operations, SIEM, or IT security. Basic understanding of cybersecurity concepts, networking fundamentals, and security monitoring. Knowledge of IT infrastructure, networking, and cybersecurity principles. Communicate effectively with customers, teammates, and management Excellent problem-solving skills and attention to detail. Strong communication and interpersonal skills. Preferred Qualifications: Certifications in ECIH/GCIH/CISM/CISSP etc. Splunk Certified candidate Exposure to SIEM solutions, specifically Splunk, Qradar ,DNIF or similar platforms. Familiarity with security tools such as EDR, XDR, WAF, DLP, email security gateways, and proxy solutions. Enthusiasm for learning and a strong interest in cybersecurity as a career. Ability to work in a team and adjust to rotational shifts in a high-stakes environment. Knowledge of cloud security and platforms (e.g., AWS, Azure, GCP)
Posted 1 month ago
8.0 - 13.0 years
12 - 20 Lacs
Mumbai
Work from Office
Hiring for MNC •Technically sound and hands-on knowledge to manage and maintain various security products like IPS/IDS, Proxy, Anti-virus, Load Balancer, SSL VPN, URL filtering,2FA, DDoS and Network security. Required Candidate profile Act as a functional Security technologies and Operations & Lead a 24x7 Info Sec team managing tools like EDR/XDR, WAF, DLP, Anti-APT, Anti-DDOS,PAM, SIEM, SOAR etc. deployed for of security monitoring
Posted 1 month ago
12.0 - 18.0 years
11 - 15 Lacs
Pune
Work from Office
Domain Certifications CISSP, CISA, CRISC, ISO 27001 Responsibilities Own and lead the governance program at account level for a large Financial services account with 700 + head count and multi country locations having high security Offshore Delivery Centres & Work from home teams Develop, implement and monitor Account level Information security governance program; meeting client compliance requirements proactively Perform contract reviews, cyber security risk assessments and drive compliance programs to meet contractual and organizational cyber security requirements within the client offshore delivery centres. Experience in Application security and code reviews which can be leveraged to guide and work with delivery teams on covering the cyber security risks associated with Application security, development and maintenance projects. Work closely with different teams internally like IT, business, HR, facilities, cyber security which operate at Organization level to translate client requirements and assess residual risk if required Give directions and monitor the compliance and operations activities within the account through dedicated team and work closely with account team on ensuring the compliance within account team Develop account level procedures, metrics and review programs to maintain and enhance the governance model within the account Be a single point of contact for client interactions during third party audits and liaise within the organization Prepare the account for certification and internal audit requirements based on industry standards like PCI DSS and ISO 27001 requirements Focus and objective driven to demonstrate ongoing improvements; identify early indicators of non compliance and able to draw mitigation actions Hold technical skills to participate in technical discussions for delivery centre setup, connectivity models Excellent communication skills and have demonstrated effective CXO level reviews
Posted 1 month ago
3.0 - 5.0 years
5 - 7 Lacs
Mumbai
Work from Office
Looking for a Hadoop Administrator to manage, monitor, and optimize Hadoop clusters. Responsibilities include deployment, upgrades, performance tuning, and security. Requires 3+ years of experience with Hadoop ecosystem tools and Linux systems. Required Candidate profile Notice Period : Immediate or 30 days max
Posted 1 month ago
7.0 - 12.0 years
22 - 25 Lacs
Chandigarh, Bangalore Rural, Bengaluru
Work from Office
Security Service Operations,IT Security Technologies,CISSP, CISM, CRISC, CISA,SIEM, EDR, Email Security Gateways, Vulnerability Management Software, Firewalls,security systems, user authentication and management
Posted 1 month ago
5.0 - 9.0 years
10 - 20 Lacs
Bengaluru
Work from Office
KEY ACCOUNTABILITIES Perform and provide oversight for day-to-day security SOC operations duties, including the management of security analysts, the development and implementation of security policies and procedures, and the response to security alerts. Develop and maintain KPI reports on SOC team performance and other aggregated performance metrics. Develop reports on Security operations for executive management and regional teams. Manage a team of SOC analysts including rostering / shifts planning, tasks allocation and coordination. Continuously monitor security events and alerts generated by various security monitoring tools, such as SIEM (Security Information and Event Management) systems, IDS/IPS (Intrusion Detection/Prevention Systems), and endpoint protection platforms. Identify and analyze security incidents based on the available information. Classify and prioritize incidents according to their severity and potential impact. Initiate and coordinate the incident response process, following predefined procedures and workflows. Work with different IT teams to troubleshoot and resolve security-related issues and assist in configuring the logs to be forwarded from their respective systems to the centralized logging system. Analyze vulnerability scan results and work with system owners and IT teams to remediate identified vulnerabilities within specified timeframes. Provide recommendation for Security Use-case creation and optimization for any new/existing systems. Conduct Network and Endpoint log analyses including threat hunting activities and present findings. Studying vulnerabilities, identifying relevant threats, corrective actions recommendations and reporting results. Document all incidents, investigations, and analysis activities accurately and thoroughly. Prepare incident reports, including detailed information on the incident timeline, impact, and recommended remediation actions. OTHER Act as an ambassador for DP World at all times when working; promoting and demonstrating positive behaviours in harmony with DP World’s Principles, values and culture; ensuring the highest level of safety is applied in all activities; understanding and following DP World’s Code of Conduct and Ethics policies. Perform other related duties as assigned. QUALIFICATIONS, EXPERIENCE AND SKILLS Knowledge and Experience Bachelor’s Degree in Computer Science or equivalent. Should have 5-7 years of experience in IT Security with at least 4 years’ experience in conducting analysis of log data and security operations center. Technical and hands-on experience across Cyber Security and technology domains. Background in security technologies, network protocols and operations and understanding of TCP/IP protocol and OSI Seven Layer Model. Computer programming and scripting languages. Strong understanding of the Cyber Kill Chain, pervasive threats attack methods and remediation. Industry recognized professional certifications such as GSEC, Security+, CEH, CySA. Good understanding in E-commerce, logistics, supply chain & port operations applications will be added advantage. Soft Skills Sound analytical and intellectual capabilities. Excellent time management and organizational skills. Decision-making abilities. Team player and conflict management skills. Ability to multi-task, prioritize, coordinate, and work well under pressure to meet deadlines. Strong interpersonal and communication skills ability to work in a team environment. Cultural awareness. Must possess Excellent Reporting Skills. Technical Skills Knowledge of Security Orchestration and Automation (SOAR) solutions. Experience with two or more analysis tools used in a CIRT or similar investigative environment. Ability to analyse and triage IoCs. #L1-MP1
Posted 1 month ago
8.0 - 13.0 years
13 - 17 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
As an IAM Architect, You Will: Design and architect IAM solutions using PingFederate, PingAccess, PingOne. Define IAM roadmaps covering federation, provisioning, and governance. Provide leadership for Zero Trust, MFA, and federated identity frameworks. Collaborate across IT, security, compliance, and business teams. Evaluate current IAM posture and recommend improvements. Mentor IAM engineers and guide solution implementation. What You Bring to the Table: 8+ years in IAM with 4+ years in Ping Identity technologies. Deep knowledge of OAuth, SAML, OIDC, LDAP. Understanding of hybrid/cloud IAM platforms (e.g., AWS IAM, Azure AD). Experience with compliance frameworks (NIST, GDPR, etc.). Strong architecture design and stakeholder engagement skills. You Should Possess the Ability to: Translate business goals into scalable IAM architectures. Lead IAM strategy across large enterprises. Communicate effectively with both executives and engineers. What We Bring to the Table: A collaborative and inclusive work environment. High-impact architectural work driving enterprise security. Exposure to modern frameworks in Zero Trust and cloud IAM. Let s connect.
Posted 1 month ago
1.0 - 3.0 years
1 - 4 Lacs
Gurgaon/Gurugram
Work from Office
What you'll do We are seeking a highly skilled and motivated Information Security Executive to join our team. The ideal candidate will have in-depth knowledge of ISO 27001, ISO 27701, ISO 27002, ISO 27005, GDPR 2016, and DPDP Act 2023. This role involves preparing and maintaining security policies, processes, and procedures, conducting internal audits, and leading monthly review meetings to ensure our organization remains compliant and secure. - Key Responsibilities Develop and Maintain Security Policies and Procedures: Create, update, and enforce information security policies, processes, and procedures in line with ISO 27001, ISO 27701, ISO 27002, and ISO 27005 standards. Ensure compliance with GDPR 2016 and DPDP Act 2023 regulations. Communicate and train staff on security policies and procedures. - Internal Audits: Plan, conduct, and document internal audits to ensure compliance with established security standards and regulations. Identify and address vulnerabilities and non-compliance issues. Work with relevant departments to implement corrective actions and continuous improvements. - Monthly Review Meetings: Organize and lead monthly security review meetings. Present audit findings, security incidents, and risk assessments to senior management. Monitor and report on the effectiveness of the security measures implemented. - Compliance and Governance: Ensure ongoing compliance with relevant data protection laws and regulations. Stay updated on changes in legislation and standards affecting information security. Liaise with regulatory bodies as needed. Qualifications Bachelor's degree in Information Security, Computer Science, or a related field. Professional certifications will be an added advantage. Proven experience in information security management, particularly in ISO 27001, ISO 27701, ISO 27002, and ISO 27005. Strong understanding of GDPR 2016 and DPDP Act 2023. Excellent communication and interpersonal skills. Strong analytical and problem-solving abilities. Ability to work independently and as part of a team. Skills and Competencies Technical Expertise: Deep knowledge of information security principles, standards, and frameworks. Policy Development: Proficiency in developing and implementing security policies, processes, and procedures. Audit and Compliance: Experience conducting internal audits and ensuring compliance with security standards and regulations. Risk Management: Ability to conduct risk assessments and develop risk mitigation strategies. Communication: Strong ability to communicate complex security concepts to non-technical stakeholders.
Posted 1 month ago
5.0 - 12.0 years
7 - 14 Lacs
Kochi
Work from Office
mispa Technologies Career - mispa Technologies Press enter for search Let s shape the future together The future depends on what you do today Our values Our values form the basis for everything we do. They define who we are and give a clear and reliable message to both our employees and our partners. We are open, transparent and honest. We respect everyone, regardless of their origin or age. We value the communities we serve and actively support their development. We explicitly view clients as partners. Transparency, understanding, professionalism, and confidentiality regarding all client transactions guide our actions and joint success with our partners. We are passionately committed to our services, our employees and our customers. We are motivated and determined to achieve outstanding results together with our clients. Innovation and market understanding are at the core of our business. We encourage the adoption of new ideas, openness and enterprising thinking to ensure that we provide our customers with market-leading solutions. Together we will master future challenges. We strive to perform outstanding in all aspects. With a strong desire to make things happen, we work consistently to deliver exceptional technology, service and results for our customers. Be a visionary Live your life There is life at work and life outside of work. We want everyone to be healthy, able to pursue their passions, have time to give back and have the resources and support they need. Build extraordinary services Technologies that connect people together in the real world are both inspiring and daunting. We face challenges in the areas of technology, development, operations, consulting and sustainability We love to contribute to the security and stability of organizations and our communities through our work. Integrate everyone A world of seemingly endless possibilities begins with a workplace where you feel welcome and can bring your best ideas and achievements to the team. mispa invites you to discover your limits One team, global mission Let s shape the future together Your future with mispa Senior System Engineer Monitoring & DevOps Grow and shape a secure future together with us! mispa Technologies is an innovative IT security services and solution provider with head office in Langenfeld (Rhineland), Germany and Dev & Operations Center in Cochin (India). We focus on leading German based international companies and deliver IT consulting, technology services and managed services that use Innovative [ ] 5 - 12 years IT Network Security Engineer Grow and shape a secure future together with us! mispa Technologies is an innovative IT security services and solution provider with head office in Langenfeld (Germany) and Dev & Operations Center in Cochin (India), established in 2014. We focus on IT consulting, professional services and managed services that use Innovative Technologies. You will have the [ ] 15 - 60 days 3-10 years IT Infrastructure Specialist Grow and shape a secure future together with us! mispa Technologies is an innovative IT security services and solution provider with head office in Langenfeld (Rhineland), Germany and Dev & Operations Center in Cochin (India), established in 2014. We focus on IT consulting, professional services and managed services that use Innovative Technologies. You will have [ ] 3-8 years SME/ Security Architect Palo Alto Grow and shape a secure future together with us! mispa Technologies is an innovative IT security services and solution provider with head office in Langenfeld (Rhineland), Germany and Dev & Operations Center in Cochin (India) registered under jeitsa Technologies Private Limited operating from SmartCity, Infopark Cochin (India). We focus on IT consulting, professional services and [ ] Senior Python developer Grow and shape a secure future together with us! mispa Technologies is an innovative IT security services and solution provider with head office in Langenfeld (Rhineland), Germany and Dev & Operations Center in Cochin (India). We focus on IT solution development, technology consulting, and managed services that use Innovative Technologies. You will have the [ ] 5-8 years Cisco SD-WAN & WAN Architect / SME Grow and shape a secure future together with us! mispa Technologies is an innovative IT security services and solution provider with head office in Langenfeld (Rhineland), Germany and Dev & Operations Center in Cochin (India). We focus on IT consulting, technology services and managed services that use Innovative Technologies. You will have the opportunity to [ ] Network Engineer SD-WAN (Senior) Senior Network Engineer (SD-WAN) Senior Network Engineer (SD-WAN) Cochin Grow and shape a secure future together with us! mispa Technologies is an innovative IT security services and solution provider with head office in Langenfeld (Rhineland), Germany and Dev & Operations Center in Cochin (India), established in 2014. We focus on IT consulting, professional services and managed services that use [ ] (Senior) Security Engineer (f5) As of now 4-12 years Senior IT Security Engineer Jeitsa Technologies, a division of Mispa Technologies GmbH Germany delivers ITES from the Operation Center in Cochin. We focus on IT consulting, Infrastructure Security Enabled Services and Development. 5 12 years We use cookies on our website to give you the most relevant experience by remembering your preferences. By clicking Accept All , you consent to the use of all cookies. Visit "Cookie Settings" to choose individual cookies. This website uses cookies to improve your experience as you navigate through the website. Of these, the cookies that are categorized as required are stored in your browser as they are essential for the functioning of the basic functions of the website. We also use third-party cookies to help us analyze and understand how you use this website. These cookies are only saved in your browser with your consent. You also have the option of rejecting these cookies. However, if you refuse some of these cookies, it may affect your browsing experience.
Posted 1 month ago
8.0 - 10.0 years
10 - 14 Lacs
Pune
Work from Office
We are seeking a Security Specialist to join our team. The role involves identifying, researching, prioritizing, remediating, and mitigating vulnerabilities as part of our vulnerability management practice. you'll work with a diverse and skilled team to ensure the security of our information assets. What you will do: Align with units and stakeholders on PT test requirements and schedules. Conduct manual penetration testing with hands-on experience. Create scripts for payloads and simulate security breaches. Perform web, API, mobile, and infrastructure pen testing. Set up test labs for zero-day attacks and plan penetration methods. Execute periodic testing based on threat intelligence and data review. Report findings and suggest risk mitigation strategies. Present conclusions to stakeholders. Manage PT tools, licenses, and infrastructure. Drive automation and innovation for improved efficiency and quality. Document designs and configurations. Resolve reported vulnerabilities and propose solutions for gaps. Analyze critical exploits and mentor security engineers. Provide after-hours support for IT security incidents. The skills you bring: bachelors Degree in Computer Science or related field. 8-10 years of experience. Strong knowledge of security controls (eg, access control, encryption, and application security). Proficiency with PT tools like Kali Linux, Metasploit, and Burp Suite. Deep understanding of security issues in enterprise, network, API, and mobile systems. Familiarity with enterprise computing, distributed applications, and TCP/IP network security. Experience in writing technical reports and summaries. Ability to provide after-hours support and work under pressure. Effective in both team and independent work settings. Participate in on-call rotation for critical incidents. Strong collaboration and knowledge-sharing skills. Results-driven with excellent communication skills; fluency in English is essential. Preferred certifications: OSCP, OSWP, OSEP, OWSA, OWSE.
Posted 1 month ago
10.0 - 18.0 years
15 - 25 Lacs
Ahmedabad, Vadodara, Vadinar
Work from Office
Engineering graduate with 10 to 15 Years of experience in control system Management in large size Infrastructure industry like Power, Oil & Gas with Minimum 4 to 5 years of experience in deployment and management of Operational Technology Security solution. Candidates should have experience on Project management with OT security analysis, supporting various OT teams in creating defense in depth OT network, Vulnerability, governance, risk assessment; compliance to OT Standards. Certification or training in Operational Technology Cyber security domains or Products, LA ISO 27001 etc are preferred. Good understanding of various components in the ICS ecosystem, common security issues faced and best practices to be followed from a security standpoint. Strong understanding of Industrial control protocols and its security Solutions. Knowledge of the ICS cybersecurity frameworks like NIST 800-82 and IEC 62443 Good understanding of Industry 4.0. Suitable candidates may forward their updated profiles in strict confidence to hr33@hectorandstreak.com
Posted 1 month ago
3.0 - 8.0 years
5 - 10 Lacs
Hyderabad
Work from Office
We are seeking a Modern Workplace Analyst with 3+ years of hands-on experience in SharePoint administration and Microsoft 365 solution development. Requirements: Strong working knowledge of SharePoint Online, Power Platform such as Power Apps, Power Automate, Teams, OneDrive and Lists. Proven ability to deliver no-code/low-code applications and automate workflows with business logic and data integration. Ability to translate user needs into technical requirements and deliver practical, easy-to-adopt tools. Comfortable working closely with cross-functional teams including HR, Finance, Operations and IT Security. Familiarity with Microsoft 365 governance, compliance, and lifecycle best practices. Capable of managing multiple development requests and priorities in a fast-paced environment. Skilled in diagnosing technical issues and designing sustainable solutions. Exposure to change management or service adoption methodologies in M365 environments. Ability to develop user guides, training videos or how-to documentation to support new solutions. Experience with usage analytics and reporting tools within M365 to track adoption and identify improvement opportunities. Experience in supporting collaboration and productivity tools within a manufacturing or multi-site corporate environment. Passion for continuous improvement and emerging digital workplace technologies. Preferred Certifications include Microsoft certifications such as MS-700, MS-600, PL-200 or equivalent experience.
Posted 1 month ago
7.0 - 12.0 years
25 - 30 Lacs
Gurugram
Work from Office
Your job is just one part of your life. When you bring your ideas, energy, and hunger for growth, you ll be recognised and rewarded for your contribution in return. You ll have our support to excel for our customers, deliver positive change for our communities and grow your career. NAB has established NAB Innovation Centre India as a centre for operations and technology excellence to support NAB deliver faster, better, and more personalized experience to customers and colleagues. At NAB India, we re ramping-up and growing at a very fast pace. Our passionate leaders recruit and develop high performing people, empowering them to deliver exceptional outcomes to make a positive difference in the lives of our customers and our communities. Your New Role: The position holder will be required to: 1. Perform business-as-usual technology management and support functions for Security Technologies within the Cyber Protection Portfolio 2. Report to Platform Managers and senior team members regarding technology system status and posture 3. Perform problem diagnosis and use technical expertise to develop options and solutions to specific problems that are often technical in nature and contribute to remediation, repair and recovery activity 4. Contribute to support documentation and provide advice regarding applications to enable the support function to work pro-actively 5. Participate in the rotating team on-call after-hours support rosters 6. Provide coaching and knowledge sharing to other team members where appropriate to support their skills and ensure their effective contribution to team objective What will you bring: Experience in below Technologies 1.Internet Proxy Access Services (zScaler/McAfee) 2.End User Security products. (zScaler ZPA, ZIA) 3. Networks (comms concepts and Load Balancers) and Firewalls (Checkpoint and F5) 4. Anti Virus and Threat Protection products (McAfee, Defender, Crowdstrike, FireEye) 5. Cloud Based technologies (AWS/Azure, Google Cloud) 6. Able to implement additional automation across all platforms to improve delivery times 7. Able to influence stakeholders to ensure appropriate security controls are implemented or the decision is documented explaining the impact and the risk. 8.Ability to converse with both end-users and IT employees at all levels of the organisation. 9. Solid understanding of problem, change and incident management principles 10.Good understanding of all aspects of the systems/software development lifecycle; 11..Understanding of key IT security concepts. A relevant tertiary qualification in an area such as Information Security, Communications, Organisational Change and Development, Organisation Behaviour, Learning and Development, Business or Commerce would be favourable .
Posted 1 month ago
8.0 - 10.0 years
9 - 13 Lacs
Pune
Work from Office
Join our Team Grow with us About this opportunity: We are seeking a Security Specialist to join our team. The role involves identifying, researching, prioritizing, remediating, and mitigating vulnerabilities as part of our vulnerability management practice. Youll work with a diverse and skilled team to ensure the security of our information assets. What you will do: Align with units and stakeholders on PT test requirements and schedules. Conduct manual penetration testing with hands-on experience. Create scripts for payloads and simulate security breaches. Perform web, API, mobile, and infrastructure pen testing. Set up test labs for zero-day attacks and plan penetration methods. Execute periodic testing based on threat intelligence and data review. Report findings and suggest risk mitigation strategies. Present conclusions to stakeholders. Manage PT tools, licenses, and infrastructure. Drive automation and innovation for improved efficiency and quality. Document designs and configurations. Resolve reported vulnerabilities and propose solutions for gaps. Analyze critical exploits and mentor security engineers. Provide after-hours support for IT security incidents. The skills you bring: Bachelor s Degree in Computer Science or related field. 8-10 years of experience. Strong knowledge of security controls (e.g., access control, encryption, and application security). Proficiency with PT tools like Kali Linux, Metasploit, and Burp Suite. Deep understanding of security issues in enterprise, network, API, and mobile systems. Familiarity with enterprise computing, distributed applications, and TCP/IP network security. Experience in writing technical reports and summaries. Ability to provide after-hours support and work under pressure. Effective in both team and independent work settings. Participate in on-call rotation for critical incidents. Strong collaboration and knowledge-sharing skills. Results-driven with excellent communication skills; fluency in English is essential. Preferred certifications: OSCP, OSWP, OSEP, OWSA, OWSE. Why join Ericsson? What happens once you apply? Primary country and city: India (IN) || Gurgaon, Noida, Bangalore, Kolkata, Pune Req ID: 767059
Posted 1 month ago
3.0 - 5.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT Mandatory Skills: OT SECURITY. Experience3-5 Years.
Posted 1 month ago
1.0 - 3.0 years
5 - 9 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT
Posted 1 month ago
3.0 - 5.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT Mandatory Skills: ServiceNow - GRC. Experience3-5 Years.
Posted 1 month ago
5.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Security Log Monitoring. Experience5-8 Years.
Posted 1 month ago
1.0 - 3.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
3.0 - 5.0 years
7 - 11 Lacs
Kochi
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT Mandatory Skills: Security Log Monitoring. Experience3-5 Years.
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6464 Jobs | Ahmedabad
Amazon
6352 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane