Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
2.0 - 5.0 years
3 - 13 Lacs
Pune, Maharashtra, India
On-site
Evaluate the cyber security functionalities of product and improve the security posture. Work for fulfilling security compliance requirements for the products. Perform Threat modeling/ Security assessment for products Perform product hardening, to allow only necessary function for products operation. Cybersecurity functionality verification on control system components Participate in Vulnerability handling of the products competencies Good understanding of cybersecurity principles like cyber security architecture, defense in depth, default deny, least privilege, compartmentalization, privileged initiation, AAA, etc. Good understanding of cyber security controls like; IDS/IPS (host and network), hardening, security policies, Malware Protection, Filtering, NGFW, etc. Knowledge in Networking, patch management. Hands on Experience with protocols like HTTP, HTTPS, SSL, SSH, ICMP, DHCP, L2TP, PPTP, DNS, SNMP, RDP, and NTP. Windows and Virtual Machine Administration. Experience with Security tools like NMAP, Nessus, Wireshark, etc. Certifications like MCP/MCITP/MCSE/CEH/CISSP are advantage. Knowledge on security standards like IEC 62443, ISO 27001. Knowledge on protocols like IEC 61850, Goose, Modbus is an added advantage. ,
Posted 1 week ago
2.0 - 6.0 years
3 - 11 Lacs
Chennai, Tamil Nadu, India
On-site
Your Responsibilities: Evaluate the cyber security functionalities of product and improve the security posture. Work for fulfilling security compliance requirements for the products. Perform Threat modeling/ Security assessment for products Perform product hardening, to allow only necessary function for products operation. Cybersecurity functionality verification on control system components Participate in Vulnerability handling of the products Your Background: Bachelor s or Post Graduate Degree in Engineering 2 to 6 years of experience in cybersecurity Good understanding of cybersecurity principles like cyber security architecture, defense in depth, default deny, least privilege, compartmentalization, privileged initiation, AAA, etc. Good understanding of cyber security controls like; IDS/IPS (host and network), hardening, security policies, Malware Protection, Filtering, NGFW, etc. Knowledge in Networking, patch management. Hands on Experience with protocols like HTTP, HTTPS, SSL, SSH, ICMP, DHCP, L2TP, PPTP, DNS, SNMP, RDP, and NTP. Windows and Virtual Machine Administration. Experience with Security tools like NMAP, Nessus, Wireshark, etc. Certifications like MCP/MCITP/MCSE/CEH/CISSP are advantage. Knowledge on security standards like IEC 62443, ISO 27001. Knowledge on protocols like IEC 61850, Goose, Modbus is an added advantage.
Posted 1 week ago
2.0 - 5.0 years
2 - 5 Lacs
Chennai, Tamil Nadu, India
On-site
Monitor all theendpoint ,Network ,Cloudand application security incidents. As SOC teammember ,perform the basic investigation and all the security incidents and document the evidence. Performing Security controls health & Compliance check. Adhere to shift timings and provide uninterrupted 24/7 monitoring. Properly share shift handovers, updating the next shift on ongoing incidents and activities. Respond to all security incidents withinaSLA period Resolve incidents assigned to the shift promptly and escalate to theSeniorteam when necessary. Work across all categories of incidents withoutlimitingto specific types. Follow the incident handling as per the documentedSOP. Complete and close all assigned task requests within SLA timelines. Attend weekly and monthly team meetings as mandatory. Qualifications OSINT:knowledge about open-source platforms for analyzing URL, IPAddresses ,suspicious files. EmailAnalysis : Operating Systems:Basics of Linux and Windows, kernel concepts, and system differences. Networking:OSI model, TCP/IP, firewalls, VPNs, proxies, IP addressing, and subnetting. SIEM Tools:Basics of SIEM operations, alerts, and dashboards (e.g., Splunk). Authentication & Access Control:MFA, SSO, and password management best practices. Malware Protection:Antivirus strategies, malware analysis, phishing email analysis, and IOC gathering. Trending CyberAttacks :update knowledge about the trending cyber-attacks &itsattackpatterns .
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6464 Jobs | Ahmedabad
Amazon
6352 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane