Home
Jobs

683 Security+ Jobs

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

1.0 years

4 Lacs

Cochin

On-site

GlassDoor logo

Job Title: Cyber Security Faculty Department: Information Technology / Cyber Security Location: Kochi Employment Type: Full-time Job Summary: We are seeking a qualified and experienced Cyber Security Faculty member to join our academic team. The ideal candidate will be responsible for delivering high-quality instruction in cyber security topics, developing curriculum materials, mentoring students, and keeping up-to-date with the latest developments in the cyber security field. Key Responsibilities: Deliver lectures and practical sessions on cyber security topics such as: Network Security Ethical Hacking Information Security Security Operations Digital Forensics Cloud and Web Security Cyber Laws and Regulations Develop and update course content, lesson plans, lab exercises, and assessments. Guide students in academic projects, research, and certifications. Conduct workshops, seminars, and webinars on current cyber security trends and technologies. Evaluate student performance through examinations, assignments, and projects. Collaborate with academic and industry experts to align course content with real-world needs. Stay current with advancements in cyber security and integrate new tools and practices into teaching. Assist in placement preparation and mentoring for cyber security roles. Qualifications: Education: Master’s degree (M.Tech/M.Sc) in Cyber Security, Information Security, Computer Science, or related field. (Candidates with a Bachelor's degree and relevant certifications/industry experience may also be considered.) Certifications (preferred): CEH, CISSP, CPENT,CISM, CompTIA Security+, OSCP, or other relevant cyber security certifications. Experience: Minimum 1–3 years of teaching or industry experience in cyber security. Skills Required: In-depth knowledge of cyber security tools, threats, and mitigation techniques. Proficiency in using lab environments and platforms like Kali Linux, Wireshark, Metasploit, etc. Strong communication and presentation skills. Ability to engage and inspire students. Desirable Attributes: Passion for teaching and mentoring. Research publications in the field of cyber security. Experience in online teaching or using learning management systems (LMS). Interested Candidates may apply hr@blitzacademy.org OR 9946640307 Job Type: Full-time Pay: Up to ₹35,000.00 per month Benefits: Health insurance Provident Fund Schedule: Day shift Work Location: In person Application Deadline: 02/07/2025 Expected Start Date: 02/07/2025

Posted 10 hours ago

Apply

2.0 years

2 - 3 Lacs

Okhla

On-site

GlassDoor logo

Job Opening: Network Engineer Location: Okhla Phase 2, New Delhi Company: Growth India Employment Type: Full-Time Salary: ₹20,000 – ₹25,000/month About the Role Growth India is seeking a Network Engineer to design, manage, and support our IT infrastructure including LAN/WAN networks, Cisco devices, and Windows/Linux servers. Ideal candidates are CCNA-certified professionals with strong hands-on experience in networking and system administration. Key Responsibilities Design, implement, and manage LAN/WAN networks using Cisco equipment Configure routers, switches, firewalls, and VPNs Administer Windows & Linux servers (Active Directory, DNS, DHCP) Monitor and troubleshoot network/server performance Ensure network security and assist in upgrades/migrations Maintain documentation of systems and procedures Requirements CCNA Certification Bachelor’s degree in Computer Science, IT, or related field 2–5 years' experience in network/server administration Strong knowledge of TCP/IP, OSPF, VLANs, etc. Hands-on experience with Cisco hardware, virtualization, and cybersecurity Preferred Qualifications CCNP or other Cisco certifications Familiarity with scripting (PowerShell/Bash) Experience with cloud platforms (AWS, Azure), DR & backup solutions Additional certifications like Security+, ITIL, Network+ Perks & Benefits Exposure to modern enterprise technologies Supportive work culture with learning opportunities Career growth within a tech-driven team Job Type: Full-time Pay: ₹20,000.00 - ₹25,000.00 per month Schedule: Morning shift Supplemental Pay: Performance bonus Work Location: In person

Posted 10 hours ago

Apply

3.0 years

5 - 6 Lacs

Bengaluru

On-site

GlassDoor logo

Job Title: Security Operations Analyst Location: Bangalore, Karnataka, India What you will do: As a Security Operations Analyst, you will play a critical role in monitoring and responding to security incidents, identifying vulnerabilities, and ensuring compliance with security policies. You will collaborate with various stakeholders to enhance the security posture of our organization and support incident response activities. How you will do it: Monitor security alerts and events from various security tools and platforms. Investigate security incidents, perform root cause analysis, and document findings. Assist in the management of security incidents, including containment, eradication, and recovery efforts. Conduct regular security assessments and vulnerability scans to identify potential risks. Collaborate with IT and other departments to remediate vulnerabilities and implement security best practices. Support incident response activities and maintain incident response documentation. Participate in security awareness training and educate staff on security policies and procedures. Stay updated with the latest security trends, threats, and technologies. What we look for: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. 3-5 years of experience in security operations, incident response, or a related field. Strong understanding of security frameworks and best practices (e.g., NIST, ISO 27001). Experience with security tools such as SIEM, IDS/IPS, and vulnerability management solutions. Knowledge of networking protocols and systems security concepts. Excellent analytical and problem-solving skills. Strong communication skills and the ability to work collaboratively in a team environment. Relevant cybersecurity certifications (e.g., CompTIA Security+, CEH, CISSP) are a plus. What we offer: Competitive salary and performance-based bonuses. Comprehensive benefits package including health, dental, and retirement plans. Opportunities for professional development and continuous learning. Collaborative and inclusive work environment.

Posted 10 hours ago

Apply

2.0 years

3 - 6 Lacs

Chennai

On-site

GlassDoor logo

We are seeking a dynamic and target-driven Sales Executive with proven experience in Cloud and Cybersecurity solution sales. The ideal candidate will be responsible for driving business growth, identifying new opportunities, managing key client accounts, and coordinating technical deliverables with the VAPT (Vulnerability Assessment & Penetration Testing) team. Key Responsibilities: Identify and acquire new clients for cloud solutions, cybersecurity services, and VAPT offerings. Understand customer needs and propose relevant cybersecurity and cloud solutions. Prepare proposals, respond to RFPs/RFIs, and manage the sales cycle end-to-end. Maintain strong relationships with clients and act as a single point of contact. Coordinate with the internal VAPT team for technical scoping, project execution, and reporting. Meet or exceed monthly and quarterly sales targets. Stay updated on latest trends in cloud computing, cybersecurity, and compliance. Represent the company at industry events, webinars, and client meetings. Required Skills & Qualifications: Bachelor’s Degree in IT, Computer Science, Business, or related field. 2–5 years of B2B sales experience in IT, Cloud, or Cybersecurity domains. Strong understanding of cloud platforms (AWS, Azure, GCP) and security services. Familiarity with VAPT process, terminology, and coordination with technical teams. Excellent communication, presentation, and negotiation skills. Self-motivated, result-oriented, and capable of managing multiple client relationships. Preferred: Experience in selling IT services, MSP, or security consulting solutions. Certifications like AWS Cloud Practitioner, CompTIA Security+, or similar (a plus). Job Type: Full-time Pay: ₹300,000.00 - ₹600,000.00 per year Benefits: Cell phone reimbursement Flexible schedule Health insurance Paid time off Provident Fund Compensation Package: Performance bonus Yearly bonus Schedule: Day shift Language: English (Preferred) Work Location: In person

Posted 10 hours ago

Apply

130.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Job Description Current Employees apply HERE Current Contingent Workers apply HERE Secondary Language(s) Job Description Senior Manager, Cybersecurity Engineering, EIAM The Opportunity Based in Hyderabad, join a global healthcare biopharma company and be part of a 130- year legacy of success backed by ethical integrity, forward momentum, and an inspiring mission to achieve new milestones in global healthcare. Be part of an organisation driven by digital technology and data-backed approaches that support a diversified portfolio of prescription medicines, vaccines, and animal health products. Drive innovation and execution excellence. Be a part of a team with passion for using data, analytics, and insights to drive decision-making, and which creates custom software, allowing us to tackle some of the world's greatest health threats. Our Technology Centers focus on creating a space where teams can come together to deliver business solutions that save and improve lives. An integral part of our company’s IT operating model, Tech Centers are globally distributed locations where each IT division has employees to enable our digital transformation journey and drive business outcomes. These locations, in addition to the other sites, are essential to supporting our business and strategy. A focused group of leaders in each Tech Center helps to ensure we can manage and improve each location, from investing in growth, success, and well-being of our people, to making sure colleagues from each IT division feel a sense of belonging to managing critical emergencies. And together, we must leverage the strength of our team to collaborate globally to optimize connections and share best practices across the Tech Centers. Role Overview We are seeking an experienced, energetic, forward-thinking Identity and Access Management (IAM) professional to serve as a senior technical Subject Matter Expert (SME) and developer responsible for the delivery of authentication and authorization services enterprise-wide. The role requires a technically strong individual who is resourceful and highly self-motivated. The successful candidate should have 10+ years of experience working in the IAM field in a large, global enterprise environment and possess broad experience working with numerous technologies like PingOne, DaVinci, SSO, MFA etc. Additionally, the candidate will have strong communication skills that allows them to successfully work with stakeholders in diverse roles ranging from IT infrastructure to individual end-users. You will also collaborate extensively with other technical and business teams to identify, develop, and provide enhancements which support the complex security, collaboration, and productivity needs of a global organization. To help meet these emerging challenges, we are seeking an energetic, forward-thinking security professional to support the delivery of Identity and Access Management services. What Will You Do In This Role Understand divisional and site business system requirements for Authentication services. Must have experience in defining Authentication & Authorization platform requirements, designing technical solutions and executing on those designs into a highly available, fault tolerant environment. Understanding of security best practices, administration and governance of Identity and Access Management the products and services including identify and evaluate security gaps. Perform vendor and technology assessments. Recommend improvements, corrections, remediation for projects or internal processes. Advocate secure computing practices and procedures and communicate Information Security and IAM best practices throughout the company. Maintain active and direct interaction with key stakeholders. Working with various technical teams to ensure we maintain high availability and uninterrupted outage of our production environment. Demonstrate ability to stay current with all industry trends/best practices, as well as new product releases so that we can maintain a proactive 3-year systems management roadmap. Ensure all third-party monitoring solutions that are integrated into the Identity & Access Management products are properly documented and function as designed. What Should You Have 10+ years of experience with IAM solutions in the area of authentication and authorization (e.g. PingFederate, PingAccess and various multifactor authentication products) In-depth knowledge of authentication and authorization solutions such as PingFederate, PingAccess and, various multifactor authentication methods including FIDO2 for passwordless. Previous work designing / implementing EntraID authentication services such as Risk-based authentication, Azure Identity Protection and, Conditional Access Policies Strong organizational skills and able to multitask and adjust to changing priorities Ability to work efficiently in a matrixed environment with a global team comprised of company staff, contractors, and vendors Excellent interpersonal, written, and oral communication skills to effectively communicate technical ideas in business- and user-friendly language Strong analytical and problem-solving skills and demonstrable ability to work independently as well as in a team environment Well versed in Federation, SAML, OpenID, OAuth and other industry standard authentication / authorization solutions Excellent communication skills and interpersonal skills are required. A demonstrated track record of making a difference and adding value. Strong organizational skills with the ability to multi-task. Ability to work and adjust to changing deadlines. Excellent interpersonal, written and oral communication skills with the ability to communicate effectively across all levels of an organization. Able to present technical ideas in business-friendly and user-friendly language Proven analytical, evaluative, and problem-solving abilities Desired Skills & Experience Previous work designing / implementing adaptive risk authentication solutions (e.g. Ping Risk, Azure Identity Protection with Conditional Access Policies, Microsoft Defender for Cloud Applications) Hands-on experience with AWS IAM and AWS IAM related services (e.g. AWS Cognito, AWS Identity Center), Passwordless authentication (e.g. FIDO2 at the desktop) or other biometric authentication solutions Authentication enhancements to support zero-trust and SASE adoption Experience working in a large healthcare environment Demonstrated understanding of Identity-related NIST standards (e.g. 800-63-3) Prior experience with the Merck enterprise environment and business applications Good working knowledge of the ITIL framework Working knowledge and understanding of Remedy for Change, Incident and Knowledge Management CISSP, Security+ or similar industry certification Our technology teams operate as business partners, proposing ideas and innovative solutions that enable new organizational capabilities. We collaborate internationally to deliver services and solutions that help everyone be more productive and enable innovation. Who We Are We are known as Merck & Co., Inc., Rahway, New Jersey, USA in the United States and Canada and MSD everywhere else. For more than a century, we have been inventing for life, bringing forward medicines and vaccines for many of the world's most challenging diseases. Today, our company continues to be at the forefront of research to deliver innovative health solutions and advance the prevention and treatment of diseases that threaten people and animals around the world. What We Look For Imagine getting up in the morning for a job as important as helping to save and improve lives around the world. Here, you have that opportunity. You can put your empathy, creativity, digital mastery, or scientific genius to work in collaboration with a diverse group of colleagues who pursue and bring hope to countless people who are battling some of the most challenging diseases of our time. Our team is constantly evolving, so if you are among the intellectually curious, join us—and start making your impact today. #HYDIT2025 Search Firm Representatives Please Read Carefully Merck & Co., Inc., Rahway, NJ, USA, also known as Merck Sharp & Dohme LLC, Rahway, NJ, USA, does not accept unsolicited assistance from search firms for employment opportunities. All CVs / resumes submitted by search firms to any employee at our company without a valid written search agreement in place for this position will be deemed the sole property of our company. No fee will be paid in the event a candidate is hired by our company as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails. Employee Status Regular Relocation VISA Sponsorship Travel Requirements Flexible Work Arrangements Hybrid Shift Valid Driving License Hazardous Material(s) Required Skills Design Applications, Information Security, Security Operations, SLA Management, Software Development, Software Development Life Cycle (SDLC), System Designs, Technical Advice, Vulnerability Scanning Preferred Skills Job Posting End Date 07/27/2025 A job posting is effective until 11 59 59PM on the day BEFORE the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date. Requisition ID R341153

Posted 11 hours ago

Apply

5.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

We are seeking a dynamic and target-driven Sales Executive with proven experience in Cloud and Cybersecurity solution sales. The ideal candidate will be responsible for driving business growth, identifying new opportunities, managing key client accounts, and coordinating technical deliverables with the VAPT (Vulnerability Assessment & Penetration Testing) team. 🛠️ Key Responsibilities: Identify and acquire new clients for cloud solutions, cybersecurity services, and VAPT offerings. Understand customer needs and propose relevant cybersecurity and cloud solutions. Prepare proposals, respond to RFPs/RFIs, and manage the sales cycle end-to-end. Maintain strong relationships with clients and act as a single point of contact. Coordinate with the internal VAPT team for technical scoping, project execution, and reporting. Meet or exceed monthly and quarterly sales targets. Stay updated on latest trends in cloud computing, cybersecurity, and compliance. Represent the company at industry events, webinars, and client meetings. ✅ Required Skills & Qualifications: Bachelor’s Degree in IT, Computer Science, Business, or related field. 2–5 years of B2B sales experience in IT, Cloud, or Cybersecurity domains. Strong understanding of cloud platforms (AWS, Azure, GCP) and security services. Familiarity with VAPT process, terminology, and coordination with technical teams. Excellent communication, presentation, and negotiation skills. Self-motivated, result-oriented, and capable of managing multiple client relationships. 🎯 Preferred: Experience in selling IT services, MSP, or security consulting solutions. Certifications like AWS Cloud Practitioner, CompTIA Security+, or similar (a plus).

Posted 15 hours ago

Apply

3.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Job Title: Security Operations Analyst Location: Bangalore, Karnataka, India What You Will Do As a Security Operations Analyst, you will play a critical role in monitoring and responding to security incidents, identifying vulnerabilities, and ensuring compliance with security policies. You will collaborate with various stakeholders to enhance the security posture of our organization and support incident response activities. How You Will Do It Monitor security alerts and events from various security tools and platforms. Investigate security incidents, perform root cause analysis, and document findings. Assist in the management of security incidents, including containment, eradication, and recovery efforts. Conduct regular security assessments and vulnerability scans to identify potential risks. Collaborate with IT and other departments to remediate vulnerabilities and implement security best practices. Support incident response activities and maintain incident response documentation. Participate in security awareness training and educate staff on security policies and procedures. Stay updated with the latest security trends, threats, and technologies. What We Look For Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. 3-5 years of experience in security operations, incident response, or a related field. Strong understanding of security frameworks and best practices (e.g., NIST, ISO 27001). Experience with security tools such as SIEM, IDS/IPS, and vulnerability management solutions. Knowledge of networking protocols and systems security concepts. Excellent analytical and problem-solving skills. Strong communication skills and the ability to work collaboratively in a team environment. Relevant cybersecurity certifications (e.g., CompTIA Security+, CEH, CISSP) are a plus. What We Offer Competitive salary and performance-based bonuses. Comprehensive benefits package including health, dental, and retirement plans. Opportunities for professional development and continuous learning. Collaborative and inclusive work environment.

Posted 20 hours ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Linkedin logo

When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What You’ll Be Doing... You'll be part of the "Verizon Global Infrastructure (VGI), Network & Information Security” group working on securing the network and infra devices, harden the operating systems, configurations and build use cases to automate these tasks. Protect against cyber threats within the VGS Technology organization. You will work with a team of cybersecurity engineers with network & infrastructure background, threat intelligence analysts to align common technologies and practices that fortify our applications, systems, IT network and infrastructure. Some of your daily responsibilities would be the following. Leverage industry proven tools to identify and reduce Cyber Risks Implement next generation network security architecture, create advanced policies and controls against future threats Ensure effectiveness and coverage of security, policies and controls of VGS Network & Infrastructure, prioritizing risk level. Ensure Security posture of VGS Network & Infrastructure, e.g., access management, vulnerabilities remediation, etc. Develop awareness, training & compliance programs focused on Network & Infrastructure Cyber Security practices. Coordinate activities like network, penetration testing, incident response, data collection etc by partnering with the CISO teams. Assist in Crisis Management, Ransomware Recovery and Business Continuity planning. Identify, investigate and resolve global security breaches / incidents Develop and maintain network and infrastructure security reporting dashboards and scorecards used to measure our Cyber Practice. Identify opportunities and use cases for automation to remediate vulnerabilities, implement controls, orchestrate between tools and automate security practices. What We’re Looking For... You are passionate about network security and automation as a career. You are self-driven and motivated, with good communication and analytical skills. You’re a sought-after team member that thrives in a dynamic work environment. You will be working with multiple partners from the business groups, so networking and managing effective working relationships should be your top most priority. You have an understanding of industry trends in all areas of Information Security. You'll Need To Have Bachelor’s degree or four or more years of work experience. Four or more years of relevant work experience. Four or more years of experience in network / information security, risk and compliance management. Understanding of network fundamentals, switching, routing protocols, load balancers, web proxies, firewalls and software defined networking solutions. Understanding of security fundamentals Confidentiality, Integrity, Availability, access control, Authentication, Authorization, Auditing secure design concepts like Experience in design and implementation of network security solutions like firewalls, intrusion detection and prevention systems, VPN, web proxies etc using vendor products like Cisco, Juniper, Checkpoint, Palo Alto etc Experience in managing public cloud infrastructure like AWS, Azure, GCP etc Experience working in any one of the SIEM / SOAR solutions like Splunk SOAR, Cortex XSOAR by Palo Alto Networks, IBM Security QRadar SOAR, Swimlane etc Experience working on IT ticketing systems like JIRA, Service Now and ability to partner and collaborate with other teams in the organization Experience with hosting security awareness campaigns, gamification and bug bounty programs will be an added advantage Strong analytical problem solving, communication and interpersonal skills Passion to stay abreast with emerging technologies, network security trends, tools and techniques. Even better if you have one or more of the following: Master’s degree in Computer Science / Information Technology Engineering. Industry relevant security certifications Security+, OSCP, CEH, CISSP, GIAC, etc Cloud relevant certifications CCSP, CCSK Strong expertise in at least one operating system Window or Linux. Strong Scripting expertise in any one of Python, R, Perl, Javascript, Powershell, bash, VBScript etc Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics.

Posted 1 day ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Linkedin logo

When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What You’ll Be Doing... You'll be part of the "Verizon Global Infrastructure (VGI), Network & Information Security” group working to ensure that the network infrastructure devices are managed centrally, enterprise class asset management is built for complete asset coverage and visibility, sufficient access control is enabled and implement a process to follow the principle of least privilege. You will also work with a team of cybersecurity engineers to build use cases to automate and orchestrate access management across the enterprise. Some Of Your Daily Responsibilities Would Be The Following Develop and implement access management policies and procedures. Implement and maintain asset tracking systems. Conduct regular access reviews and audits. Identify and remediate access control deficiencies. Monitor access logs and alerts for suspicious activity. Ensure compliance with regulatory requirements (e.g., GDPR, HIPAA, PCI DSS). Develop and implement compliance frameworks for infrastructure asset management. Conduct regular audits of asset management processes and documentation. Monitor changes in regulations and standards and update compliance procedures accordingly Investigate and resolve compliance issues and incidents. Maintain accurate records of compliance activities. Collaborate with internal teams and external auditors on compliance matters. Maintain an accurate inventory of all infrastructure assets (hardware, software, licenses) Leverage industry proven tools to identify and reduce Cyber Risks Assist in Crisis Management, Ransomware Recovery and Business Continuity planning. Identify, investigate and resolve global security breaches / incidents Develop and maintain network and infrastructure security reporting dashboards and scorecards used to measure our Cyber Practice. What We’re Looking For... You are passionate about network security and automation as a career. You are self-driven and motivated, with good communication and analytical skills. You’re a sought-after team member that thrives in a dynamic work environment. You will be working with multiple partners from the business groups, so networking and managing effective working relationships should be your top most priority. You have an understanding of industry trends in all areas of Information Security. You'll Need To Have Bachelor’s degree or four or more years of work experience. Four or more of relevant work experience. Four or more years of experience in network / information security, risk and compliance management. Understanding of network fundamentals, switching, routing protocols, load balancers, web proxies, firewalls and software defined networking solutions. Experience in handling enterprise scale server infrastructure & management Knowledge of Cloud infrastructure and technologies Excellent analytical and problem-solving skills. Ability to manage multiple tasks and priorities in a fast-paced environment Understanding of security fundamentals Confidentiality, Integrity, Availability, access control, Authentication, Authorization, Auditing secure design concepts like Experience working on IT ticketing systems like JIRA, Service Now and ability to partner and collaborate with other teams in the organization Experience with hosting security awareness campaigns, gamification and bug bounty programs will be an added advantage Strong analytical problem solving, communication and interpersonal skills Passion to stay abreast with emerging technologies, network security trends, tools and techniques. Even better if you have one or more of the following: Masters or Bachelor’s degree in Computer Science / Information Technology Engineering Industry relevant security certifications Security+, OSCP, CEH, CISSP, GIAC, etc Strong expertise in at least one operating system Window or Linux. Cloud relevant certifications CCSP, CCSK If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above. Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics.

Posted 1 day ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What You’ll Be Doing... You'll be part of the "Verizon Global Infrastructure (VGI), Network & Information Security” group working to ensure that the network infrastructure devices are managed centrally, enterprise class asset management is built for complete asset coverage and visibility, sufficient access control is enabled and implement a process to follow the principle of least privilege. You will also work with a team of cybersecurity engineers to build use cases to automate and orchestrate access management across the enterprise. Some Of Your Daily Responsibilities Would Be The Following Develop and implement access management policies and procedures. Implement and maintain asset tracking systems. Conduct regular access reviews and audits. Identify and remediate access control deficiencies. Monitor access logs and alerts for suspicious activity. Ensure compliance with regulatory requirements (e.g., GDPR, HIPAA, PCI DSS). Develop and implement compliance frameworks for infrastructure asset management. Conduct regular audits of asset management processes and documentation. Monitor changes in regulations and standards and update compliance procedures accordingly Investigate and resolve compliance issues and incidents. Maintain accurate records of compliance activities. Collaborate with internal teams and external auditors on compliance matters. Maintain an accurate inventory of all infrastructure assets (hardware, software, licenses) Leverage industry proven tools to identify and reduce Cyber Risks Assist in Crisis Management, Ransomware Recovery and Business Continuity planning. Identify, investigate and resolve global security breaches / incidents Develop and maintain network and infrastructure security reporting dashboards and scorecards used to measure our Cyber Practice. What We’re Looking For... You are passionate about network security and automation as a career. You are self-driven and motivated, with good communication and analytical skills. You’re a sought-after team member that thrives in a dynamic work environment. You will be working with multiple partners from the business groups, so networking and managing effective working relationships should be your top most priority. You have an understanding of industry trends in all areas of Information Security. You'll Need To Have Bachelor’s degree or four or more years of work experience. Four or more of relevant work experience. Four or more years of experience in network / information security, risk and compliance management. Understanding of network fundamentals, switching, routing protocols, load balancers, web proxies, firewalls and software defined networking solutions. Experience in handling enterprise scale server infrastructure & management Knowledge of Cloud infrastructure and technologies Excellent analytical and problem-solving skills. Ability to manage multiple tasks and priorities in a fast-paced environment Understanding of security fundamentals Confidentiality, Integrity, Availability, access control, Authentication, Authorization, Auditing secure design concepts like Experience working on IT ticketing systems like JIRA, Service Now and ability to partner and collaborate with other teams in the organization Experience with hosting security awareness campaigns, gamification and bug bounty programs will be an added advantage Strong analytical problem solving, communication and interpersonal skills Passion to stay abreast with emerging technologies, network security trends, tools and techniques. Even better if you have one or more of the following: Masters or Bachelor’s degree in Computer Science / Information Technology Engineering Industry relevant security certifications Security+, OSCP, CEH, CISSP, GIAC, etc Strong expertise in at least one operating system Window or Linux. Cloud relevant certifications CCSP, CCSK If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above. Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics.

Posted 1 day ago

Apply

3.0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Linkedin logo

About Us: Barry-Wehmiller is a diversified global supplier of engineering consulting and manufacturing technology for the packaging, corrugating, sheeting and paper-converting industries. By blending people-centric leadership with disciplined operational strategies and purpose-driven growth, Barry-Wehmiller has become a $3 billion organization with nearly 12,000 team members united by a common belief: to use the power of business to build a better world. Job Description: Position Description: The Enterprise IT Service Desk Workstation Vulnerability Analyst’s role is to help secure the company’s workstations against vulnerabilities. This will be done through analyzing scan data, researching vulnerabilities, and providing mitigation for said vulnerabilities within SLA timelines. Additionally, deployment of mitigations may be required. The Workstation Vulnerability Analyst will also need to present findings to IT leadership. Principal Duties and Responsibilities (Essential Functions): Analyze the results of vulnerability scans Understand business criticality of various systems Prioritize work based on risk Complete work within deadlines Assist in identifying and assessing vulnerabilities in the organization's systems, networks, and applications. Support the development and implementation of remediation plans to address identified vulnerabilities. Participate in regular vulnerability assessments and penetration tests to identify new security risks. Monitor security alerts and incidents and assist in determining the impact and necessary response. Assist with rollback if necessary Document and report on remediation activities, including progress and outcomes. Investigate and remediate malfunctioning security agents Function and communicate in a global support team. Analyze root cause and implement corrective solutions. Collaborate with IT, security, and development teams to ensure timely and effective remediation. When necessary, contact third-party software and PC equipment vendors. Maintain knowledge of current IT trends and advancements. Stay informed about the latest security threats, vulnerabilities, and mitigation techniques. Provide support to other teams on vulnerability management best practices. Full time – Five days a week - In the office position Potential for evening and weekend hours. Job Specifications: Proven analytical and problem-solving abilities. Ability to effectively prioritize and execute tasks in a fast-paced environment. Ability to shift between tasks as priorities change Strong written and oral communication skills. Strong troubleshooting skills and knowledge of IT hardware and software. Ability to conduct research into software issues and products as required. Strong organizational skills with keen attention to detail. Basic understanding of security principles, protocols, and technologies. Familiarity with vulnerability assessment tools (e.g., Nessus/Tenable, Qualys, OpenVAS) is a plus. Required Education and Experience: An associate degree in the field of computer science or management information systems, and/or 3-5 years of related work experience is preferred. 1-3 years of vulnerability remediation preferred; experience with patch management and scripting is a plus. Experience working in a team-oriented, collaborative environment. Relevant certifications (e.g., CompTIA Security+, CEH) are a plus but not required. Supervisory/Responsibility: Individual contributor w/no direct reports Work Environment: This is an office position. Position Type: This is a regular, full-time position with frequent overtime. Must be able, available, and willing to work more than 40 hours per week, including scheduled and unscheduled overtime. Travel: Travel could be up to 15% (in country) as needed for remote support. Physical Demands: The physical demands described here are representative of those performed in the job duties. The employee sits at a desk and uses a computer for prolonged periods of time. Performing the role frequently uses close vision, speech, hearing, and dexterity to operate office equipment. The employee must occasionally lift and/or move up to 15 pounds. At Barry-Wehmiller we recognize that people come with a wealth of experience and talent beyond just the technical requirements of a job. If your experience is close to what you see listed here, please still consider applying. We know that our differences often can bring about innovation, excellence and meaningful work—therefore, people from all backgrounds are encouraged to apply to our positions. Please let us know if you require reasonable accommodations during the interview process. Company: BW Corporate US

Posted 1 day ago

Apply

15.0 - 20.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Operations Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education\ Summary :As an L1 SOC Analyst you are the first line of defense in monitoring and triaging security alerts. You will work primarily with Sumo Logic SIEM and SOAR tools to identify potential security incidents, validate alerts, and escalate them according to the defined SOPs. You will ensure real-time visibility and log health while flagging suspicious activity promptly. This role is essential to ensuring timely detection and reducing noise from false positives Roles & Responsibilities:--Basic Security Knowledge:Understanding of key concepts (malware, phishing, brute force, etc.-SIEM Familiarity:Exposure to Sumo Logic UI and understanding how to read/query logs-Exposure to CrowdStrike Falcon Console:Ability to view and interpret endpoint alerts-Alert Triage:Ability to differentiate between false positives and real threats-Communication Skills: Clear written documentation and verbal escalation-Ticketing Systems:Familiarity with platforms like JIRA, ServiceNow, or similar-Basic understanding of cybersecurity fundamentals-Basic Scripting:Awareness of PowerShell or Python for log parsing-SOAR Exposure:Familiarity with automated triage workflows-Security Certifications:Security+, Microsoft SC-900, or similar certification-Operating System Basics:Windows and Linux process and file system awareness Professional & Technical Skills: -Monitor real-time alerts and dashboards in Sumo Logic SIEM-Perform initial triage on alerts and determine severity/priority-Escalate validated security incidents to L2 analysts per defined SOPs-Follow pre-defined SOAR playbooks to document or assist in response-Ensure alert enrichment fields are populated like host info, user details, etc.-Conduct basic log searches to support alert analysis-Perform daily health checks on log sources and ingestion pipelines-Maintain accurate ticket documentation for each alert handled-Participate in shift handovers and team sync-ups for awareness-SIEM:Basic log searching, correlation rule awareness-SOAR:Familiarity with playbook execution-Security Concepts:Basic understanding of malware, phishing, brute force-Tools:CrowdStrike EDR, Sumo Logic Additional Information:- The candidate should have minimum 2 years of experience in Security Information and Event Management (SIEM) Operations.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 day ago

Apply

15.0 - 20.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Operations Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an L1 SOC Analyst you are the first line of defense in monitoring and triaging security alerts. You will work primarily with Sumo Logic SIEM and SOAR tools to identify potential security incidents, validate alerts, and escalate them according to the defined SOPs. You will ensure real-time visibility and log health while flagging suspicious activity promptly. This role is essential to ensuring timely detection and reducing noise from false positives Roles & Responsibilities:--Basic Security Knowledge:Understanding of key concepts (malware, phishing, brute force, etc.-SIEM Familiarity:Exposure to Sumo Logic UI and understanding how to read/query logs-Exposure to CrowdStrike Falcon Console:Ability to view and interpret endpoint alerts-Alert Triage:Ability to differentiate between false positives and real threats-Communication Skills: Clear written documentation and verbal escalation-Ticketing Systems:Familiarity with platforms like JIRA, ServiceNow, or similar-Basic understanding of cybersecurity fundamentals-Basic Scripting:Awareness of PowerShell or Python for log parsing-SOAR Exposure:Familiarity with automated triage workflows-Security Certifications:Security+, Microsoft SC-900, or similar certification-Operating System Basics:Windows and Linux process and file system awareness Professional & Technical Skills: -Monitor real-time alerts and dashboards in Sumo Logic SIEM-Perform initial triage on alerts and determine severity/priority-Escalate validated security incidents to L2 analysts per defined SOPs-Follow pre-defined SOAR playbooks to document or assist in response-Ensure alert enrichment fields are populated like host info, user details, etc.-Conduct basic log searches to support alert analysis-Perform daily health checks on log sources and ingestion pipelines-Maintain accurate ticket documentation for each alert handled-Participate in shift handovers and team sync-ups for awareness-SIEM:Basic log searching, correlation rule awareness-SOAR:Familiarity with playbook execution-Security Concepts:Basic understanding of malware, phishing, brute force-Tools:CrowdStrike EDR, Sumo Logic Additional Information:- The candidate should have minimum 2 years of experience in Security Information and Event Management (SIEM) Operations.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 day ago

Apply

3.0 - 8.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Ping Identity Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are seeking a skilled and proactive CIAM PingOne Support Analyst to provide day-to-day operational support for our Customer Identity and Access Management (CIAM) platform, primarily focused on PingOne solutions (PingOne for Customers, PingOne MFA, PingOne DaVinci, etc.). The ideal candidate will ensure continuous availability, performance, and incident resolution aligned with business SLAs while supporting user onboarding, integrations, and platform health checks Roles & Responsibilities:- Provide L1/L2 daily run support for PingOne CIAM platform including user provisioning, authentication flows, and policy enforcement.-Monitor platform health and performance; respond to alerts and logs using integrated monitoring tools.- Troubleshoot and resolve incidents related to SSO, MFA, token exchanges, and directory syncs within defined SLAs.- Support application onboarding/integration with PingOne using OIDC, SAML, and SCIM standards.- Perform routine access reviews, audit log reviews, and user lifecycle management tasks.- Work closely with the engineering and IAM architecture teams to escalate issues, perform RCA, and implement permanent fixes.- Maintain and update runbooks, knowledge articles, and standard operating procedures (SOPs). -Collaborate with business and security stakeholders for operational change implementations and incident updates. -Participate in on-call support rotation, as applicable. Professional & Technical Skills: -Experience in IAM with a focus on CIAM platforms, preferably PingOne for Customers / Ping Identity SaaS solutions.- Strong working knowledge of SSO protocols (OIDC, OAuth 2.0, SAML) and identity federation concepts.-Experience with PingOne DaVinci, PingOne MFA, and Directory integrations (e.g., AD, PingDirectory, cloud directories).-Familiarity with API tools like Postman, API Gateway integrations, and basic scripting (Shell, Python, etc.) for automation and diagnostics.-Hands-on experience in incident management, service request handling, and daily health check routines- Understanding of CI/CD pipelines and experience in deploying configuration changes via DevOps processes is a plus.-Experience working in ITIL-based environments (Incident, Change, Problem Management--Ping Identity Certified Professional -PingOne or PingFederate- CompTIA Security+, Certified Identity and Access Manager (CIAM), or equivalent Additional Information:- The candidate should have minimum 3 years of experience in Ping Identity.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 day ago

Apply

3.0 - 8.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Data Encryption Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education:We are seeking a dedicated and detail-oriented Analyst to join our Identity and Access Management (IAM) team, supporting a major US-based client. The role focuses on Public Key Infrastructure (PKI) operations with additional responsibilities around Enterprise Key Management System (EKMS) and Identity governance tools. This is a hands-on operational role requiring support in a 24x7 environment, following a rotational shift model. Roles & Responsibilities:- Perform day-to-day operations of PKI services including certificate issuance, renewal, revocation, and monitoring.- Maintain and troubleshoot Certificate Authorities (CAs), Online Responders (OCSP), and Certificate Enrollment Web Services (CEP/CES).- Support integration and certificate management for enterprise applications, servers, network devices, and security appliances.- Execute and monitor certificate lifecycle management tasks and ensure compliance with security standards.- Troubleshoot SSL/TLS-related issues and assist with application-level binding of certificates (e.g., IIS, LDAPS, etc.).- Maintain service availability, perform routine health checks, and participate in DR/Resiliency testing.- Work closely with the IAM team on access control and authentication mechanisms where certificate-based auth is integrated.- Provide operational support for EKMS (Enterprise Key Management System) as an added advantage.- Follow ITIL processes for incident, change, and problem management.- Prepare and maintain SOPs, documentation, and runbooks for PKI and associated tools. Professional & Technical Skills: - Strong hands-on experience with Microsoft PKI, including Root and Subordinate CAs.- Experience in certificate lifecycle management for diverse enterprise environments.- Familiarity with Active Directory Certificate Services (ADCS).- Working knowledge of Online Responders, CEP/CES,NDES and Auto-Enrollment policies.- Knowledge on DigiCert certificates and management.- Good understanding of SSL/TLS protocols and digital certificates.- Basic scripting skills (PowerShell preferred) for automation of routine tasks.-IAM concepts and experience with directory services (Active Directory, Entra ID/Azure AD) is an added advantage.- Exposure to EKMS solutions (e.g., Thales, Venafi, or other HSM-integrated key management platforms) is a plus- Preferred Certifications:Microsoft certifications related to security or infrastructure.,CompTIA Security+, Certified PKI Professional (CPKI), or similar.,Azure Security, SC-300 or SC-900 (optional, for IAM). Additional Information:- The candidate should have minimum 3 years of experience.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 day ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What You’ll Be Doing... You'll be part of the "Verizon Global Infrastructure (VGI), Network & Information Security” group working on securing the network and infra devices, harden the operating systems, configurations and build use cases to automate these tasks. Protect against cyber threats within the VGS Technology organization. You will work with a team of cybersecurity engineers with network & infrastructure background, threat intelligence analysts to align common technologies and practices that fortify our applications, systems, IT network and infrastructure. Some of your daily responsibilities would be the following. Leverage industry proven tools to identify and reduce Cyber Risks Implement next generation network security architecture, create advanced policies and controls against future threats Ensure effectiveness and coverage of security, policies and controls of VGS Network & Infrastructure, prioritizing risk level. Ensure Security posture of VGS Network & Infrastructure, e.g., access management, vulnerabilities remediation, etc. Develop awareness, training & compliance programs focused on Network & Infrastructure Cyber Security practices. Coordinate activities like network, penetration testing, incident response, data collection etc by partnering with the CISO teams. Assist in Crisis Management, Ransomware Recovery and Business Continuity planning. Identify, investigate and resolve global security breaches / incidents Develop and maintain network and infrastructure security reporting dashboards and scorecards used to measure our Cyber Practice. Identify opportunities and use cases for automation to remediate vulnerabilities, implement controls, orchestrate between tools and automate security practices. What We’re Looking For... You are passionate about network security and automation as a career. You are self-driven and motivated, with good communication and analytical skills. You’re a sought-after team member that thrives in a dynamic work environment. You will be working with multiple partners from the business groups, so networking and managing effective working relationships should be your top most priority. You have an understanding of industry trends in all areas of Information Security. You'll Need To Have Bachelor’s degree or four or more years of work experience. Four or more years of relevant work experience. Four or more years of experience in network / information security, risk and compliance management. Understanding of network fundamentals, switching, routing protocols, load balancers, web proxies, firewalls and software defined networking solutions. Understanding of security fundamentals Confidentiality, Integrity, Availability, access control, Authentication, Authorization, Auditing secure design concepts like Experience in design and implementation of network security solutions like firewalls, intrusion detection and prevention systems, VPN, web proxies etc using vendor products like Cisco, Juniper, Checkpoint, Palo Alto etc Experience in managing public cloud infrastructure like AWS, Azure, GCP etc Experience working in any one of the SIEM / SOAR solutions like Splunk SOAR, Cortex XSOAR by Palo Alto Networks, IBM Security QRadar SOAR, Swimlane etc Experience working on IT ticketing systems like JIRA, Service Now and ability to partner and collaborate with other teams in the organization Experience with hosting security awareness campaigns, gamification and bug bounty programs will be an added advantage Strong analytical problem solving, communication and interpersonal skills Passion to stay abreast with emerging technologies, network security trends, tools and techniques. Even better if you have one or more of the following: Master’s degree in Computer Science / Information Technology Engineering. Industry relevant security certifications Security+, OSCP, CEH, CISSP, GIAC, etc Cloud relevant certifications CCSP, CCSK Strong expertise in at least one operating system Window or Linux. Strong Scripting expertise in any one of Python, R, Perl, Javascript, Powershell, bash, VBScript etc Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics.

Posted 1 day ago

Apply

2.0 years

0 Lacs

Navi Mumbai, Maharashtra, India

On-site

Linkedin logo

Job Role: Incident Management Job Location: Navi Mumbai Work Mode: Work from office Exp Level: 2 to 5 years Educational Qualification I. B.E / B. Tech in: a) Cyber Security Computer Science/Computer Science & Engineering b) Information Technology/ Software Engineering/ c) Electronics & Communications Engineering d) Or equivalent degree in relevant discipline II. MCA or BCA or M.Tech / M.Sc/ B.Sc in: a) Computer Science b) Information Technology c) Electronic & Communications Engineering Required Certification Mandatory (Any-one): - Certified SOC Analyst (EC- Council), Computer Hacking Forensic Investigator (EC- Council), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc. Key Roles & Responsibilities • Round the clock threat monitoring & detection • Analysis of any suspicious, malicious, and abnormal behavior. • Alert triage, Initial assessment, incident validation, its severity & urgency • Prioritization of security alerts and creating Incidents as per SOPs. • Reporting & escalation to stakeholders • Post-incident Analysis • Consistent incident triage & recommendations using playbooks. • Develop & maintain incident management and incident response policies and procedures. • Preservation of security alerts and security incidents artefacts for forensic purpose. • Adherence to Service Level Agreements (SLA) and KPIs. • Reduction in Mean Time to Detection and Response (MTTD & MTTR)

Posted 1 day ago

Apply

0.0 - 5.0 years

0 - 0 Lacs

Okhla, Delhi, Delhi

On-site

Indeed logo

Job Opening: Network Engineer Location: Okhla Phase 2, New Delhi Company: Growth India Employment Type: Full-Time Salary: ₹20,000 – ₹25,000/month About the Role Growth India is seeking a Network Engineer to design, manage, and support our IT infrastructure including LAN/WAN networks, Cisco devices, and Windows/Linux servers. Ideal candidates are CCNA-certified professionals with strong hands-on experience in networking and system administration. Key Responsibilities Design, implement, and manage LAN/WAN networks using Cisco equipment Configure routers, switches, firewalls, and VPNs Administer Windows & Linux servers (Active Directory, DNS, DHCP) Monitor and troubleshoot network/server performance Ensure network security and assist in upgrades/migrations Maintain documentation of systems and procedures Requirements CCNA Certification Bachelor’s degree in Computer Science, IT, or related field 2–5 years' experience in network/server administration Strong knowledge of TCP/IP, OSPF, VLANs, etc. Hands-on experience with Cisco hardware, virtualization, and cybersecurity Preferred Qualifications CCNP or other Cisco certifications Familiarity with scripting (PowerShell/Bash) Experience with cloud platforms (AWS, Azure), DR & backup solutions Additional certifications like Security+, ITIL, Network+ Perks & Benefits Exposure to modern enterprise technologies Supportive work culture with learning opportunities Career growth within a tech-driven team Job Type: Full-time Pay: ₹20,000.00 - ₹25,000.00 per month Schedule: Morning shift Supplemental Pay: Performance bonus Work Location: In person

Posted 1 day ago

Apply

3.0 years

0 Lacs

Hyderābād

On-site

GlassDoor logo

Location: Hyderabad, Telangana Time type: Full time Job level: Associate Job type: Regular Category: Risk Consulting ID: JR113489 About us We are the leading provider of professional services to the middle market globally, our purpose is to instill confidence in a world of change, empowering our clients and people to realize their full potential. Our exceptional people are the key to our unrivaled, inclusive culture and talent experience and our ability to be compelling to our clients. You’ll find an environment that inspires and empowers you to thrive both personally and professionally. There’s no one like you and that’s why there’s nowhere like RSM. We are seeking analyst level individuals with experience working in the field of cybersecurity and a desire to help organizations improve their operations to join our team and help run the ongoing security operations for RSM clients in a variety of industries and geographic locations. Successful candidates will have working knowledge in some or all these areas – IT operations, security monitoring, active directory, IP networking and various cloud technologies. Position and Key Responsibilities At RSM, analysts work with large and small companies in variety of industries. They develop strong working relationships with their peers within the security operations center (SOC) while learning their clients’ businesses and challenges facing their organizations. Analysts work as part of a broader team under the direction of more senior analysts, threat hunters, shift leads, intelligence analysts and SOC managers in support of multiple clients. Working in a mutually respectful team environment helps our analysts perform at their best and integrate their career with their personal life. You will have the opportunity to: Role Responsibilities: Investigate security incidents using SIEM tools, automation, and other cybersecurity technologies (i.e. ServiceNow, Stellar Cyber, Hyas Insight and DNS Protect, sentinel One, ELK Stack, Virus total, Shodan, NetFlow, Passive DNS, Silobreaker, Tenable.io, Hatching Triage Sandbox) Analyze, escalate, and assist in remediation of critical security incidents. Improve and challenge existing processes and procedures in a very agile and fast-paced information security environment serving multiple clients Process IDS alerts and identifying incidents and events in customer data. Setup and execution and analysis of vulnerability scans Perform advanced analysis and investigation into alerts as they are identified Performing initial basic malware analysis utilizing automated means (static and dynamic sandbox analysis or other available tools) Incident intake, ticket updates and reporting of cyber events and threat intelligence Understanding, identifying, and researching indicators of compromise (IOCs) from a variety of sources such as threat intelligence reports and feeds Writing incident reports, process documentation, and interact with clients as required Transcribe and implement atomic indicators into a monitoring environment. Consume policy documentation and determine applicability in a network. Work with protocols at layers 2 and higher in the OSI model, to include ARP TCP, UDP, ICMP, DNS, Telnet, SSH, HTTP, SSL, SNMP, SMTP, and other common protocols that use well-known ports. Develops the playbooks to respond and recovery from various attacks/incidents. Drives the automation efforts focused on the closing cases, responding to Cyber events and analyzing data required to enable efficient response activities. Processing of Cyber Threat Intel that is used across RSM detection platforms to understand and prepare for potential threats. Threat intel is heavily used across RSM platforms drive issue prioritization. Open to working shifts in a 24x7 operations environment. Qualifications and Experience: Minimum B.A. or B.S. degree or equivalent from an accredited university by the time employment commences or prior relevant military / law enforcement experience. Computer science, information technology, information systems management, or other similar degrees preferably with a focus on information security 3-5 years’ experience working in a security operations center, networking operations center or threat intelligence capacity. Possess at least one security industry certification such as CYSA+, Security+, CISSP, SANS GIAC (GSOC, GCIA, GMON, CGCDA) Knowledge of security standards and information security and compliance frameworks, controls, and best practices, including SSAE 16, SOC 2 and SOC3, OWASP Top 10, SANS, NIST Must have a naturally curious mindset and approach to solving problems. Basic understanding of cloud technologies and their operations Experience supporting various operating systems such as Windows/Linux Understanding of IP network protocols At RSM, we offer a competitive benefits and compensation package for all our people. We offer flexibility in your schedule, empowering you to balance life’s demands, while also maintaining your ability to serve clients. Learn more about our total rewards at https://rsmus.com/careers/india.html. RSM does not tolerate discrimination and/or harassment based on race; colour; creed; sincerely held religious beliefs, practices or observances; sex (including pregnancy or disabilities related to nursing); gender (including gender identity and/or gender expression); sexual orientation; HIV Status; national origin; ancestry; familial or marital status; age; physical or mental disability; citizenship; political affiliation; medical condition (including family and medical leave); domestic violence victim status; past, current or prospective service in the Indian Armed Forces; Indian Armed Forces Veterans, and Indian Armed Forces Personnel status; pre-disposing genetic characteristics or any other characteristic protected under applicable provincial employment legislation. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process and/or employment/partnership. RSM is committed to providing equal opportunity and reasonable accommodation for people with disabilities. If you require a reasonable accommodation to complete an application, interview, or otherwise participate in the recruiting process, please send us an email at careers@rsmus.com.

Posted 1 day ago

Apply

0 years

5 - 7 Lacs

Chennai

Remote

GlassDoor logo

Chennai, India Hyderabad, India Job ID: R-1070167 Apply prior to the end date: June 30th, 2025 When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What you’ll be doing... You'll be part of the "Verizon Global Infrastructure (VGI), Network & Information Security” group working to ensure that the network infrastructure devices are managed centrally, enterprise class asset management is built for complete asset coverage and visibility, sufficient access control is enabled and implement a process to follow the principle of least privilege. You will also work with a team of cybersecurity engineers to build use cases to automate and orchestrate access management across the enterprise. Some of your daily responsibilities would be the following: Develop and implement access management policies and procedures. Implement and maintain asset tracking systems. Conduct regular access reviews and audits. Identify and remediate access control deficiencies. Monitor access logs and alerts for suspicious activity. Ensure compliance with regulatory requirements (e.g., GDPR, HIPAA, PCI DSS). Develop and implement compliance frameworks for infrastructure asset management. Conduct regular audits of asset management processes and documentation. Monitor changes in regulations and standards and update compliance procedures accordingly Investigate and resolve compliance issues and incidents. Maintain accurate records of compliance activities. Collaborate with internal teams and external auditors on compliance matters. Maintain an accurate inventory of all infrastructure assets (hardware, software, licenses) Leverage industry proven tools to identify and reduce Cyber Risks Assist in Crisis Management, Ransomware Recovery and Business Continuity planning. Identify, investigate and resolve global security breaches / incidents Develop and maintain network and infrastructure security reporting dashboards and scorecards used to measure our Cyber Practice. What we’re looking for... You are passionate about network security and automation as a career. You are self-driven and motivated, with good communication and analytical skills. You’re a sought-after team member that thrives in a dynamic work environment. You will be working with multiple partners from the business groups, so networking and managing effective working relationships should be your top most priority. You have an understanding of industry trends in all areas of Information Security. You'll need to have: Bachelor’s degree or four or more years of work experience. Four or more of relevant work experience. Four or more years of experience in network / information security, risk and compliance management. Understanding of network fundamentals, switching, routing protocols, load balancers, web proxies, firewalls and software defined networking solutions. Experience in handling enterprise scale server infrastructure & management Knowledge of Cloud infrastructure and technologies Excellent analytical and problem-solving skills. Ability to manage multiple tasks and priorities in a fast-paced environment Understanding of security fundamentals Confidentiality, Integrity, Availability, access control, Authentication, Authorization, Auditing secure design concepts like Experience working on IT ticketing systems like JIRA, Service Now and ability to partner and collaborate with other teams in the organization Experience with hosting security awareness campaigns, gamification and bug bounty programs will be an added advantage Strong analytical problem solving, communication and interpersonal skills Passion to stay abreast with emerging technologies, network security trends, tools and techniques. Even better if you have one or more of the following: Masters or Bachelor’s degree in Computer Science / Information Technology Engineering Industry relevant security certifications Security+, OSCP, CEH, CISSP, GIAC, etc Strong expertise in at least one operating system Window or Linux. Cloud relevant certifications CCSP, CCSK If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above. Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. Apply Now Save Saved Open sharing options Share Related Jobs Security Consultant III-Network & Information Security Save Chennai, India, +1 other location Technology Security Consultant III-Network & Information Security Save Chennai, India, +1 other location Technology Director - Network & Information Security Save Chennai, India, +1 other location Technology Shaping the future. Connect with the best and brightest to help innovate and operate some of the world’s largest platforms and networks.

Posted 1 day ago

Apply

3.0 years

2 - 6 Lacs

Chennai

Remote

GlassDoor logo

About Us: Barry-Wehmiller is a diversified global supplier of engineering consulting and manufacturing technology for the packaging, corrugating, sheeting and paper-converting industries. By blending people-centric leadership with disciplined operational strategies and purpose-driven growth, Barry-Wehmiller has become a $3 billion organization with nearly 12,000 team members united by a common belief: to use the power of business to build a better world. Job Description: Position Description: The Enterprise IT Service Desk Workstation Vulnerability Analyst’s role is to help secure the company’s workstations against vulnerabilities. This will be done through analyzing scan data, researching vulnerabilities, and providing mitigation for said vulnerabilities within SLA timelines. Additionally, deployment of mitigations may be required. The Workstation Vulnerability Analyst will also need to present findings to IT leadership. Principal Duties and Responsibilities (Essential Functions): Analyze the results of vulnerability scans Understand business criticality of various systems Prioritize work based on risk Complete work within deadlines Assist in identifying and assessing vulnerabilities in the organization's systems, networks, and applications. Support the development and implementation of remediation plans to address identified vulnerabilities. Participate in regular vulnerability assessments and penetration tests to identify new security risks. Monitor security alerts and incidents and assist in determining the impact and necessary response. Assist with rollback if necessary Document and report on remediation activities, including progress and outcomes. Investigate and remediate malfunctioning security agents Function and communicate in a global support team. Analyze root cause and implement corrective solutions. Collaborate with IT, security, and development teams to ensure timely and effective remediation. When necessary, contact third-party software and PC equipment vendors. Maintain knowledge of current IT trends and advancements. Stay informed about the latest security threats, vulnerabilities, and mitigation techniques. Provide support to other teams on vulnerability management best practices. Full time – Five days a week - In the office position Potential for evening and weekend hours. Job Specifications: Proven analytical and problem-solving abilities. Ability to effectively prioritize and execute tasks in a fast-paced environment. Ability to shift between tasks as priorities change Strong written and oral communication skills. Strong troubleshooting skills and knowledge of IT hardware and software. Ability to conduct research into software issues and products as required. Strong organizational skills with keen attention to detail. Basic understanding of security principles, protocols, and technologies. Familiarity with vulnerability assessment tools (e.g., Nessus/Tenable, Qualys, OpenVAS) is a plus. Required Education and Experience: An associate degree in the field of computer science or management information systems, and/or 3-5 years of related work experience is preferred. 1-3 years of vulnerability remediation preferred; experience with patch management and scripting is a plus. Experience working in a team-oriented, collaborative environment. Relevant certifications (e.g., CompTIA Security+, CEH) are a plus but not required. Supervisory/Responsibility: Individual contributor w/no direct reports Work Environment: This is an office position. Position Type: This is a regular, full-time position with frequent overtime. Must be able, available, and willing to work more than 40 hours per week, including scheduled and unscheduled overtime. Travel: Travel could be up to 15% (in country) as needed for remote support. Physical Demands: The physical demands described here are representative of those performed in the job duties. The employee sits at a desk and uses a computer for prolonged periods of time. Performing the role frequently uses close vision, speech, hearing, and dexterity to operate office equipment. The employee must occasionally lift and/or move up to 15 pounds. At Barry-Wehmiller we recognize that people come with a wealth of experience and talent beyond just the technical requirements of a job. If your experience is close to what you see listed here, please still consider applying. We know that our differences often can bring about innovation, excellence and meaningful work—therefore, people from all backgrounds are encouraged to apply to our positions. Please let us know if you require reasonable accommodations during the interview process. Company: BW Corporate US

Posted 1 day ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What you’ll be doing... The Threat Management Center (TMC) serves as the initial point of defense for Verizon's networks and information systems, safeguarding them against internal misconduct and cyber-attacks. The TMC Advanced Cyber Defense (TMC-ACD) team is tasked with responding to, investigating, hunting and managing all incidents. Collectively, the teams strive to protect Verizon's brand reputation and revenue streams through proactive identification, response, and mitigation of potential threats that could adversely affect Verizon or its business partners. Responsibilities Performing day-to-day operations as a trusted advisor on advanced threat hunt for team Leading "hunt missions" using threat intelligence, data from multiple sources and results of brainstorming sessions to discover evidence of threats, insider misconduct, or anomalous behavior Utilizing advanced threat hunting techniques and tools to detect, analyze, and respond to anomalous activities. This includes Identifying threat actor groups and characterizing suspicious behaviors as well as being able to identify traits, C2, and develop network and host-based IOCs or IOAs. Finding evidence of threats or suspicious behavior, and leveraging data to improve controls and processes; this will require a blend of investigative, analytical, security, and technical skills to be successful. Evaluating and making recommendations on security tools and technologies needed to analyze potential threats to determine impact, scope, and recovery. Ensuring gaps in detections are socialized with Cyber Security stakeholders; this includes identifying dependencies, recommendations, and collaborating to mitigate threats. Reviewing outcomes of incident lessons learned, root cause analysis, and on-demand compliance audits to ensure repeatable and sustainable processes are established, followed or adjusted when necessary. Acting as subject matter expert in internal and external audit reviews. This includes producing and presenting artifacts and executive summaries to support the overall mission of the TMC. Participating in Purple Team, Threat Hunt, and tabletop exercises. Working closely with key cross-functional stakeholders to develop and utilize proactive and mitigating measures to prevent, detect and respond to potential threats to Verizon on prem and cloud environments. Presenting executive-level operational read-outs, metrics, and case reviews that accurately capture the effectiveness of the threat hunt team. This includes leveraging internal data, threat trends, and operational metrics to clearly communicate the Verizon landscape to senior executives, to include the Chief Information Security Officer. Developing and executing long-term and short-term strategic goals and ensuring proper updates are socialized to appropriate stakeholders. Mentoring and advising team members by educating them on advanced techniques to help drive the operational and strategic growth of the organization. Promoting an environment of collaboration and individual accountability when it comes to problem-solving, decision-making, and process improvements. Where you'll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. What we’re looking for… Verizon is looking for an innovative and driven leader who will be responsible for enhancing our existing threat defense capabilities and maturing our current processes within Verizon's unique security landscape. This threat hunter role will work in the TMC’s fast paced collaborative environment and is required to be adaptable, utilize both strategic and tactical techniques, and think creatively to effectively navigate the evolving threat landscape. This individual will take the initiative to identify and neutralize threats through proactive hunting and detection, improve incident response and mitigation strategies, and ensure continuous operations to safeguard Verizon from current and future cyber threats. The position will support threat hunting, digital forensics, and incident responder duties. You’ll Need To Have Bachelor's degree or six or more years of work experience Two or more years of experience in cybersecurity, with a focus on threat hunting, cloud security (AWS, GCP, Azure, OCI), and incident response Even better if you have one or more of the following: Demonstrated experience as a key member of a security operations team (SOC, Incident Response, Threat Intel, Malware Analysis, IDS/IPS Analysis, etc.) Comprehensive knowledge utilizing system, cloud, application and network logs. High-level understanding of Operating Systems: Windows, Unix/Linux, and OSX Operating Systems in support of identifying security incidents. Proficient knowledge of the cyber threat landscape including types of adversaries, campaigns, and the motivations that drive them. Experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents. Fundamental understanding of tactics, technologies, and procedures related to Cyber Crime, Malware, Botnets, Hacktivism, Social Engineering, APT or Insider Threat Knowledgeable with Regular Expressions, YARA and SIGMA rules, AQL and KQL type and at least one common scripting language (PERL, Python, Powershell) Knowledge on query structures like Strong understanding of cyber based adversarial frameworks including MITRE ATT&CK and Lockheed Martin’s Cyber Kill Chain. Certifications like: Network+, Security+, CISSP, CISM, GCIH, GCFA, GCFE, GREM and/or or cloud-specific certifications (ex: AWS Certified Security - Specialty, Microsoft Certified: Azure Security Engineer Associate, Google Cloud Certified Professional Cloud Security Engineer) If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above. #CISOIndia Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics.

Posted 1 day ago

Apply

6.0 - 11.0 years

8 - 14 Lacs

Hyderabad

Work from Office

Naukri logo

Experience 6+ Years Skill SIEM Notice Period Immediate Employment Type Contract Work Mode WFO/Hybrid 6 years of SIEM, or SOC experience Strong communication, written, and verbal skills Experience with writing/creation of formal documentation such as reports, slide decks, and architecture diagrams Customer service/support experience Ability to conduct in-depth forensic analytical studies and investigations Role Preferences Splunk certification Coding or scripting experience Strong knowledge of Unix/Linux Security+, GIAC, SSGB, ITIL, or similar certification Working knowledge of applicable industry controls such as NIST 800-536 or Mitre Attack Framework

Posted 1 day ago

Apply

5.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

Synopsis of the role - The Information Security Manager is responsible for developing, implementing, and maintaining the organization's overall information security strategy. This includes ensuring the confidentiality, integrity, and availability of all information assets. What You’ll Do Implement Security policies & Standard operating processes (SOPs) : Create/ review, and update information security policies and SOPs, procedures, and standards to ensure alignment with industry best practices and RBI regulatory requirements. Risk Management: Identify, assess, and mitigate information security risks to the organization's assets, data, and systems. Compliance: Ensure compliance with relevant laws, regulations, and industry standards, such as GDPR, NIST, PCI-DSS, and ISO 27001. Security Awareness: Develop and implement security awareness training programs for employees to promote a culture of security. Incident Response: Develop and manage incident response plans to ensure prompt and effective response to security incidents. Vulnerability Management: Implement vulnerability management processes to identify, classify, and remediate vulnerabilities in systems and applications. Security Architecture (Cloud and On Prime) : Design , review and implement secure architectures for systems, networks, and applications. Third-Party Risk Management: Assess and mitigate information security risks associated with third-party vendors and service providers. Budgeting and Resource Allocation: Manage the information security budget and allocate resources to ensure effective implementation of security measures. Reporting and Metrics: Provide regular reporting and Security metrics to stakeholders on information security performance and risk posture. Cloud Security Experience*: Experience with cloud security platforms and technologies. Programming Skills: Proficiency in programming languages such as Python, Java, or C++. Industry Certifications: Additional certifications such as CompTIA Security+, or ISO 27001 Lead Implementer. Operational & Reporting Tasks: Risk management: Identify, assess, and mitigate information security risks to the organization. Compliance: Ensure compliance with relevant laws, regulations, and industry standards. Budgeting: Manage the information security budget and allocate resources. Stakeholder Management: Communicate information security risks and mitigation strategies to stakeholders. Project Management: Manage information security projects, including project planning, execution, and delivery. Vendor Management: Manage relationships with information security vendors and service providers. Security Metrics: Develop and report security metrics to stakeholders. Compliance Reporting: Report on compliance with relevant laws, regulations, and industry standards. Risk Reporting: Report on information security risks and mitigation strategies. Incident Reporting: Report on security incidents and response activities. What Experience You Need Bachelor’s Degree or Engineering with Information security certification like ISO 27001, CCNA, ITIL foundation Minimum 13 to 15 yrs of Information security Information / Security audits experience/Technology administration /Project management etc. Education: Bachelor's degree in Computer Science or computer engineering, Information Security, or related field. Certifications: CISSP, CEH, CISM, or CISA certification preferred. Experience: Minimum 5 years of experience in information security, with at least 2 years in a management role. Skills: Strong knowledge of information security principles, risk management, and compliance. Excellent communication, leadership, and project management skills. Soft skills: Time management - Effective time management and prioritizing Collaboration - Ability to work & collaborate with cross functional teams Adaptability: Ability to adapt to changing security landscapes and professional environment. What Could Set You Apart People management skills Good Communication skill Passion to continuously learn and work to value add to the organization security environment Positive attitude

Posted 2 days ago

Apply

3.0 years

2 - 4 Lacs

Calcutta

On-site

GlassDoor logo

At Tedekstra (previously TDK Global), we help organizations define and implement a digital strategy that aligns with their business goals and objectives. We help implement solutions to optimise, transform and improvise business operations using our best practices. We take pride in our ability to bring flexibility, affordability and assurance in service. Tedekstra (previouslyTDK Global) has helped customers accelerate their digital journey by delivering value through technology enablers and skilled consultants. We work closely with our clients to understand their unique challenges and opportunities, and develop tailored solutions that drive real business value. About the Role: We are looking for a skilled and proactive IT Infrastructure & Networking Specialist to join our growing team. The ideal candidate will have solid experience in managing IT systems, networks, and cloud infrastructure with a strong grasp of Microsoft Office 365 and Windows environments. Familiarity with cybersecurity best practices will be considered a valuable asset. Key Responsibilities: IT Infrastructure Management: - Deploy, configure, and maintain on-premise and cloud-based infrastructure. - Ensure high availability and optimal performance of servers, systems, and network devices. - Troubleshoot and resolve hardware, software, and network issues. Network Administration:- Manage LAN/WAN, firewalls, switches, routers, VPNs, and wireless networks.- Monitor network performance and implement security measures to prevent unauthorized access. Microsoft Office 365 & Windows:- Administer Microsoft 365 (Exchange, Teams, SharePoint, OneDrive).- Provide support for Microsoft Windows Server and desktop environments.- Manage Active Directory, DNS, DHCP, and Group Policy. Cloud Technologies:- Support migration and maintenance of cloud services (preferably Azure, AWS, or Google Cloud).- Monitor and manage cloud storage, VMs, and backups. Cybersecurity (Optional but Preferred):- Assist in implementing security tools, firewalls, antivirus solutions, and patch management. - Support internal audits and compliance efforts related to IT security.- Respond to and investigate security incidents. Documentation & Support: - Maintain accurate documentation of network and infrastructure setups. - Provide Level 2/3 support for end-users. - Collaborate with vendors and service providers for technical support and procurement. Key Skills and Qualifications:- Bachelor's degree in IT, Computer Science, or related field. - 3-4 years of hands-on experience in IT infrastructure and networking roles. - Proficiency in Microsoft Office 365 administration. - Strong experience with Microsoft Windows Server and Windows OS. - Exposure to cloud platforms (Azure preferred). - Understanding of networking protocols and hardware (TCP/IP, DNS, DHCP, VLANs, etc.). - Basic understanding of cybersecurity principles (certifications like CompTIA Security+, Microsoft SC-900, or similar is a plus). - Excellent troubleshooting and problem-solving skills. - Good communication and documentation abilities. Preferred Certifications (Not Mandatory): - Microsoft Certified: Azure Administrator Associate / Microsoft 365 Admin - CompTIA Network+ / Security+ - Cisco CCNA - ITIL Foundation Salary: As per industry standards Joining: Immediate / Within 30 days Job Types: Full-time, Permanent Pay: ₹203,462.81 - ₹476,772.08 per year Work Location: In person

Posted 2 days ago

Apply

Exploring Security+ Jobs in India

Security+ is a highly sought-after certification in the IT industry, especially in the field of cybersecurity. In India, the demand for security+ professionals is on the rise as companies focus on enhancing their security measures to protect sensitive data and prevent cyber attacks. Job seekers with security+ certification have a competitive edge in the job market and can explore various opportunities in this field.

Top Hiring Locations in India

  1. Bangalore
  2. Pune
  3. Hyderabad
  4. Mumbai
  5. Delhi

These cities are known for their thriving IT industries and offer numerous job opportunities for security+ professionals.

Average Salary Range

The average salary range for security+ professionals in India varies based on experience and expertise. Entry-level positions may offer salaries ranging from INR 3-5 lakhs per annum, while experienced professionals can earn upwards of INR 10-15 lakhs per annum.

Career Path

A typical career progression in the security+ field may include roles such as: - Junior Security Analyst - Security Consultant - Security Architect - Chief Information Security Officer

As professionals gain experience and expertise, they can move up the career ladder and take on more challenging and rewarding roles.

Related Skills

In addition to security+, professionals in this field are often expected to have skills in: - Network Security - Information Security Management - Penetration Testing - Risk Assessment - Incident Response

Having a combination of these skills can enhance job prospects and open up more opportunities in the cybersecurity domain.

Interview Questions

  • What is the difference between symmetric and asymmetric encryption? (medium)
  • Explain the concept of a firewall and its importance in network security. (basic)
  • How do you handle a security breach in an organization? (advanced)
  • What is the role of encryption in data security? (basic)
  • Can you explain the concept of zero-day vulnerability? (medium)
  • How would you secure a wireless network from potential threats? (medium)
  • Describe the steps involved in a security risk assessment. (advanced)
  • What are the common types of cyber attacks and how can they be prevented? (medium)
  • Explain the concept of multi-factor authentication. (basic)
  • How do you stay updated with the latest security trends and technologies? (basic)
  • What is the importance of regular security audits in an organization? (medium)
  • How would you respond to a ransomware attack on a company's systems? (advanced)
  • Can you explain the concept of a VPN and its role in securing network communications? (basic)
  • Describe the process of conducting a penetration test on a system. (medium)
  • How do you ensure compliance with data protection regulations such as GDPR? (advanced)
  • What is the role of a Security Information and Event Management (SIEM) system in cybersecurity? (medium)
  • How would you secure an IoT (Internet of Things) device from potential security threats? (medium)
  • Explain the concept of social engineering in the context of cybersecurity. (basic)
  • What are the key elements of a cybersecurity policy for an organization? (basic)
  • How do you prioritize security vulnerabilities for remediation in a large-scale network? (advanced)
  • Can you explain the difference between white-box and black-box testing in security assessments? (medium)
  • Describe a recent security project you worked on and the challenges you faced. (advanced)
  • How would you educate employees in an organization about the importance of cybersecurity? (basic)
  • What steps would you take to secure a cloud-based infrastructure from cyber threats? (medium)
  • How do you handle sensitive data securely in a remote work environment? (basic)

Closing Remark

As you explore job opportunities in the security+ domain in India, remember to showcase your skills, knowledge, and experience confidently during interviews. Prepare well, stay updated with the latest trends in cybersecurity, and showcase your passion for securing digital assets. With dedication and perseverance, you can build a successful career in the dynamic field of cybersecurity. Good luck with your job search!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies