Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 8.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityIQ Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitate the transition to cloud security-managed operations, ensuring that all security measures align with organizational objectives and compliance standards. You will engage in strategic discussions to enhance security protocols and contribute to the overall security posture of the organization. Roles & Responsibilities:- Work on Sailpoint IIQ development and integration- Collaborate with the team to perform.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Develop and maintain comprehensive documentation of security architecture and frameworks.- Conduct regular assessments and audits to ensure compliance with security policies and standards. Professional & Technical Skills: - Must To Have Skills: Proficiency in SailPoint IdentityIQ.- Must have :Application onboarding experience, worked on Rules and workflows. Strong understanding of cloud security principles and best practices.- Experience with identity governance and administration solutions.- Familiarity with regulatory compliance frameworks such as GDPR, HIPAA, or ISO 27001.- Ability to analyze and mitigate security risks associated with cloud environments. Additional Information:- The candidate should have minimum 3 years of experience in SailPoint IdentityIQ.- This position is based in Bangalore.- A Bachelor or college degree in related field or equivalent work experience is required. Qualification 15 years full time education
Posted 2 weeks ago
3.0 - 8.0 years
13 - 17 Lacs
Kolkata
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityNow Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting security controls, and transitioning to cloud security-managed operations, all while ensuring compliance with industry standards and best practices. You will engage in discussions to refine security strategies and provide insights that enhance the overall security posture of the organization. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Conduct regular assessments of cloud security measures to identify areas for improvement.- Collaborate with cross-functional teams to ensure alignment of security practices with business objectives. Professional & Technical Skills: - Must To Have Skills: Proficiency in SailPoint IdentityNow.- Good To Have Skills: Experience with cloud security frameworks and compliance standards.- Strong understanding of identity governance and administration.- Experience in implementing security controls in cloud environments.- Familiarity with risk assessment methodologies and security best practices. Additional Information:- The candidate should have minimum 3 years of experience in SailPoint IdentityNow.- This position is based at our Kolkata office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
5.0 - 10.0 years
13 - 17 Lacs
Noida
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : ServiceNow Governance, Risk, and Compliance (GRC) Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : BTECH Summary :As a Security Architect, you will be responsible for defining the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve documenting the implementation of the cloud security controls and transitioning to cloud security-managed operations using ServiceNow Governance Risk and Compliance (GRC) as the primary skill. Roles & Responsibilities:- Lead the development and implementation of the cloud security framework and architecture using ServiceNow Governance Risk and Compliance (GRC) as the primary skill.- Ensure that the cloud security framework and architecture meet the business requirements and performance goals.- Document the implementation of the cloud security controls and transition to cloud security-managed operations.- Collaborate with cross-functional teams to ensure that the cloud security framework and architecture are aligned with the overall security strategy.- Stay updated with the latest advancements in security architecture design and integrate innovative approaches for sustained competitive advantage. Professional & Technical Skills: - Must To Have Skills: Experience in ServiceNow Governance Risk and Compliance (GRC).- Good To Have Skills: Security Architecture Design.- Strong understanding of cloud security framework and architecture.- Experience in documenting the implementation of cloud security controls and transitioning to cloud security-managed operations.- Solid grasp of security strategy and cross-functional collaboration. Additional Information:- The candidate should have a minimum of 5 years of experience in ServiceNow Governance Risk and Compliance (GRC).- The ideal candidate will possess a strong educational background in computer science, information technology, or a related field, along with a proven track record of delivering impactful security solutions.- This position is based at our Gurugram office. Qualification BTECH
Posted 2 weeks ago
7.0 - 12.0 years
13 - 17 Lacs
Gurugram
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Governance Good to have skills : Security Architecture DesignMinimum 7.5 year(s) of experience is required Educational Qualification : BTECH Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:- Expected to be an SME- Collaborate and manage the team to perform- Responsible for team decisions- Engage with multiple teams and contribute on key decisions- Provide solutions to problems for their immediate team and across multiple teams- Develop and implement security policies and procedures- Conduct security assessments and audits- Stay updated on the latest security trends and technologies Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Governance- Strong understanding of security architecture design- Experience in implementing cloud security controls- Knowledge of security compliance standards- Hands-on experience with security tools and technologies Additional Information:- The candidate should have a minimum of 7.5 years of experience in Security Governance- This position is based at our Gurugram office- A BTECH degree is required Qualification BTECH
Posted 2 weeks ago
10.0 - 15.0 years
30 - 35 Lacs
Noida, Pune, Bengaluru
Work from Office
The candidate will have expertise in penetration testing, cloud security, compliance frameworks (HIPAA, PCI DSS), security documentation, and security tools such as Qualys, Burp Suite, and other industry-standard solutions Strong communication skills and the ability to document security processes effectively are essential for this role Key Responsibilities Penetration Testing Vulnerability Management Perform penetration testing on web applications, networks, and cloud environments to identify security vulnerabilities Utilize tools like Burp Suite, Qualys, Nessus, Metasploit, and other scanning tools to detect threats Work with development and operations teams to remediate vulnerabilities and strengthen security posture Cloud SecurityEnsure cloud security best practices for AWS, Azure, and other cloud platforms Implement security controls for cloud-hosted applications and workloads Conduct security assessments and recommend security enhancements Compliance Regulatory Security Ensure compliance with HIPAA, PCI DSS, ISO 27001, NIST, and other security frameworks Conduct audits, risk assessments, and compliance gap analysis Assist in developing policies, procedures, and security documentation to meet regulatory requirements Security Operations Incident Response Monitor security logs and alerts for threat detection and response Work with security teams to investigate and mitigate security incidents Conduct forensic analysis in the event of security breaches Documentation Communication Develop and maintain security policies, procedures, and technical documentation Create security reports and communicate findings effectively to stakeholders Provide security training and awareness programs for employees Location - Bengaluru, Noida, Pune, Mumbai, Hyderabad, Mohali, Panchkula, Chennai.
Posted 2 weeks ago
6.0 - 8.0 years
16 - 25 Lacs
Gurugram
Remote
PCI Analyst Location-Remote Shift Timings- 11:00 AM IST to 8:00 PM IST The PCI Analyst plays a critical role in ensuring PCI DSS compliance across assigned divisions. This role partners with BISO teams and markets to gather, review, and submit evidence required for PCI assessments. The PCI Analyst maintains ongoing compliance readiness and contributes to the overall compliance strategy by collaborating with assessors and internal teams. Role & responsibilities Assist in planning, coordinating, and executing PCI DSS assessments and audits, including internal assessments and third-party audits. Partner with Brand/Market & BISO teams to gather, validate, and submit evidence for PCI assessments. Work to complete PCI DSS Service Provider and/or Merchant assessments in global markets, including but not limited to the UK, US, and Israel. Ensure ongoing PCI DSS compliance readiness across assigned divisions. Collaborate with internal teams to respond promptly and effectively to assessor requests. Provide guidance on PCI DSS requirements and evidence collection processes. Stay informed of changes in PCI standards and industry best practices and communicate relevant updates to internal stakeholders. Assist with training and awareness initiatives related to payment card security and compliance. Preferred candidate profile Certification as a PCI DSS QSA, AQSA, or ISA. Bachelors degree in Cyber security, Compliance, or a related field. 6-8 years of hands-on experience in PCI compliance or related roles. In-depth knowledge of PCI DSS requirements and compliance frameworks. Strong organizational and collaboration skills, with a focus on accuracy and efficiency. Experience supporting PCI DSS assessments (SAQ or ROC). Knowledge of security controls and technologies (e.g., firewalls, encryption, vulnerability scanning). Industry certifications such as CISA, CISSP, PCI ISA, or CompTIA Security+
Posted 2 weeks ago
2.0 - 7.0 years
5 - 10 Lacs
Thane
Work from Office
We are excited to announce an open position for PCI DSS Consultant at CLA Global Indus Value Consulting . Below are the details of the role: Location - Airoli Experience - 2+ Years Key Skills & Competencies Solid understanding of PCI DSS compliance requirements, especially for merchants and service providers under an acquiring bank. Hands-on experience in reviewing and validating SAQs, AoCs, RoCs, and transaction flow documents. Experience managing or supporting PCI DSS compliance programs across multiple third-party entities. Comfortable working with Payment Brands (e.g., VISA, Mastercard), QSAs, and Payment Aggregators during reviews, audits, or issue resolution. Ability to track and monitor compliance status for Level 1 and Level 2 merchants/service providers, and prepare internal dashboards and reports. Capable of creating and running basic awareness sessions or training on PCI DSS for internal teams or external stakeholders. Strong communication skills and the ability to work with cross-functional teams and external partners. Good attention to detail, especially while reviewing documentation or handling audit-related work. Ability to follow up with non-compliant entities, communicate with payment brands as needed, and ensure compliance issues are resolved without risking penalties for the bank. Interested candidates are invited to submit their resume and a cover letter outlining their qualifications and experience to nikita.prasad@claivc.com
Posted 2 weeks ago
7.0 - 12.0 years
13 - 19 Lacs
Chennai, Bengaluru
Hybrid
We have opening for Internal Audit Look for 5-15 years exp Good communication skill Should be comfortable for night shift until 5 AM in the morning Only for contractual roles Must have skills- ISO 27001, GRC, PCI DSS, HIPPA, SOC 2, GDPR Work mode: Remote Interview location: Chennai/ Bangalore Please fill below details along with updated resume babitha@configusa.com T.exp: R.exp: CTC: EX.CTC: N.P(Not more than 15days) Interested for contract to hire Available for F2F (14th June'25)(If not available than don't submit your profile with us)
Posted 2 weeks ago
8.0 - 9.0 years
20 - 25 Lacs
Bengaluru
Work from Office
** Immediate / 30 days Joiners** Work Mode: 5 days work form office Location : SLK Green Park, Devanahalli Bangalore Transport facility: Provided across Bangalore Job Description: 8+ years of experience in cybersecurity or IT risk/compliance, with at least 2-3 years in a lead or manager or senior consultant role Strong understanding of security frameworks (e.g., ISO 27001, SOC 2, PCI DSS, HIPAA, GDPR, etc.) Act as the primary point of contact for client-specific security compliance and governance requirements Interpret and implement client contractual security requirements across delivery, IT functions Conduct risk assessments, gap analyses, and ensure remediation plans are implemented as per client expectations Coordinate and oversee internal audits, client audits, and respond to client/ third-party security assessments Collaborate with cross-functional teams including IT, Legal, Facilities, HR, and Delivery to ensure end-to-end security compliance Good knowledge of security technologies for network security, access management, data protection, security event management, endpoint protection, email security, etc. Ability to work independently with minimal supervision Certifications such as CISSP, CISM, CRISC, or ISO 27001 Lead Auditor are preferred. Excellent verbal and written communication skills
Posted 2 weeks ago
5.0 - 8.0 years
15 - 30 Lacs
New Delhi, Gurugram, Delhi / NCR
Work from Office
Role Title : Information Security and Data Privacy GRC Professional Team : Information Security Location : Gurgaon/Bangalore Reports To : CISO About the Role : We are looking for experienced professionals in Information Security and Data Privacy Governance, Risk, and Compliance (GRC) to join our team. The ideal candidate will possess a deep understanding of information security frameworks, risk management practices, and data privacy regulations. This role requires a hands-on, proactive approach in ensuring our organizations security and privacy standards align with both internal policies and external regulations. As a part of this role, you will be responsible for designing and implementing GRC strategies, managing security audits, and ensuring compliance with data protection regulations, while working closely with cross-functional teams. What You’ll Do : Governance, Risk, and Compliance (GRC): Develop, implement, and maintain GRC strategies, policies, and frameworks across the organization. Conduct risk assessments, including vendor, third-party, and internal assessments, to identify and mitigate information security and privacy risks. Ensure compliance with industry standards and regulations, such as GDPR, HIPAA, ISO 27001, SOC 2, PCI DSS, etc. Monitor and manage the organization's compliance with internal and external security and privacy policies. Facilitate internal and external audits and assessments, providing necessary documentation and support. Data Privacy: Oversee data privacy initiatives, including data classification, data governance, and privacy impact assessments (PIAs). Implement and maintain privacy policies, ensuring adherence to global regulations such as GDPR, CCPA, and other regional data protection laws. Serve as the subject matter expert for data privacy issues and collaborate with legal teams to address regulatory inquiries. Risk Management: Identify, assess, and prioritize risks related to information security and privacy across various business units. Develop and implement risk mitigation plans and controls to minimize the impact of potential threats. Monitor and report on the effectiveness of controls and risk treatment plans. Security Awareness & Training: Develop and deliver security awareness training programs to employees, emphasizing data privacy, information security best practices, and regulatory compliance. Promote a culture of security awareness across the organization through workshops, seminars, and regular communication. Collaboration & Leadership: Work closely with cross-functional teams including IT, Legal, Engineering and Product to drive security and privacy initiatives. Provide leadership and guidance to junior team members and stakeholders, ensuring alignment with the organization's security objectives. What You’ll Need : Certifications (Preferred): Certified Information Systems Security Professional ( CISSP ) Certified Information Security Manager ( CISM ) Certified Information Systems Auditor ( CISA ) Certified Data Privacy Solutions Engineer ( CDPSE ) ISO 27001 Lead Implementer / Auditor GDPR Certification Soft Skills: Strong leadership and decision-making skills. Excellent verbal and written communication skills. Ability to work in a fast-paced, dynamic environment.
Posted 2 weeks ago
15.0 - 20.0 years
50 - 55 Lacs
Bengaluru
Work from Office
Your Impact Youll be responsible for engaging with senior customer representatives including CISO and other C-suite stakeholders to engage on topics around CyberSecurity, adjacent technical areas, and application of technology and programs in the business. Provides trusted support, advice and guidance on the latest trends and developments in CyberSecurity and how these can be used to provide lasting business value and impact for our customers. Applying your wide and deep experience in solving these challenges elsewhere youll help our customers with their journey, articulating Ciscos unique value proposition and architecture for CyberSecurity and how Cisco can help our customers succeed with their CyberSecurity goals. By establishing yourself as a trusted advisor and building lasting relationships, youll help bridge the communications gap between customer needs and what Cisco can offer. Identifies opportunities for Cisco to provide additional products and services that are aligned to achieving the customers CyberSecurity goals. Results and Outcomes Youll proactively strengthen and expand Ciscos presence and technology leadership in the CyberSecurity domain through externally visible activities such as blog posts, social media posts, papers, external speaking engagements and serving on external forums and boards. Youll continually acquire the knowledge and expertise necessary to pioneer new thinking and approaches. Youll contribute new materials and innovative articles rather than solely parroting existing materials or campaigns. Youll have a strongly accretive impact on Ciscos CyberSecurity business as evidenced by pipeline generation and supporting sales of products. Youll actively contribute to talent development, ensuring the principals of improving inclusion and diversity are honoured and promoted. Minimum Qualifications: * Bachelor or Masters degree in a relevant area, an MBA is preferred * CertificationsCISSP, CRISC, CISA and CISMand advantage. * Telco expertise and hands on implementation * 15+ years relevant experience with at least five (5 )years as: a CISO, Head of Risk or equivalent in a major organization; Partner or Associate, Principal, or Managing Director in a big 4+1 company or other leading consulting organization; or a combination thereof. * Proven experience and recognized as a thought leader in CyberSecurity in one or more industry verticals such as Financial Services; Service Provider; Manufacturing, Mining, Transportation, Oil and Gas, or Utilities; or Technology. * A proven record of business leadership in a technical domain and experience in transformational or strategic programs, with evidence of where past contributions have a significant impact on business. * Proven track record of C-suite engagement with an extensive personal contact base. * Published author, conference speaker and social media presence. Preferred Skills * Proven experience and recognized as a thought leader in CyberSecurity in Service Provider is highly desired * Proven experience in delivering security solutions, knowing cisco security solution is a plus.
Posted 2 weeks ago
6.0 - 11.0 years
40 - 50 Lacs
Bengaluru
Work from Office
The Oracle Cloud Infrastructure (OCI) team can provide you the opportunity to build and operate a suite of massive scale, integrated cloud services in a broadly distributed, multi-tenant cloud environment. OCI is committed to providing the best in cloud products that meet the needs of our customers who are tackling some of the world s biggest challenges. We offer unique opportunities for smart, hands-on engineers with the expertise and passion to solve difficult problems in distributed highly available services and virtualized infrastructure. At every level, our engineers have a significant technical and business impact designing and building innovative new systems to power our customer s business critical applications. What is IAM at OCI? Identity and Access Management (IAM) allows users to control who has access to their cloud resources. As part of the Cloud Platform organization, the team is responsible for the design and build of core services that are utilized by internal and external customers alike. The Identity Control Plane team is primarily responsible for servicing CRUD API calls on all Identity-related entities like users, groups, policies, and compartments across all global regions while ensuring consistency and reliability. Who are we looking for? We are looking for engineers with distributed systems experience. You should have experience with the design of major features and launching them into production. You ve operated high-scale services and understand how to make them more resilient. You work on most projects and tasks independently. The ideal candidate will be technically strong and get a lot done - you ve worked on services that are highly available, scalable, and redundant. You understand that simple systems are easier to operate and troubleshoot. You can balance speed and quality with iteration and incremental improvements. You ve made life easier for other developers and have motivated your teams to make both process and service improvements with your ability to automate and instrument properly to get the right data. You understand operational excellence and how to instill a culture of being proactive with your teammates. You find anomalies in graphs that didn t trip any alarms and root cause problems before they become real problems. The person in this role will get a lot done on a daily basis, drive tactical execution of features and projects, and own feature design. What are the biggest challenges for the team? The biggest challenges for the team are reliability and performance. The growth of the business is driving us to improve the ability of our systems to scale out and handle traffic patterns that are several orders of magnitude greater than what we can support today. We understand that software is living and needs investment. The challenge is making the right tradeoffs, communicating those decisions effectively, and crisp execution. We need engineers who can build services that handle millions of requests per second. We need engineers who can figure out how we can survive regional data center outages and protect our customers. We need engineers who can build services that enable us to offer even more options to customers and contribute to the overall growth of Oracle Cloud. Required Qualifications 6+ years distributed service engineering experience in a software development environment Hands-on experience building and operating highly available, high-traffic web services Experience developing service-oriented architectures and RESTful web services Strong development experience in Java, C++, C#, or similar OO languages Experience with at least one scripting language for automating tasks, proof of concept work, or command line tools Preferred Qualifications Domain knowledge of Identity and Access Management. Hands-on experience developing services on a public cloud platform (e.g., AWS, Azure, Oracle) Experience and understanding of multi-AD/AZ and regional data centers Building continuous integration/deployment pipelines with robust testing and deployment schedules Experience with Docker Experience working with internal customers and translating requests into prioritized work or features Expertise in applying threat modeling or other risk identification techniques to develop security solutions FedRAMP, PCI DSS, or similar compliance and auditing experience Experience working with large enterprise customers As a member of the software engineering division, you will take an active role in the definition and evolution of standard practices and procedures. You will be responsible for defining and developing software for tasks associated with the developing, designing and debugging of software applications or operating systems.
Posted 2 weeks ago
6.0 - 11.0 years
8 - 13 Lacs
Bengaluru
Work from Office
The Oracle Cloud Infrastructure (OCI) team can provide you the opportunity to build and operate a suite of massive scale, integrated cloud services in a broadly distributed, multi-tenant cloud environment. OCI is committed to providing the best in cloud products that meet the needs of our customers who are tackling some of the world s biggest challenges. We offer unique opportunities for smart, hands-on engineers with the expertise and passion to solve difficult problems in distributed highly available services and virtualized infrastructure. At every level, our engineers have a significant technical and business impact designing and building innovative new systems to power our customer s business critical applications. What is IAM at OCI? Identity and Access Management (IAM) allows users to control who has access to their cloud resources. As part of the Cloud Platform organization, the team is responsible for the design and build of core services that are utilized by internal and external customers alike. The Identity Control Plane team is primarily responsible for servicing CRUD API calls on all Identity-related entities like users, groups, policies, and compartments across all global regions while ensuring consistency and reliability. Who are we looking for? We are looking for engineers with distributed systems experience. You should have experience with the design of major features and launching them into production. You ve operated high-scale services and understand how to make them more resilient. You work on most projects and tasks independently. The ideal candidate will be technically strong and get a lot done - you ve worked on services that are highly available, scalable, and redundant. You understand that simple systems are easier to operate and troubleshoot. You can balance speed and quality with iteration and incremental improvements. You ve made life easier for other developers and have motivated your teams to make both process and service improvements with your ability to automate and instrument properly to get the right data. You understand operational excellence and how to instill a culture of being proactive with your teammates. You find anomalies in graphs that didn t trip any alarms and root cause problems before they become real problems. The person in this role will get a lot done on a daily basis, drive tactical execution of features and projects, and own feature design. What are the biggest challenges for the team? The biggest challenges for the team are reliability and performance. The growth of the business is driving us to improve the ability of our systems to scale out and handle traffic patterns that are several orders of magnitude greater than what we can support today. We understand that software is living and needs investment. The challenge is making the right tradeoffs, communicating those decisions effectively, and crisp execution. We need engineers who can build services that handle millions of requests per second. We need engineers who can figure out how we can survive regional data center outages and protect our customers. We need engineers who can build services that enable us to offer even more options to customers and contribute to the overall growth of Oracle Cloud. Required Qualifications 6+ years distributed service engineering experience in a software development environment Hands-on experience building and operating highly-available, high-traffic web services Experience developing service-oriented architectures and RESTful web services Strong development experience in Java, C++, C#, or similar OO languages Experience with at least one scripting language for automating tasks, proof of concept work, or command line tools Preferred Qualifications Domain knowledge of Identity and Access Management. Hands-on experience developing services on a public cloud platform (e.g., AWS, Azure, Oracle) Experience and understanding of multi-AD/AZ and regional data centers Building continuous integration/deployment pipelines with robust testing and deployment schedules Experience with Docker Experience working with internal customers and translating requests into prioritized work or features Expertise in applying threat modeling or other risk identification techniques to develop security solutions FedRAMP, PCI DSS, or similar compliance and auditing experience Experience working with large enterprise customers As a member of the software engineering division, you will take an active role in the definition and evolution of standard practices and procedures. You will be responsible for defining and developing software for tasks associated with the developing, designing and debugging of software applications or operating systems.
Posted 2 weeks ago
2.0 - 3.0 years
3 - 6 Lacs
Noida
Work from Office
Compliance Management: Responsible for ensuring the implementation and ongoing adherence to relevant security frameworks, including ISO 27001, GDPR, and PCI DSS. This includes maintaining comprehensive documentation and evidence of compliance controls and policies, as well as leading periodic compliance reviews and assessments. Audit Support: Collaborate with security and audit teams to coordinate and support the execution of both internal and external audits. This involves addressing audit findings, ensuring the timely implementation of corrective actions, and preparing and presenting necessary audit evidence and responses related to various security standards. Security Controls & Configuration Oversight: Accountable for ensuring that security configurations across cloud environments, network firewalls, and security tools are securely implemented and consistently monitored. This includes maintaining and enforcing secure configuration baselines and diligently reviewing logs to ensure continuous compliance readiness. EXPERIENCE 2-3 Years SKILLS Primary Skill: Infrastructure Support Sub Skill(s): Infrastructure Support Additional Skill(s): VMWare, Infrastructure Support, System Administrator, AD DC DHCP DNS, Infrastructure Support L1
Posted 2 weeks ago
7.0 - 10.0 years
9 - 12 Lacs
Bengaluru
Work from Office
We are looking for a Lead IT Security Engineer with 7-10 years of hands-on experience in securing cloud infrastructure and e..."/> Lead IT Security Engineer About Alaan We are an AI-powered expense management platform designed to simplify finance for businesses in the Middle East, helping them save both time and money. Our platform offers everything businesses need to manage and control their expenses in one place, including smart corporate cards, AI-powered automation and insights, streamlined accounting, and centralized dashboards. Since 2022, over 1000 businesses in the UAE from startups to enterprises like Al Barari, Rove, Rivoli, Punjab National Bank, and CarSwitch have used Alaan to control their spending and reduce costs. Together, our customers have saved over AED 100 million using Alaan. About the role We are looking for a Lead IT Security Engineer with 7-10 years of hands-on experience in securing cloud infrastructure and enterprise environments. In this leadership role, you will take ownership of securing our AWS and GCP environments, leading the implementation of Privileged Access Management (PAM) solutions such as CyberArk, and driving organization-wide adoption of security best practices across engineering and DevOps.You will closely collaborate with DevOps, Engineering, and Compliance teams to continuously harden our infrastructure, guide security strategy, and ensure alignment with industry-leading principles. What youll do Lead security strategy and implementation for AWS and GCP environments, covering IAM, VPC, networking, access control, and observability. Architect and oversee the deployment of Privileged Access Management (PAM) tools (e.g., CyberArk) and ensure secure integration across critical systems. Champion secret management practices, removing credentials from Git repositories; implement preventive controls using Git hooks and CI/CD enforcement tools. Work with engineering and DevOps teams to embed security into every phase of the development lifecycle. Establish and enforce endpoint security policies (e.g., MDM, patch management, audit readiness) for all engineering devices. Conduct regular security reviews, including access audits, misconfiguration scans, and policy validation. Lead security incident response efforts and provide forensic analysis where needed. Partner with engineering leaders to review architecture decisions and ensure secure design patterns. Support and guide compliance initiatives (e.g., SOC 2, ISO 27001, PCI DSS) with relevant controls and documentation. What we are looking for 7-10 years of experience in IT Security or Cloud Security roles, with recent leadership responsibilities. Deep hands-on expertise in securing AWS and GCP environments, especially around IAM, network security, and logging. Proven experience deploying and managing PAM solutions like CyberArk. Strong grasp of DevSecOps practices and secure CI/CD implementations. Experience with MDM and endpoint protection solutions (e.g., Jamf, Intune, CrowdStrike). Proficient with tools for secrets detection and policy enforcement (e.g., GitLeaks, TruffleHog). Excellent communication skills, with the ability to lead cross-functional conversations on security posture and risk. Bonus (Preferred, not required) Knowledge of application-layer security including OAuth, OpenID, and secure API design. Experience securing Kubernetes workloads and multi-tenant environments. Background in fintech or other highly regulated industries. Whats in it for you Contribute to building the Middle East s most beloved fintech brand from the ground up Benefit from a role with significant ownership and accountability Thrive in a flexible hybrid culture with ample work-life balance Participate in exciting offsite events Competitive salary and equity Enjoy additional perks like travel allowances, gym memberships, and more
Posted 2 weeks ago
3.0 - 7.0 years
7 - 11 Lacs
Kochi
Work from Office
Job Title Security Analyst Role and Responsibilities The security Analyst is a member of the CISO Regulatory & Compliance Team and will assist in ensuring the associated business units / accounts comply with applicable Conduent and NIS 2 security standards, regulations, and policies.The Security analyst will be professional, independent, impartial, and fair in all interactions. The security resource is accountable for procedures and processes that ensure the integrity, confidentiality, and availability of assigned Business units\u2019 information, applications, and infrastructure. Resource will perform routine risk assessments, security audits, and vulnerability scans to identify, evaluate, document, and remediate organization risk, control gaps and vulnerabilities. This position will be responsible for developing security reports, security recommendations, and security policies and procedures that are meaningful, defensible, and actionable for a variety of audiences as pertained to assigned business units. Perform log collection, correlation, reviews, archival, retention, and monitoring of automated alerts for items such as, and not limited to IPS/IDS alerts; change detection (FIM) alerts application firewall alerts; malware alerts rogue wireless network alerts security system health alerts; exploit attempt alerts Participate and be an integral component of audit, compliance, and regulatory functions, including and not limited to audits of system security to ensure compliance with Corporate security framework NIS 2, NIST 800-53, ISO 27001/2, PCI-DSS emerging country, state, and Federal privacy laws Primary POC in a vulnerability management program of the account that includes external and internal vulnerability scans of applications and systems external and internal penetration tests of applications and systems documentation and remediation of identified vulnerabilities and exploits routinely monitoring various communication avenues for security vulnerabilities and security patches taking a risk-based approach comparing those security vulnerabilities and security patches across the operating environments making recommendations to various IT teams on the mitigation process for those identified security vulnerabilities Coordinate with business units, operations, and technology teams for incident response, remediation, and improvement Acts as the initial point of contact to facilitate the handling of security audits and client requests Supports the creation of business continuity/disaster recovery plans, to include conducting disaster recovery tests, publishing test results, and making changes necessary to address deficiencies Maintain documentation that supports the annual Security compliance attestation as it is relevant to the assigned Business units Qualifications and Education CIPP, CRISC, CISA, CISSP, CISM, ISO or any security/IT audit certification is a plus. Minimum of Five (3 to 5) Years of experience in IT Security compliance, or Security Auditing is required. Knowledge and understanding of security controls across all security domains, such as access management, encryption, vulnerability management, authentication, authorization, network security, physical security, etc. Ability to identify security risks in application, system, and network architecture, data flow, and processes or procedures Ability to assess the organizational impact of identified security risks and recommend solutions or mitigating controls. Knowledge of security technologies, devices, and countermeasures, as well as the threats they are designed to counter. Experience with developing security reports, recommendations, policies, and procedures that are meaningful, defensible, and actionable for a variety of audiences. Familiarity with more than one framework (NIST 800-series, ISO 27000-series, PCI DSS and ISO, HIPAA, HITRUST, FISMA, FedRAMP other common security control frameworks). Experience in PowerPoint, Word, Excel; experience with Visio and MS Project. Communication skills (interpersonal, verbal, presentation written, email). Experience to write report segments and to participate in presentations. Familiarity with security, workflow, and collaboration tools such Nessus Tenable, Splunk, SharePoint and ServiceNow (Snow) is a plus Positive attitude, team player, self-starter; takes initiative, ability to work independently and effectively with all levels of staff and management both internally and externally Preferred Skills Creating and Maintaining NIST 800-53-rev5 based SSP and POAM Familiarity with more than one framework (NIST 800-series, ISO 27000-series, PCI DSS and ISO, HIPAA, HITRUST, FISMA, FedRAMP other common security control frameworks).
Posted 2 weeks ago
2.0 - 4.0 years
3 - 4 Lacs
Navi Mumbai, Mumbai (All Areas)
Work from Office
KEY RESPONSIBILITIES Governance: Develop and maintain cybersecurity policies, standards, and procedures. Collaborate with leadership to align cybersecurity initiatives with business objectives. Lead or support security awareness and training initiatives. Risk Management: Identify, assess, and monitor cybersecurity risks across the organization. Conduct risk assessments and gap analyses on systems, applications, and vendors. Work with stakeholders to implement risk mitigation strategies and track remediation activities. Compliance: Ensure compliance with regulatory and industry standards such as ISO 27001, NIST, SOC 2, GDPR, HIPAA, PCI-DSS, etc. Prepare and support internal and external audits and security assessments. Maintain documentation of compliance controls and audit evidence. Reporting & Documentation: Produce risk reports and metrics for senior management and stakeholders. Maintain accurate records of compliance activities and risk treatment plans. Track and report on the status of cybersecurity initiatives and issues. Required Skills and Qualifications: Bachelors degree in Cybersecurity, Information technology, or a related field. 2-3+ years of experience in information security governance, risk, or compliance. Strong knowledge of GRC frameworks and regulatory requirements. Familiarity with risk assessment methodologies and tools. Excellent analytical, organizational, and communication skills. Preferred Qualifications: Certifications such as ISO 27001 Lead Implementer, or similar. Experience with GRC tools such as RSA Archer, ServiceNow GRC..etc Understanding of third-party risk management and vendor assessments. CANDIDATES WHO CAN JOIN IMMEDIATELY ARE HIGHLY PREFERRED.
Posted 2 weeks ago
0.0 - 1.0 years
2 - 3 Lacs
Navi Mumbai
Work from Office
ANZEN Technologies Private Limited. stands as an unparalleled powerhouse, empowering organizations across industries with our visionary services, cutting-edge solutions, and ground-breaking services in the realm of Cyber Security, IT Governance, Risk Management, and Compliance. As your trusted partner, we offer a comprehensive suite of End-to-End security services and consultancy, tailored to safeguard critical infrastructure installations, elevate the standards of BFSI, eCommerce, IT/ITES, Pharmaceuticals, and an array of other sectors. Qualifications: 1. B.E / MSc in Information Technology, Computer Science or related field. 2. Basics understanding of fundamental concepts in GRC, Cybersecurity, Networking and Information Security. 3. Good communication & documentation skills. Candidate should possess basic knowledge of following standards: 1. ISO 27001:2022 (ISMS) 2. DPDP Act. 2023 Certification: (Optional): 1. ISO 27001 LA or LI 2. Any course/training related to cybersecurity Internship Experience of 3-6 months is must. Office Address : ANZEN Technologies Private Limited Akshar Business Park, H - 3025, 3rd Floor, Plot No. 3, Sector-25, Vashi, Navi Mumbai 400703 https://anzentech.com Immediate Joiner may apply and come for Interview
Posted 2 weeks ago
3.0 - 6.0 years
8 - 12 Lacs
Bengaluru
Hybrid
Your day at NTT DATA The Security Consultant is a seasoned level role, responsible for translating clients cybersecurity requirements and customizing and implementing security solutions into specific systems, applications and product designs. This role identifies and develops the security solutions for clients using company products, outsourced technology solutions and technical tools. This role consults with clients regarding secure product configuration, deployment, and security patches to minimize security vulnerabilities and provides comprehensive scanning, penetration testing, vulnerability assessments, monitoring services and source code analysis and delivers detailed results to clients. This role guides and supports clients in the development and implementation of product security controls. What you'll be doing Key Responsibilities: Works on strategic projects that ensure the efficient and effective reaction to security breaches to mitigate immediate and potential threats. Uses mitigation, preparedness, response and recovery approaches to minimize business disruptions and commercial consequences. Offers detailed technical support investigation and analysis response activities and evaluate the effectiveness of and improvements to existing practices. Conducts regular threat and vulnerability assessments and determine deviations from acceptable configurations or policies. Participates in the assessment of the level of risk and support the development of appropriate mitigation countermeasures in operational and non-operational situations. Analyzes evidence to support network vulnerability mitigation. Supports peers in the management and implementation of the information security management system. Participates in the implementation of policies, processes and guidelines to ensure the standardization of security management throughout the organization. Applies tactics, techniques, and procedures to a full range of tools and processes related to administrative, criminal, and counterintelligence gathering (e.g., in-depth case analyses, continuous monitoring, malware analysis, clear documentation). Proactively searches through our critical infrastructure, systems and networks to detect and isolate advanced threats that may cause harm to our organization. Use both manual approaches and automated tools to identify, analyze, and report events and support the development of countermeasures to proactively protect against these threats in the future. Knowledge and Attributes: Strong understanding of information technology and information security Solid understanding of security risks and preventative controls Excellent understanding of security operational processes and controls Service consulting aptitude, focusing on the business, service and sales aspects Excellent verbal and written communication skills Demonstrate impeccable attention to detail are able to translate internal customer requirements into solutions Maintain up-to-date knowledge of security threats, countermeasures, security tools, and network technologies High level of drive and ability to work under pressure Ability to build and maintain cross-functional relationships with a variety of stakeholders Understanding of relevant laws, regulations, and compliance frameworks affecting the technology sector. Good ability to assess and manage cybersecurity risks at both organizational and project levels. Good knowledge of security frameworks and standards like NIST, ISO/IEC 27001, CIS, etc. Academic Qualifications and Certifications: Bachelor's degree or equivalent in Information Technology or Computer Science or Engineering or related field. Industry relevant certifications such as CISSP, CISM, CEH, GSEC or CompTIA Security+ essential. Required Experience: Seasoned demonstrable experience in the Information Technology Security Industry or relevant experience in similar role within a related environment. Seasoned experience with security architecture design principles. Seasoned experience with industry compliance and standards such as ISO 27000, PCI DSS, NIST, HIPAA or others. Seasoned experience with security tools and techniques to cover SANS Top 25, OWASP or others. Seasoned experience working in a multi-team environment across multiple geographies. Workplace type : Hybrid Working
Posted 2 weeks ago
3.0 - 8.0 years
5 - 10 Lacs
Gurugram
Hybrid
Your day at NTT DATA The Senior Associate Security Technical Architect is a developing subject matter expert, responsible for assisting with designing robust security architectures for our systems, applications, and infrastructure. This role collaborates with cross-functional teams to ensure that technology solutions are secure, compliant, and aligned with industry best practices. Your expertise will be crucial in protecting sensitive data, mitigating risks, and maintaining the confidentiality, integrity, and availability of our systems. What you'll be doing Key Responsibilities: Designs and develops comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs. Viewed as a trusted technical advisor to the client. Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle. Provides pre-sales technical support and expertise in analyzing client requirements, in conjunction with the clients current security capabilities. Provides expertise in secure coding practices, network security, identity and access management, data protection, and other security domains. Supports the evaluation of and selects security technologies, tools, and frameworks to support our security architecture. Ensures technical solutions will accomplish the client's objectives. Defines and implements security policies, standards, and procedures to ensure compliance with industry regulations and best practices. Supports incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team. Develops or produces the technical design document to match the solution design specifications. Working with the relevant internal stakeholders, participate in scope of work determination, product pricing and RFP/RFI responses. Assists with the determination of outsourcing, product pricing and collaborates with others to develop an implementation solution. Responsible for influencing and guiding members of the Sales team and to ensure that they are equipped to close deals and maintain visibility of forecasting and sales pipeline in order to influence potential deals. Manages client proof of concept (POC) initiatives, which will require the involvement of the appropriate resources, and setup and delivery of the POC. On all assigned engagements, owns the proposed solution and transitions the build implementation to the delivery team. Specifically relating to opportunity pursuit this role will evaluate each opportunity for alignment with organizational capabilities and business policy, prepare the executive summary that outlines all of the information gathered from the client in regards to their needs, as understood, document the proposed technology solution, document the statement of work along with all labor requirements, work with the relevant internal stakeholders to prepare the pricing format that will be supplied to the customer, perform the actual solution design and prepare a parts list outlining equipment to be provided, develop and manage a proof-of-concept as such may be required, engage all technical resources required for an accurate solution design, prepare a network diagram outlining the proposed solution, document all deliverables and what constitutes a successful completion, review the final parts list as supplied and submit all information to the applicable bid team for final assembly, verify the proposals accuracy and sign off on the final documents to be presented to the client, assist during the final presentation to the client as appropriate. Knowledge and Attributes: Demonstrates good client engagement skills coupled with technical consulting aptitude. Understanding of the vendors products business and technology positioning. Good analytical and problem-solving skills, with the ability to assess risks, analyze complex security issues, and propose effective solutions. Ability to collaborate and communicate effectively with team members, contributing to their success Good product knowledge integrated with technology understanding Good knowledge of security domains, including network security, application security, cloud security, data protection, identity and access management, cryptography, and secure coding practices. Proficiency in enterprise architecture principles, frameworks (such as TOGAF), and architectural patterns for designing secure and scalable systems. Good understanding of security regulations, standards, and frameworks (such as ISO 27001, NIST, PCI DSS) and their practical application Basic understanding of key vendor subscription models such as Cisco EA 3.0. Academic Qualifications and Certifications: Bachelor's degree in information technology, computer science or information systems or related field. Vendor product, sales and technology certifications. Relevant certifications, such as CISSP, CISM, GIAC, or TOGAF, are highly desirable. Required Experience: Moderate level technical experience within a large scale (preferably multi-national) technology services environment. Moderate level experience as a Security Technical Architect or a similar role, designing and implementing security architectures for complex systems and applications. Moderate level experience with security technologies and tools, such as firewalls, intrusion detection/prevention systems, SIEM, vulnerability scanners, and secure coding analysis tools. Experience in project management methodologies.
Posted 2 weeks ago
5.0 - 10.0 years
15 - 20 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats. Do Design and develop enterprise cyber security strategy and architecture Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses Identify risks associated with business processes, operations, information security programs and technology projects Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge Identify security design gaps in existing and proposed architectures and recommend changes or enhancements Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. Provide support during technical deployment, configuration, integration and administration of security technologies Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity Provide solution of RFP’s received from clients and ensure overall design assurance Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture Depending on the client’s need with particular standards and technology stacks create complete RFPs Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps Evaluate and recommend solutions to integrate with overall technology ecosystem Tracks industry and application trends and relates these to planning current and future IT needs Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers Provide training to employees on issues such as spam and unwanted or malicious emails Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Program Manager/Director Regular reporting & updates Infrastructure (CIS team) For infrastructure support External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming security technologies (e.g. Firewalls, IPS, DDoS, SIEM, WAF, Endpoint etc.) and understanding of compliance regulatory requirement like PCI DSS, HIPAA, etc.- Expert Systems Thinking - Understanding of the Wipro system (interrelatedness, interdependencies and boundaries) and perform problem solving in a complex environment - Expert Leveraging Technology - In-depth knowledge of and mastery over ecosystem technology that commands expert authority respect - Master Technical Knowledge - Certified Information Systems Security Professional (CISSP), Cloud Architect Certification from AWS and Azure, ToGAF or SABSA certification- Master Competency Levels Foundation Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. Competent Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. Expert Applies the competency in all situations and is serves as a guide to others as well. Master Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. Behavioral Competencies Effective Communication Managing Complexity Client centricity Technology Acumen Innovation Problem Solving approach Collaborative Working Execution Excellence Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2. Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led
Posted 2 weeks ago
5.0 - 10.0 years
12 - 17 Lacs
Hyderabad
Work from Office
About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 2 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
Bengaluru
Work from Office
Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role _x000D_ Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? _x000D_ Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? _x000D_ i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? _x000D_ 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? _x000D_ Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Cloud Security Posture Management_x000D_. Experience8-10 Years_x000D_. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 2 weeks ago
6.0 - 11.0 years
12 - 17 Lacs
Kolkata
Work from Office
Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Saviynt. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 2 weeks ago
6.0 - 11.0 years
12 - 17 Lacs
Bengaluru
Work from Office
Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6464 Jobs | Ahmedabad
Amazon
6352 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane