Home
Jobs

371 It Security Jobs - Page 14

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3 - 5 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: Microsoft Information Protection. Experience3-5 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

3 - 5 years

7 - 11 Lacs

Pune

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: Proxy. Experience3-5 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

2 - 6 years

5 - 9 Lacs

Pune

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT ? ? Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

5 - 8 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: SailPoint Identity Now. Experience5-8 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

3 - 5 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: ForgeRock Identity Manager. Experience3-5 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

3 - 5 years

7 - 11 Lacs

Hyderabad

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: Archer. Experience3-5 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

3 - 5 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: Microsoft Information Protection. Experience3-5 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

3 - 5 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: ServiceNow - GRC. Experience3-5 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

2 - 6 years

5 - 9 Lacs

Coimbatore

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT ? ? Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

7 - 8 years

9 - 10 Lacs

Gurugram

Work from Office

Naukri logo

The Team The OSTTRA Technology teamis composed of Capital Markets Technology professionals, who build,supportand protect the applications that operate our network. The technology landscapeincludeshigh-performance, high-volume applications as well as compute intensive applications,leveragingcontemporary microservices, cloud-based architectures. The Impact: Together, we build, support, protect and manage high-performance, resilient platforms that process more than 100 million messages a day. Our services are vital to automated trade processing around the globe, managing peak volumes and working with our customers and regulators to ensure the efficient settlement of trades and effective operation of global capital markets. Whats in it for you: We are seeking a highly motivated and experienced Information Security person to join our growing security team. In this role, you will be responsible for managing and optimizing our Data Loss Prevention (DLP) solutions, ensuring compliance with relevant security standards i.e. ISO 27001, NIST and implementing and maintaining robust Identity and Access Management (IAM) and Privileged Access Management (PAM). You will play a crucial role in protecting our sensitive data and ensuring the security posture of our organization. This is an excellent opportunity to be part of a team based out of Gurgaon and to work with colleagues across multiple regions globally. Responsibilities Data Loss Prevention (DLP) Management: Implement, Manage, and optimize DLP tools policies to prevent data leaks and ensure data protection. Develop and maintain DLP policies and procedures. Regularly update and fine-tune DLP rules to adapt to evolving data protection needs. Monitor and analyse DLP alerts and incidents and perform incident response. Provide training and guidance to users on DLP best practices. Implement real-time monitoring and logging for data movement and access patterns. Generate detailed reports on data loss attempts, policy breaches, and user behavior anomalies. Evaluate and recommend improvements to existing DLP solutions. Develop playbooks for quick response to DLP-related threats and incidents. Perform regular data flow assessments to identify unprotected data paths Identity and Access Management (IAM) and Privileged Access Management (PAM): Manage requirements around IAM and PAM security, including user provisioning, access control, and privileged access management. Develop and enforce IAM and PAM policies and procedures. Conduct regular access reviews and audits. Generate compliance reports for internal and external audits (e.g., SOX, GDPR, PCI-DSS). Troubleshoot IAM and PAM issues together with the respective Infrastructure teams. Integrate IAM/PAM systems with other security and business applications. Regularly evaluate IAM/PAM solutions to keep pace with emerging threats and technologies. Information Security Compliance: Ensure compliance with relevant security standards and regulations, including ISO 27001, NIST Standard Conduct internal security audits and assessments. Develop and maintain security documentation and procedures. Assist with external security audits and assessments. Stay up to date on the latest security threats and vulnerabilities. Other Duties: Provide security consulting and support to other teams. Knowledge on Application Pen testing would be an added advantage Evaluate and recommend new security technologies and solutions. Participate in security awareness training and initiatives. Understanding on Technology & Security Risk Management and Vendor Risk Management Framework What Were Looking For Qualifications 7 to 8 years experience working in IT Security & GRC in multiple capacities. Bachelors in IT, Computer Science, Cyber Security, or equivalent experience required. Proven experience with DLP tools and technologies (e.g., Symantec DLP, Forcepoint DLP, Microsoft Information Protection, Zscaler etc.) and certification on these tools would be added advantage Strong understanding of IAM and PAM concepts, tools and technologies and certification on these tools would be added advantage In-depth knowledge of ISO 27001 and other relevant security standards and regulations. Certification like ISO 27001, CISA, CRISC, CISM etc. would be an added advantage. Competencies: The ability to multitask, act under pressure and quickly identify and deal with priority matters under tight deadlines. Attention to detail is essential. The ability to handle multiple inquiries at any one time, often under considerable deadline pressure. The ability to work both independently and as part of a team. Desired Skills: Excellent written and spoken English. Detail oriented with excellent research, analytical and critical thinking skills. Strong documentation, oral and written communications, and interpersonal skills.

Posted 1 month ago

Apply

3 - 8 years

11 - 13 Lacs

Pune

Work from Office

Naukri logo

Knowledge of operating systems, system administration, and application security. Proficiency in security tools and technologies Experience with incident response methodologies. Strong knowledge of IT security protocols, data privacy standards Required Candidate profile Certified Information Systems Security Professional (CISSP) Vulnerability Scanner/Nessus, CrowdStrike, Cisco Meraki, Forcepoint One. Experience with cloud security and network security.

Posted 1 month ago

Apply

5 - 7 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

Hello Talented Techie! We provide support in Project Services and Transformation, Digital Solutions and Delivery Management. We offer joint operations and digitalization services for Global Business Services and work closely alongside the entire Shared Services organization. We make efficient use of the possibilities of new technologies such as Business Process Management (BPM) and Robotics as enablers for efficient and effective implementations. We are looking for Information Security Professional (ISMS/InfoSec) Job Summary: We are seeking a dedicated Information Security Professional to join our team. The ideal candidate will focus on maintaining and managing our ISO27001 certification. This role involves handling the overall Information Security Management System (ISMS), managing internal stakeholders, conducting internal audits, facilitating external audits, and overseeing the information security program management. Key Responsibilities: Maintain and manage the ISO27001 certification and related processes. Oversee the Information Security Management System (ISMS) ensuring compliance with ISO27001 standards. Manage and coordinate internal audits, identifying areas for improvement and implementing necessary changes. Facilitate external audits, acting as the primary point of contact with external auditors. Engage with internal stakeholders to ensure information security policies and practices are effectively communicated and implemented. Develop, implement, and manage information security programs to enhance organizational security posture. Stay updated with the latest developments in information security standards and best practices. Qualifications: Bachelor"™s degree in Information Security, Computer Science, or a related field. 5-7 years of experience in information security with at least 5 years in direct ISMS. Strong knowledge of ISO27001 standards and requirements. Experience in managing and maintaining an Information Security Management System (ISMS). Excellent stakeholder management skills and the ability to communicate effectively with various levels of the organization. Strong organizational and program management skills. Certifications such as ISO27001 Lead Auditor (LA) and Certified Information Systems Auditor (CISA) are preferred. Preferred Certifications: ISO27001 Lead Auditor (LA) Certified Information Systems Auditor (CISA) Skills: Excellent analytical and problem-solving abilities. Strong communication and interpersonal skills. Ability to work independently and as part of a team. High attention to detail and a commitment to maintaining high standards of work. Create a better #TomorrowWithUs! This role, based in Bangalore, is an individual contributor position. You may be required to visit other locations within India and internationally. In return, you'll have the opportunity to work with teams shaping the future. At Siemens, we are a collection of over 312,000 minds building the future, one day at a time, worldwide. We value your unique identity and perspective and are fully committed to providing equitable opportunities and building a workplace that reflects the diversity of society. Come bring your authentic self and create a better tomorrow with us. Find out more about Siemens careers atwww.siemens.com/careers

Posted 1 month ago

Apply

3 - 5 years

13 - 18 Lacs

Gurugram

Work from Office

Naukri logo

About Us: Nestl Business Services India Pvt Ltd (NBS) is at the heart of the Nestl Group. We provide services in various functions and domains to enable Nestl to engage with millions of consumers worldwide. We are a multicultural and diverse team of professionals who are passionate about digital innovation and driving continuous improvement of processes with colleagues across the world. We are looking for?talents who are eager to learn, team player, digitally-savvy, and who can flourish in a fast-paced, dynamic environment. If this describes you, and you are looking to join a business where you can really add value, it’s time to consider joining NBS Location Gurugram Position Summary Represent, Coordinate & manage site IT activitiesby being the IS/IT ambassador at Nestle Business Services India Pvt Ltd. Responsible for maintaining IT operational continuity & put in place Nestle standards, compliance and support users. In depth experience of working in the area of IT performance, portfolio management, IT security and Workforce 360 A Day in Your LifeKey Responsibilities Operational activities - Facilitate day-to-day assistance to the business, through direct contacts and through the resolution of incidents and requests - Execute & lead in collaboration with SAR IT/IT Hub/Zone for ISIT specialized tasks in order to support the local business Management of local servers including backups ensuring secured data management Local Server Support including hardware maintenance Management of Active and Passive Network - Coordination with vendor to ensure all network devices are active including Switches, Access Point for Wi-Fi Connections, Wireless Controller including hardware and application maintenance. - Coordination with vendor to manage end to end Local Area Network in centre - Management of passive networking - design, plan and execution of structured cabling with third-party services in centre - Installation/upgrade of operating system for pcs and laptops - Installation, configuration of printers. Secure printing solutions Management and support for other IT devices and solutions -Meeting rooms management - end to end support including hardware and system maintenance with third-party services - Audio/Visual automation system - end to end support including hardware and system maintenance with third-party services IT Hardware Asset Management - Defining IT hardware asset management processes for centre - End to End life cycle management of IT Hardware including: - Procurement of IT Hardware ensuring timely delivery - SAP Transactions to ensure registration of IT Hardware in SAP & registration/modifications of IT hardware in IT Asset Management tool - Ensuring proper write off with due approval for all IT hardware assets at their end-of-life cycle - Ensuring proper disposal of IT hardware assets after end of their life cycle - Ensuring replacement of IT hardware assets after disposal at the end of their life cycle with new IT hardware assets - IT Hardware maintenance with third-party services ensuring smooth IT operations - Quarterly verification of IT Assets ensuring Global KPI achieved Software Asset Management - Defining Software Asset Management Process for centre - End to end life cycle management for all software locally managed in centre including: - Procurement of Software with proper license agreement -License management ensuring the number of installations should not be greater than number of licenses procured - End user support for software installations (manual installations), configurations and support in different functions like LAB, Sensory etc. - Data management for software/application - Managing Microsoft Licensing allocation, reallocation as required. IT investment (CAPEX) budget & operational budget (OPEX) for Centre - Preparing IT investment (capex) for centre with due approval from Globe Business Solution for NBSI and maintain the same - Preparing IT operational budget (Opex) with internal collaboration in centre and aligned with Globe Business Solution for NBSI IT Maintenance - Ensuring physical security control is correctly applied for IT server room, communication room, switch room and storeroom - Ensuring facility management (fire hydrant, air conditioning, Temperature control etc.) should be proper and maintained as per Globe data centre standard ISIT Security and Compliance - Ensure implementation of IS-IT policy as per Nestl guidelines Project Management & Vendor Management Provide assistance in order to structure delivery of new solutions and enhancements Ensuring vendor contact details, service level agreement and scope of work are defined and in place for all locally managed vendors related to IT What will make you successful: BE/ B Tech - Information Technology with minimum 5 years of experience in relevant areas and should be aware of IT standards. - Business process analysis skills and experience - Knowledge of ISIT process (ITIL) - Project management skills and experience - Fixed Assets Maintenance responsibilities, and audit of the assets related to IT equipment - Personnel Supervision (contractors or other 3rd parties) - Preparation of Investment budgets related to IT equipment - Self Management following defined KPIs/Objectives, and proactively tracking them

Posted 1 month ago

Apply

7 - 15 years

16 - 18 Lacs

Bengaluru

Work from Office

Naukri logo

Required Skills Behavioral | Aptitude | Communication Technology | Cybersecurity | SOC Alert Management Technology | Cybersecurity | Vulnerability Management Technology | Cybersecurity | SOC Monitoring Technology | Cybersecurity | Cloud Security Education Qualification : Any Graduate Certification Mandatory / Desirable : Technology | IT Security Certifications | EC-Council Certifications | EC-Council Certified Ethical Hacker (CEH) Details: Need to both keep an eye out for attacks in progress and try to figure out ways to beef up defenses to prevent or mitigate future attacks. To that end, you need to install security tools, investigate the suspicious activities those tools detect, support audit and compliance initiatives, and participate in developing security strategies 1. Escalate validated and confirmed incidents to designated incident response team. 2. Notify Client of incident and required mitigation works. 3. Fine-tune SIEM rules to reduce false positive and remove false negatives. 4. Collect global threat intelligence and internal threats then inject actions based on analysis and recommendation. 5. Proactively research and monitor security information to identify potential threats that may impact the organisation. 6. Develop and distribute information and alerts on required corrective actions to the organisation. 7. Learn new attack patterns, actively participate in security forums. 8. Work closely with Vulnerability Management and designated incident response team. 9. Understand the structure and the meaning of logs from different log sources. 10. Perform threat intel research. 11. Ability to run and understand Sandbox Static Analysis. 12. Analyst should know how to include details related to the logs, alarms and other indicators identified in accordance with the intervention protocol of each client and the SLA.

Posted 1 month ago

Apply

4 - 9 years

12 - 16 Lacs

Hyderabad, Chennai, Bengaluru

Hybrid

Naukri logo

We are hiring for ServiceNow IRM Developer role based in Hyderabad, with flexibility for remote work. As a ServiceNow IRM Developer, your responsibilities would include developing and implementing solutions within the ServiceNow platform, collaborating with cross-functional teams to understand business requirements, and ensuring the successful delivery of Information Risk Management (IRM) solutions. Qualifications Proficiency in ServiceNow development and Information Risk Management (IRM). Experience in integrating and configuring ServiceNow modules. Knowledge of GRC (Governance, Risk, and Compliance) processes. Strong understanding of IT security principles and risk management. Excellent problem-solving and analytical skills. Effective communication and collaboration abilities. ServiceNow Developer certification is a plus.

Posted 1 month ago

Apply

4 - 8 years

7 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Job Summary We are seeking a skilled IT professional with hands-on experience in managing Google Workspace, securing email infrastructure, and handling endpoint/user device management. The ideal candidate will be responsible for ensuring smooth collaboration through Google Workspace, protecting email systems from threats, and maintaining secure and compliant end-user computing environments. Skill Set 4 - 8 years of experience in IT systems administration or similar role. Proven experience managing Google Workspace for a mid-to-large user base. Solid understanding of email security protocols (SPF, DKIM, DMARC). Experience with email security platforms and endpoint management tools. Strong troubleshooting skills and familiarity with ITIL-based service management. Excellent communication and documentation skills . Roles and Responsibilities Google Workspace Administration Manage user accounts, groups, and organizational units. Implement and maintain Google Workspace security and compliance settings (DLP, Vault, SSO, etc.). Automate routine administration tasks using GAM or Google Admin SDK. Email Security & Compliance Deploy and manage email security tools (e.g., Mimecast, Proofpoint, Google Advanced Protection). Monitor and respond to email-based threats such as phishing, spoofing, and malware. Define and enforce SPF, DKIM, DMARC policies. Collaborate with the InfoSec team for email compliance and retention policies. Endpoint/User Device Management Manage and monitor endpoints across operating systems (Windows, macOS, ChromeOS). Deploy and manage MDM/EMM solutions (e.g., Google Endpoint Management, Intune, Jamf). Enforce device compliance policies, encryption, and remote wipe capabilities. Provide Tier 2/3 support for device-related issues. Operational & Security Hygiene Maintain IT asset inventory and ensure timely patching and updates. Document system configurations, procedures, and support materials. Participate in incident response and root cause analysis for device and email-related incidents.

Posted 1 month ago

Apply

10 - 15 years

12 - 17 Lacs

Noida

Work from Office

Naukri logo

We are looking for a Program Leader, IT Security within Identity and Access Management. The Program Manager will use their hands-on technical skills, strong leadership ability and eagerness to design solutions to complex problems as a leader within a larger global team. The Program Manager must be comfortable with communicating to stakeholders, performing security assessments, and prioritizing security risks, as well as creating/presenting high quality deliverables. The position will have a team of direct reports and align under the Director of IAM, Client Identity and Access. Responsibilities : Operate as a People Leader responsible for a team of 30+ global resources, including 2 supervisors Build, lead, and execute IAM strategies to enhance the productivity of R1 operational workforce while also enhancing security posturing. Act as a leader with extensive subject matter expertise to shape the Client Identity and Access team. Work collaboratively with peers and stakeholders to influence technical and business projects to enhance IAM strategies. This included but is not limited to transitional work, integrations, and stead state organization initiatives. This role will identify and execute on strategies core to internal business processes as well as partnering with external providers and business partners to securely enable R1 user access. Complete unbiases analysis of technology options and develop a practice to determine, approve and manager preferred technologies; maintain a list of approved technologies; create communication strategies that will guide the organization to standard technologies or create new standards as development needs arise. Communicate access management security goals and new programs effectively with other department managers within the organization. Ensure fulfillment of legal and contractual IT security, compliance, and privacy mandates. Partner with internal cross-function teams and external customers on technology improvement opportunities. Skills and Experience: 10 years of experience, or combined 5 years in Senior Management and 5 years in IAM or adjacent IT Security framework(s) Experience with inventory management, ticketing workflows, and production and quality oversight Excellent interpersonal and communication skills to work with all levels of management, employees, peers, and vendors Excellent analytical and problem-solving skills to solve/manage complex technical problems Ability to maintain enterprise relationships with internal, external stakeholders, and teams Experience in developing and running multiyear, complex technology initiatives and teams Tenacity, grit, and ability to perform under pressure to achieve deliverables Education Bachelors Degree in Computer Science, Information Technology, Information Security, Healthcare Science, or Business Management Preferred - Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM) or similar industry recognized certification.

Posted 1 month ago

Apply

3 - 6 years

4 - 9 Lacs

Noida

Work from Office

Naukri logo

Assist in the management of Identity and Access Management (IDM) systems to ensure secure and efficient user authentication and authorization. Monitor and support user access controls and security permissions across systems and applications. Implement and troubleshoot IDM solutions, including user provisioning, role-based access control, and lifecycle management. Collaborate with IT and security teams to ensure compliance with organizational security policies and regulatory requirements. Participate in incident response and investigate potential security breaches related to identity management. Assist in the development and maintenance of IDM documentation, including processes and procedures. Provide user support for IDM-related issues, including account lockouts and permission discrepancies. Contribute to ongoing improvements in IDM systems, ensuring that they remain up-to-date with the latest security features and industry standards. Conduct routine audits and access reviews to ensure proper user access rights are maintained. Ensure alignment of IDM strategies with business needs and IT security goals

Posted 1 month ago

Apply

12 - 15 years

15 - 20 Lacs

Thane

Work from Office

Naukri logo

Design and Planning: Develop and implement IT infrastructure plans and architectures. Assess current infrastructure needs and future requirements. Plan for upgrades, replacements, and expansion of infrastructure components. Implementation and Deployment: Monitor, install, configure, and maintain servers, networks, backup storage devices, and other IT hardware and software. Deploy new technologies and systems. Ensure systems are set up correctly and meet security standards. Maintenance and Support: Monitor the performance of IT infrastructure and identify potential problems. Troubleshoot and resolve technical issues. Provide technical support to customers & end-users. Perform routine maintenance tasks, such as backups and updates. Security: Implement and maintain security measures to protect IT infrastructure from unauthorized access and cyber threats. Ensure compliance with relevant security standards and regulations. Follow and implement Security guidelines of RBI, NPCI, UIDAI, PCI-DSS, ISO 27001, NIST etc. Team Leadership and Supervision: Lead and supervise a team of IT system and network professionals. Provide guidance and mentorship to team members. NOC Management Procurement of and Payment for IT Assets Collaboration: Work with other technical teams and departments and IT Security team to ensure smooth operations. Communicate technical information to both technical and non-technical audiences. Documentation: Maintain accurate documentation of IT infrastructure components, configurations, procurements and procedures. Skills Technical Skills: Strong understanding of networking protocols (TCP/IP, DNS, DHCP, etc.). Knowledge of operating systems (Windows, Linux, MacOS). Knowledge of database systems (MS SQL Server, Oracle, Postgres, Opensource DBMS. Experience with virtualization technologies (VMware, Hyper-V). Familiarity with cloud computing platforms (AWS, Azure, Google Cloud). Knowledge of security best practices and tools. Soft Skills: Problem-solving skills. Communication skills. Ability to work independently and as a team member. Strong analytical skills. Ability to learn new technologies quickly.

Posted 1 month ago

Apply

2 - 5 years

7 - 11 Lacs

Gurugram

Work from Office

Naukri logo

locationsGURGAON, INDINDIA VIRTUAL, IND time typeFull time posted onPosted 3 Days Ago time left to applyEnd DateMay 26, 2025 (13 days left to apply) job requisition idR1146864 . Key Responsibilities Security Administration Design, Engineer and manage security solutions. Configure, monitor, and troubleshoot systems to ensure optimal performance and security. Plan and execute upgrades, patches, and other maintenance activities for security tooling. Collaborate with the cybersecurity team to ensure robust security measures and compliance with industry standards. Technical Support and Troubleshooting: Provide advanced technical support for AWS cloud networking issues. Mentor and guide junior engineers and IT support staff. Documentation and Reporting Create and maintain comprehensive documentation of configurations, procedures, and processes. Generate regular reports on system performance, security incidents, and maintenance activities. Qualifications Education : Bachelors degree in computer science, Information Technology, Cybersecurity, or a related field; or equivalent work experience. Experience : At least 3 years of hands-on experience in Cyber Security. Technical Skills: Strong understanding of network protocols and services (TCP/IP, DNS, VPN, etc.).Knowledge of scripting languages (PowerShell, Python) for automation. Key Competencies Problem-Solving Skills: Strong analytical and troubleshooting abilities to diagnose and resolve complex technical issues. Communication Skills: Excellent verbal and written communication skills, with the ability to explain technical concepts to non-technical stakeholders. Project Management Ability to manage multiple projects and priorities in a fast-paced environment. Offers of employment are conditional upon passage of screening criteria applicable to the job.

Posted 1 month ago

Apply

5 - 10 years

4 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Delivery Practitioner Project Role Description : Assist in defining requirements, designing and building security components, and testing efforts. Must have skills : Splunk Good to have skills : Risk Management Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Practitioner, you will assist in defining requirements, designing and building security components, and testing efforts. Your day will involve collaborating with teams, contributing to key decisions, and providing solutions to problems across multiple teams. Main Skill1. Splunk or Microsoft Sentinel or Google Chronicle Use Case Management2. Risk Based Alerts and Risk Incidents3. Asset and Identities4. Security Incident Response, Standard Operations Procedure Knowledge Must have Skills: 1. Development, Testing and Fine Tuning of Splunk content like Use Cases, Dashboards, Reports, Lookups, Macros, etc.2. Risk Based Alerts and Risk Incidents3. Asset and Identities Framework in Splunk4. Incident Response, Standard Operations Procedure Knowledge5. MITRE Attack Framework Good to Have Skills: 1. Splunk Architecture Cloud, Microsoft Sentinel, Google Chronicle2. Source Integrations various sources3. Event Parsing, Event Type definition, Data Model, Regex 4. Custom integrations for enrichment, Threat Intelligence Feeds, SOAR5. Azure DevOps Roles & Responsibilities1. Architecture and strategy:Candidate must have ability to understand and implement use cases on security tools (Splunk, Phantom) to improve Accenture's overall security posture by identifying gaps in use cases or processes that can be actioned by our engineers. It also includes the ability to develop and communicate a security strategy that addresses the unique risks and challenges of Accentures Security environments.2. Leadership:Candidate must have ability to lead and influence cross-functional teams. It includes the ability to communicate effectively with stakeholders, build consensus, and manage conflict. 3. Technical:The candidate should be able to understand existing security use cases and develop new ones in tools requiring technical development, scripting, or complex rule creations, managing, and implementing broad security concepts.4. Operational:Candidate must have ability to develop and implement security controls, as well as the ability to monitor and analyze security events and incidents. Technical Experience1. Splunk Enterprise Security, Microsoft Sentinel, Google Chronicle2. Azure DevOps3. Custom Tools Development4. Security Incident ManagementProfessional Experience1. At least 5-7 years of experience on IT Security / SOC / Cyber Defense2. Graduation – BE3. Proficient use of English, advanced communication skills.4. Security Certifications are a plus - CCSK, GPEN, GCCC, GMOB, GSEC, ESCA, Security +, CEHRole Description: Support SIEM detection content creation for notables with a focus on Risk Based Alerting. Create and maintain documentation on new or existing detections, integrations, and dependencies. Interface with our SOC to pilot new content, process feedback, update incident response guidelines. Engage in fine-tuning of existing detections to increase signal/noise ratio and reduce false positives. Additional Information: The candidate should have a minimum of 5 years of experience in Splunk This position is based at our Bengaluru office A 15 years full time education is required Qualification 15 years full time education

Posted 1 month ago

Apply

15 - 19 years

32 - 35 Lacs

Navi Mumbai

Work from Office

Naukri logo

Experience in analysis, evaluation and implementation of IT network and IT security Build processes for data protection and quality assurance Monitor key performance indicators and metrics Keep track of project management skill, time management and problem solving skils Experience in running Captive IT operations in BFSI Hands on experience in Tech Business function in non-IT Company Highly skillful in Cisco and HP Routers, switches including Nexus, ACI ( Application Controlled Infra), Cisco spine and leaf architecture, SDWAN, WiFi, ISE, ASA, NAC, Anyconnect, 2FA authentication, MPLS, ILL, Link load balancer, Secure web gateways etc Lead teams of Network Project & Operations Oversee all technology operations and evaluate them accordingly to establish business goal Analyze, evaluate, develop and implement new/existing technologies as per business requirements Identify need for upgrade, Configuration or new system to report to upper management Ensure system infra is functioning and working efficiently Handle change management /improvement in IT systems Control budget and report on expenditures Handle asset Management during the entire life cycle Handle IT/IS audits and ensure closure of critical findings Ability to select vendor and negotiate with vendors for IT services, procurement of IT Infra and other IT related productions Manage performance of vendor and ensure that they comply with all SLA etc Monitor day to day activities and processes and ensure smooth functioning of IT operations Effective team management Strategic Management to cope up with the increasing

Posted 1 month ago

Apply

7 - 12 years

15 - 22 Lacs

Pune

Work from Office

Naukri logo

Position: Manager/Sr Manager Role: Info Sec Engg Job Location: Pune,Wakad Experience: 7-12 Years Maintaining IT compliance and security 2. Investigating cybersecurity incidents 3. Safeguarding system infrastructures and collaborating with engineering teams 4. Analyzing and developing security architectures 5. Coordinating with external vendors and researchers 6. Training and policy recommendations, 7. Leading 3rd-party audits (NIST, ISO, ISMS) and developing internal system processes for audit programs. 8. Monitoring legal changes, conducting risk assessments, 9. Drafting technical standards for vulnerability remediation 10. Managing internal security tools

Posted 1 month ago

Apply

2 - 6 years

2 - 4 Lacs

Ahmedabad

Work from Office

Naukri logo

To design the security infrastructure / policies for the organization, implement & monitor the same To ensure security compliance with respect to recommendations received from government agencies like CEA, NCIIPC Design, review, implement & monitor IT security related controls as part of Internet Controls, ITGC, IFC, ERM ISMS certification (ISO 27001 ) for IT systems; this will include preparation and periodic review of policies and SOPs, regular trainings and maintaining records in prescribed formats Conducting internal security audit and generating reports by deploying VA tools Periodic security/VAPT audits and implementation of the findings IT security related new initiatives like - Security Operations Centre (SOC), Security Information and Event Management (SIENA), c lou d security, EMM-enterprise mobility management Creating IT Security awareness within the organisation

Posted 1 month ago

Apply

2 - 7 years

1 - 5 Lacs

Chennai

Work from Office

Naukri logo

Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Governance Risk & Compliance (GRC) Platform Operations Good to have skills : NA Minimum 2 year(s) of experience is required Educational Qualification : Degree, Minimum 3 years of experience in IT Security/Information Security Summary :As an Application Tech Support Practitioner, you will be responsible for providing ongoing support to clients and ensuring the smooth operation of the Governance Risk & Compliance (GRC) Platform. Your typical day will involve accurately defining client issues, interpreting and designing resolutions based on deep product knowledge, and utilizing exceptional communication skills to keep our world-class systems running. Roles & Responsibilities: Provide ongoing support to clients, acting as the interface between the client and the GRC Platform. Accurately define client issues and interpret and design resolutions based on deep product knowledge. Utilize exceptional communication skills to keep our world-class systems running. Collaborate with cross-functional teams to ensure the smooth operation of the GRC Platform. Stay updated with the latest advancements in GRC Platform Operations, integrating innovative approaches for sustained competitive advantage. Professional & Technical Skills: Must To Have Skills:Experience in Governance Risk & Compliance (GRC) Platform Operations. Must To Have Skills:Exceptional communication skills. Good To Have Skills:Experience in Cloud Tech Support. Good To Have Skills:Experience in Application Support. Strong understanding of GRC Platform Operations. Solid grasp of Cloud Tech Support and Application Support. Experience with data analysis and problem-solving. Experience with project management and collaboration tools. Additional Information: The candidate should have a minimum of 2 years of experience in Governance Risk & Compliance (GRC) Platform Operations. The ideal candidate will possess a strong educational background in computer science, information technology, or a related field, along with a proven track record of delivering impactful solutions. This position is based at our Chennai office. Qualifications Degree, Minimum 3 years of experience in IT Security/Information Security

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies