Home
Jobs

691 Security+ Jobs - Page 2

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

0.0 - 5.0 years

0 - 0 Lacs

Okhla, Delhi, Delhi

On-site

Indeed logo

Job Opening: Network Engineer Location: Okhla Phase 2, New Delhi Company: Growth India Employment Type: Full-Time Salary: ₹20,000 – ₹25,000/month About the Role Growth India is seeking a Network Engineer to design, manage, and support our IT infrastructure including LAN/WAN networks, Cisco devices, and Windows/Linux servers. Ideal candidates are CCNA-certified professionals with strong hands-on experience in networking and system administration. Key Responsibilities Design, implement, and manage LAN/WAN networks using Cisco equipment Configure routers, switches, firewalls, and VPNs Administer Windows & Linux servers (Active Directory, DNS, DHCP) Monitor and troubleshoot network/server performance Ensure network security and assist in upgrades/migrations Maintain documentation of systems and procedures Requirements CCNA Certification Bachelor’s degree in Computer Science, IT, or related field 2–5 years' experience in network/server administration Strong knowledge of TCP/IP, OSPF, VLANs, etc. Hands-on experience with Cisco hardware, virtualization, and cybersecurity Preferred Qualifications CCNP or other Cisco certifications Familiarity with scripting (PowerShell/Bash) Experience with cloud platforms (AWS, Azure), DR & backup solutions Additional certifications like Security+, ITIL, Network+ Perks & Benefits Exposure to modern enterprise technologies Supportive work culture with learning opportunities Career growth within a tech-driven team Job Type: Full-time Pay: ₹20,000.00 - ₹25,000.00 per month Schedule: Morning shift Supplemental Pay: Performance bonus Work Location: In person

Posted 2 days ago

Apply

3.0 years

0 Lacs

Hyderābād

On-site

GlassDoor logo

Location: Hyderabad, Telangana Time type: Full time Job level: Associate Job type: Regular Category: Risk Consulting ID: JR113489 About us We are the leading provider of professional services to the middle market globally, our purpose is to instill confidence in a world of change, empowering our clients and people to realize their full potential. Our exceptional people are the key to our unrivaled, inclusive culture and talent experience and our ability to be compelling to our clients. You’ll find an environment that inspires and empowers you to thrive both personally and professionally. There’s no one like you and that’s why there’s nowhere like RSM. We are seeking analyst level individuals with experience working in the field of cybersecurity and a desire to help organizations improve their operations to join our team and help run the ongoing security operations for RSM clients in a variety of industries and geographic locations. Successful candidates will have working knowledge in some or all these areas – IT operations, security monitoring, active directory, IP networking and various cloud technologies. Position and Key Responsibilities At RSM, analysts work with large and small companies in variety of industries. They develop strong working relationships with their peers within the security operations center (SOC) while learning their clients’ businesses and challenges facing their organizations. Analysts work as part of a broader team under the direction of more senior analysts, threat hunters, shift leads, intelligence analysts and SOC managers in support of multiple clients. Working in a mutually respectful team environment helps our analysts perform at their best and integrate their career with their personal life. You will have the opportunity to: Role Responsibilities: Investigate security incidents using SIEM tools, automation, and other cybersecurity technologies (i.e. ServiceNow, Stellar Cyber, Hyas Insight and DNS Protect, sentinel One, ELK Stack, Virus total, Shodan, NetFlow, Passive DNS, Silobreaker, Tenable.io, Hatching Triage Sandbox) Analyze, escalate, and assist in remediation of critical security incidents. Improve and challenge existing processes and procedures in a very agile and fast-paced information security environment serving multiple clients Process IDS alerts and identifying incidents and events in customer data. Setup and execution and analysis of vulnerability scans Perform advanced analysis and investigation into alerts as they are identified Performing initial basic malware analysis utilizing automated means (static and dynamic sandbox analysis or other available tools) Incident intake, ticket updates and reporting of cyber events and threat intelligence Understanding, identifying, and researching indicators of compromise (IOCs) from a variety of sources such as threat intelligence reports and feeds Writing incident reports, process documentation, and interact with clients as required Transcribe and implement atomic indicators into a monitoring environment. Consume policy documentation and determine applicability in a network. Work with protocols at layers 2 and higher in the OSI model, to include ARP TCP, UDP, ICMP, DNS, Telnet, SSH, HTTP, SSL, SNMP, SMTP, and other common protocols that use well-known ports. Develops the playbooks to respond and recovery from various attacks/incidents. Drives the automation efforts focused on the closing cases, responding to Cyber events and analyzing data required to enable efficient response activities. Processing of Cyber Threat Intel that is used across RSM detection platforms to understand and prepare for potential threats. Threat intel is heavily used across RSM platforms drive issue prioritization. Open to working shifts in a 24x7 operations environment. Qualifications and Experience: Minimum B.A. or B.S. degree or equivalent from an accredited university by the time employment commences or prior relevant military / law enforcement experience. Computer science, information technology, information systems management, or other similar degrees preferably with a focus on information security 3-5 years’ experience working in a security operations center, networking operations center or threat intelligence capacity. Possess at least one security industry certification such as CYSA+, Security+, CISSP, SANS GIAC (GSOC, GCIA, GMON, CGCDA) Knowledge of security standards and information security and compliance frameworks, controls, and best practices, including SSAE 16, SOC 2 and SOC3, OWASP Top 10, SANS, NIST Must have a naturally curious mindset and approach to solving problems. Basic understanding of cloud technologies and their operations Experience supporting various operating systems such as Windows/Linux Understanding of IP network protocols At RSM, we offer a competitive benefits and compensation package for all our people. We offer flexibility in your schedule, empowering you to balance life’s demands, while also maintaining your ability to serve clients. Learn more about our total rewards at https://rsmus.com/careers/india.html. RSM does not tolerate discrimination and/or harassment based on race; colour; creed; sincerely held religious beliefs, practices or observances; sex (including pregnancy or disabilities related to nursing); gender (including gender identity and/or gender expression); sexual orientation; HIV Status; national origin; ancestry; familial or marital status; age; physical or mental disability; citizenship; political affiliation; medical condition (including family and medical leave); domestic violence victim status; past, current or prospective service in the Indian Armed Forces; Indian Armed Forces Veterans, and Indian Armed Forces Personnel status; pre-disposing genetic characteristics or any other characteristic protected under applicable provincial employment legislation. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process and/or employment/partnership. RSM is committed to providing equal opportunity and reasonable accommodation for people with disabilities. If you require a reasonable accommodation to complete an application, interview, or otherwise participate in the recruiting process, please send us an email at careers@rsmus.com.

Posted 2 days ago

Apply

0 years

5 - 7 Lacs

Chennai

Remote

GlassDoor logo

Chennai, India Hyderabad, India Job ID: R-1070167 Apply prior to the end date: June 30th, 2025 When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What you’ll be doing... You'll be part of the "Verizon Global Infrastructure (VGI), Network & Information Security” group working to ensure that the network infrastructure devices are managed centrally, enterprise class asset management is built for complete asset coverage and visibility, sufficient access control is enabled and implement a process to follow the principle of least privilege. You will also work with a team of cybersecurity engineers to build use cases to automate and orchestrate access management across the enterprise. Some of your daily responsibilities would be the following: Develop and implement access management policies and procedures. Implement and maintain asset tracking systems. Conduct regular access reviews and audits. Identify and remediate access control deficiencies. Monitor access logs and alerts for suspicious activity. Ensure compliance with regulatory requirements (e.g., GDPR, HIPAA, PCI DSS). Develop and implement compliance frameworks for infrastructure asset management. Conduct regular audits of asset management processes and documentation. Monitor changes in regulations and standards and update compliance procedures accordingly Investigate and resolve compliance issues and incidents. Maintain accurate records of compliance activities. Collaborate with internal teams and external auditors on compliance matters. Maintain an accurate inventory of all infrastructure assets (hardware, software, licenses) Leverage industry proven tools to identify and reduce Cyber Risks Assist in Crisis Management, Ransomware Recovery and Business Continuity planning. Identify, investigate and resolve global security breaches / incidents Develop and maintain network and infrastructure security reporting dashboards and scorecards used to measure our Cyber Practice. What we’re looking for... You are passionate about network security and automation as a career. You are self-driven and motivated, with good communication and analytical skills. You’re a sought-after team member that thrives in a dynamic work environment. You will be working with multiple partners from the business groups, so networking and managing effective working relationships should be your top most priority. You have an understanding of industry trends in all areas of Information Security. You'll need to have: Bachelor’s degree or four or more years of work experience. Four or more of relevant work experience. Four or more years of experience in network / information security, risk and compliance management. Understanding of network fundamentals, switching, routing protocols, load balancers, web proxies, firewalls and software defined networking solutions. Experience in handling enterprise scale server infrastructure & management Knowledge of Cloud infrastructure and technologies Excellent analytical and problem-solving skills. Ability to manage multiple tasks and priorities in a fast-paced environment Understanding of security fundamentals Confidentiality, Integrity, Availability, access control, Authentication, Authorization, Auditing secure design concepts like Experience working on IT ticketing systems like JIRA, Service Now and ability to partner and collaborate with other teams in the organization Experience with hosting security awareness campaigns, gamification and bug bounty programs will be an added advantage Strong analytical problem solving, communication and interpersonal skills Passion to stay abreast with emerging technologies, network security trends, tools and techniques. Even better if you have one or more of the following: Masters or Bachelor’s degree in Computer Science / Information Technology Engineering Industry relevant security certifications Security+, OSCP, CEH, CISSP, GIAC, etc Strong expertise in at least one operating system Window or Linux. Cloud relevant certifications CCSP, CCSK If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above. Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. Apply Now Save Saved Open sharing options Share Related Jobs Security Consultant III-Network & Information Security Save Chennai, India, +1 other location Technology Security Consultant III-Network & Information Security Save Chennai, India, +1 other location Technology Director - Network & Information Security Save Chennai, India, +1 other location Technology Shaping the future. Connect with the best and brightest to help innovate and operate some of the world’s largest platforms and networks.

Posted 2 days ago

Apply

3.0 years

2 - 6 Lacs

Chennai

Remote

GlassDoor logo

About Us: Barry-Wehmiller is a diversified global supplier of engineering consulting and manufacturing technology for the packaging, corrugating, sheeting and paper-converting industries. By blending people-centric leadership with disciplined operational strategies and purpose-driven growth, Barry-Wehmiller has become a $3 billion organization with nearly 12,000 team members united by a common belief: to use the power of business to build a better world. Job Description: Position Description: The Enterprise IT Service Desk Workstation Vulnerability Analyst’s role is to help secure the company’s workstations against vulnerabilities. This will be done through analyzing scan data, researching vulnerabilities, and providing mitigation for said vulnerabilities within SLA timelines. Additionally, deployment of mitigations may be required. The Workstation Vulnerability Analyst will also need to present findings to IT leadership. Principal Duties and Responsibilities (Essential Functions): Analyze the results of vulnerability scans Understand business criticality of various systems Prioritize work based on risk Complete work within deadlines Assist in identifying and assessing vulnerabilities in the organization's systems, networks, and applications. Support the development and implementation of remediation plans to address identified vulnerabilities. Participate in regular vulnerability assessments and penetration tests to identify new security risks. Monitor security alerts and incidents and assist in determining the impact and necessary response. Assist with rollback if necessary Document and report on remediation activities, including progress and outcomes. Investigate and remediate malfunctioning security agents Function and communicate in a global support team. Analyze root cause and implement corrective solutions. Collaborate with IT, security, and development teams to ensure timely and effective remediation. When necessary, contact third-party software and PC equipment vendors. Maintain knowledge of current IT trends and advancements. Stay informed about the latest security threats, vulnerabilities, and mitigation techniques. Provide support to other teams on vulnerability management best practices. Full time – Five days a week - In the office position Potential for evening and weekend hours. Job Specifications: Proven analytical and problem-solving abilities. Ability to effectively prioritize and execute tasks in a fast-paced environment. Ability to shift between tasks as priorities change Strong written and oral communication skills. Strong troubleshooting skills and knowledge of IT hardware and software. Ability to conduct research into software issues and products as required. Strong organizational skills with keen attention to detail. Basic understanding of security principles, protocols, and technologies. Familiarity with vulnerability assessment tools (e.g., Nessus/Tenable, Qualys, OpenVAS) is a plus. Required Education and Experience: An associate degree in the field of computer science or management information systems, and/or 3-5 years of related work experience is preferred. 1-3 years of vulnerability remediation preferred; experience with patch management and scripting is a plus. Experience working in a team-oriented, collaborative environment. Relevant certifications (e.g., CompTIA Security+, CEH) are a plus but not required. Supervisory/Responsibility: Individual contributor w/no direct reports Work Environment: This is an office position. Position Type: This is a regular, full-time position with frequent overtime. Must be able, available, and willing to work more than 40 hours per week, including scheduled and unscheduled overtime. Travel: Travel could be up to 15% (in country) as needed for remote support. Physical Demands: The physical demands described here are representative of those performed in the job duties. The employee sits at a desk and uses a computer for prolonged periods of time. Performing the role frequently uses close vision, speech, hearing, and dexterity to operate office equipment. The employee must occasionally lift and/or move up to 15 pounds. At Barry-Wehmiller we recognize that people come with a wealth of experience and talent beyond just the technical requirements of a job. If your experience is close to what you see listed here, please still consider applying. We know that our differences often can bring about innovation, excellence and meaningful work—therefore, people from all backgrounds are encouraged to apply to our positions. Please let us know if you require reasonable accommodations during the interview process. Company: BW Corporate US

Posted 2 days ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What you’ll be doing... The Threat Management Center (TMC) serves as the initial point of defense for Verizon's networks and information systems, safeguarding them against internal misconduct and cyber-attacks. The TMC Advanced Cyber Defense (TMC-ACD) team is tasked with responding to, investigating, hunting and managing all incidents. Collectively, the teams strive to protect Verizon's brand reputation and revenue streams through proactive identification, response, and mitigation of potential threats that could adversely affect Verizon or its business partners. Responsibilities Performing day-to-day operations as a trusted advisor on advanced threat hunt for team Leading "hunt missions" using threat intelligence, data from multiple sources and results of brainstorming sessions to discover evidence of threats, insider misconduct, or anomalous behavior Utilizing advanced threat hunting techniques and tools to detect, analyze, and respond to anomalous activities. This includes Identifying threat actor groups and characterizing suspicious behaviors as well as being able to identify traits, C2, and develop network and host-based IOCs or IOAs. Finding evidence of threats or suspicious behavior, and leveraging data to improve controls and processes; this will require a blend of investigative, analytical, security, and technical skills to be successful. Evaluating and making recommendations on security tools and technologies needed to analyze potential threats to determine impact, scope, and recovery. Ensuring gaps in detections are socialized with Cyber Security stakeholders; this includes identifying dependencies, recommendations, and collaborating to mitigate threats. Reviewing outcomes of incident lessons learned, root cause analysis, and on-demand compliance audits to ensure repeatable and sustainable processes are established, followed or adjusted when necessary. Acting as subject matter expert in internal and external audit reviews. This includes producing and presenting artifacts and executive summaries to support the overall mission of the TMC. Participating in Purple Team, Threat Hunt, and tabletop exercises. Working closely with key cross-functional stakeholders to develop and utilize proactive and mitigating measures to prevent, detect and respond to potential threats to Verizon on prem and cloud environments. Presenting executive-level operational read-outs, metrics, and case reviews that accurately capture the effectiveness of the threat hunt team. This includes leveraging internal data, threat trends, and operational metrics to clearly communicate the Verizon landscape to senior executives, to include the Chief Information Security Officer. Developing and executing long-term and short-term strategic goals and ensuring proper updates are socialized to appropriate stakeholders. Mentoring and advising team members by educating them on advanced techniques to help drive the operational and strategic growth of the organization. Promoting an environment of collaboration and individual accountability when it comes to problem-solving, decision-making, and process improvements. Where you'll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. What we’re looking for… Verizon is looking for an innovative and driven leader who will be responsible for enhancing our existing threat defense capabilities and maturing our current processes within Verizon's unique security landscape. This threat hunter role will work in the TMC’s fast paced collaborative environment and is required to be adaptable, utilize both strategic and tactical techniques, and think creatively to effectively navigate the evolving threat landscape. This individual will take the initiative to identify and neutralize threats through proactive hunting and detection, improve incident response and mitigation strategies, and ensure continuous operations to safeguard Verizon from current and future cyber threats. The position will support threat hunting, digital forensics, and incident responder duties. You’ll Need To Have Bachelor's degree or six or more years of work experience Two or more years of experience in cybersecurity, with a focus on threat hunting, cloud security (AWS, GCP, Azure, OCI), and incident response Even better if you have one or more of the following: Demonstrated experience as a key member of a security operations team (SOC, Incident Response, Threat Intel, Malware Analysis, IDS/IPS Analysis, etc.) Comprehensive knowledge utilizing system, cloud, application and network logs. High-level understanding of Operating Systems: Windows, Unix/Linux, and OSX Operating Systems in support of identifying security incidents. Proficient knowledge of the cyber threat landscape including types of adversaries, campaigns, and the motivations that drive them. Experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents. Fundamental understanding of tactics, technologies, and procedures related to Cyber Crime, Malware, Botnets, Hacktivism, Social Engineering, APT or Insider Threat Knowledgeable with Regular Expressions, YARA and SIGMA rules, AQL and KQL type and at least one common scripting language (PERL, Python, Powershell) Knowledge on query structures like Strong understanding of cyber based adversarial frameworks including MITRE ATT&CK and Lockheed Martin’s Cyber Kill Chain. Certifications like: Network+, Security+, CISSP, CISM, GCIH, GCFA, GCFE, GREM and/or or cloud-specific certifications (ex: AWS Certified Security - Specialty, Microsoft Certified: Azure Security Engineer Associate, Google Cloud Certified Professional Cloud Security Engineer) If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above. #CISOIndia Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics.

Posted 2 days ago

Apply

6.0 - 11.0 years

8 - 14 Lacs

Hyderabad

Work from Office

Naukri logo

Experience 6+ Years Skill SIEM Notice Period Immediate Employment Type Contract Work Mode WFO/Hybrid 6 years of SIEM, or SOC experience Strong communication, written, and verbal skills Experience with writing/creation of formal documentation such as reports, slide decks, and architecture diagrams Customer service/support experience Ability to conduct in-depth forensic analytical studies and investigations Role Preferences Splunk certification Coding or scripting experience Strong knowledge of Unix/Linux Security+, GIAC, SSGB, ITIL, or similar certification Working knowledge of applicable industry controls such as NIST 800-536 or Mitre Attack Framework

Posted 3 days ago

Apply

5.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

Synopsis of the role - The Information Security Manager is responsible for developing, implementing, and maintaining the organization's overall information security strategy. This includes ensuring the confidentiality, integrity, and availability of all information assets. What You’ll Do Implement Security policies & Standard operating processes (SOPs) : Create/ review, and update information security policies and SOPs, procedures, and standards to ensure alignment with industry best practices and RBI regulatory requirements. Risk Management: Identify, assess, and mitigate information security risks to the organization's assets, data, and systems. Compliance: Ensure compliance with relevant laws, regulations, and industry standards, such as GDPR, NIST, PCI-DSS, and ISO 27001. Security Awareness: Develop and implement security awareness training programs for employees to promote a culture of security. Incident Response: Develop and manage incident response plans to ensure prompt and effective response to security incidents. Vulnerability Management: Implement vulnerability management processes to identify, classify, and remediate vulnerabilities in systems and applications. Security Architecture (Cloud and On Prime) : Design , review and implement secure architectures for systems, networks, and applications. Third-Party Risk Management: Assess and mitigate information security risks associated with third-party vendors and service providers. Budgeting and Resource Allocation: Manage the information security budget and allocate resources to ensure effective implementation of security measures. Reporting and Metrics: Provide regular reporting and Security metrics to stakeholders on information security performance and risk posture. Cloud Security Experience*: Experience with cloud security platforms and technologies. Programming Skills: Proficiency in programming languages such as Python, Java, or C++. Industry Certifications: Additional certifications such as CompTIA Security+, or ISO 27001 Lead Implementer. Operational & Reporting Tasks: Risk management: Identify, assess, and mitigate information security risks to the organization. Compliance: Ensure compliance with relevant laws, regulations, and industry standards. Budgeting: Manage the information security budget and allocate resources. Stakeholder Management: Communicate information security risks and mitigation strategies to stakeholders. Project Management: Manage information security projects, including project planning, execution, and delivery. Vendor Management: Manage relationships with information security vendors and service providers. Security Metrics: Develop and report security metrics to stakeholders. Compliance Reporting: Report on compliance with relevant laws, regulations, and industry standards. Risk Reporting: Report on information security risks and mitigation strategies. Incident Reporting: Report on security incidents and response activities. What Experience You Need Bachelor’s Degree or Engineering with Information security certification like ISO 27001, CCNA, ITIL foundation Minimum 13 to 15 yrs of Information security Information / Security audits experience/Technology administration /Project management etc. Education: Bachelor's degree in Computer Science or computer engineering, Information Security, or related field. Certifications: CISSP, CEH, CISM, or CISA certification preferred. Experience: Minimum 5 years of experience in information security, with at least 2 years in a management role. Skills: Strong knowledge of information security principles, risk management, and compliance. Excellent communication, leadership, and project management skills. Soft skills: Time management - Effective time management and prioritizing Collaboration - Ability to work & collaborate with cross functional teams Adaptability: Ability to adapt to changing security landscapes and professional environment. What Could Set You Apart People management skills Good Communication skill Passion to continuously learn and work to value add to the organization security environment Positive attitude

Posted 3 days ago

Apply

3.0 years

2 - 4 Lacs

Calcutta

On-site

GlassDoor logo

At Tedekstra (previously TDK Global), we help organizations define and implement a digital strategy that aligns with their business goals and objectives. We help implement solutions to optimise, transform and improvise business operations using our best practices. We take pride in our ability to bring flexibility, affordability and assurance in service. Tedekstra (previouslyTDK Global) has helped customers accelerate their digital journey by delivering value through technology enablers and skilled consultants. We work closely with our clients to understand their unique challenges and opportunities, and develop tailored solutions that drive real business value. About the Role: We are looking for a skilled and proactive IT Infrastructure & Networking Specialist to join our growing team. The ideal candidate will have solid experience in managing IT systems, networks, and cloud infrastructure with a strong grasp of Microsoft Office 365 and Windows environments. Familiarity with cybersecurity best practices will be considered a valuable asset. Key Responsibilities: IT Infrastructure Management: - Deploy, configure, and maintain on-premise and cloud-based infrastructure. - Ensure high availability and optimal performance of servers, systems, and network devices. - Troubleshoot and resolve hardware, software, and network issues. Network Administration:- Manage LAN/WAN, firewalls, switches, routers, VPNs, and wireless networks.- Monitor network performance and implement security measures to prevent unauthorized access. Microsoft Office 365 & Windows:- Administer Microsoft 365 (Exchange, Teams, SharePoint, OneDrive).- Provide support for Microsoft Windows Server and desktop environments.- Manage Active Directory, DNS, DHCP, and Group Policy. Cloud Technologies:- Support migration and maintenance of cloud services (preferably Azure, AWS, or Google Cloud).- Monitor and manage cloud storage, VMs, and backups. Cybersecurity (Optional but Preferred):- Assist in implementing security tools, firewalls, antivirus solutions, and patch management. - Support internal audits and compliance efforts related to IT security.- Respond to and investigate security incidents. Documentation & Support: - Maintain accurate documentation of network and infrastructure setups. - Provide Level 2/3 support for end-users. - Collaborate with vendors and service providers for technical support and procurement. Key Skills and Qualifications:- Bachelor's degree in IT, Computer Science, or related field. - 3-4 years of hands-on experience in IT infrastructure and networking roles. - Proficiency in Microsoft Office 365 administration. - Strong experience with Microsoft Windows Server and Windows OS. - Exposure to cloud platforms (Azure preferred). - Understanding of networking protocols and hardware (TCP/IP, DNS, DHCP, VLANs, etc.). - Basic understanding of cybersecurity principles (certifications like CompTIA Security+, Microsoft SC-900, or similar is a plus). - Excellent troubleshooting and problem-solving skills. - Good communication and documentation abilities. Preferred Certifications (Not Mandatory): - Microsoft Certified: Azure Administrator Associate / Microsoft 365 Admin - CompTIA Network+ / Security+ - Cisco CCNA - ITIL Foundation Salary: As per industry standards Joining: Immediate / Within 30 days Job Types: Full-time, Permanent Pay: ₹203,462.81 - ₹476,772.08 per year Work Location: In person

Posted 3 days ago

Apply

0.0 years

0 Lacs

Vadodara, Gujarat, India

On-site

Linkedin logo

Role Summary As a Junior IT Administrator you’ll help keep every laptop, cloud workload and SaaS tool running safely and smoothly. You’ll provision and secure devices, build and harden on-premises & cloud infrastructure, enforce access policies across apps like GitHub and Microsoft 365, and be the first line of support for ~20 plus engineers and business users. You’ll do all of this under the guidance of a seasoned IT Ops & Security lead who will mentor you on best-practice processes (ITIL/ DevSecOps) and modern zero-trust principles. Roles & Responsibility Endpoint & Asset Management Image, deploy, and decommission Windows/macOS/Linux laptops Maintain MDM policies (Intune) Track assets with CMDB/asset-tagging tools Infrastructure & Cloud Stand-up and patch VMware hosts, Windows/Linux VMs, network appliances Create and monitor Azure resources (future AWS) Automate regular backups and DR tests Identity & Access Provision SSO accounts via Azure AD/Okta Review and remediate excessive privileges (least-privilege, RBAC) Rotate and vault secrets via HashiCorp Vault/Bitwarden Security Operations Respond to Tier 1 alerts from systems and security tools Run monthly patch & vulnerability scans, document findings Support phishing-simulation and security-awareness programs Tooling & Dev Enablement Administer GitHub Enterprise repos, enforcing branch protection & CODEOWNERS Manage Jira/Confluence spaces, CI/CD runners, artifact registries IT Service Desk Resolve hardware/software tickets Maintain knowledge-based articles and onboarding playbooks Minimum Qualification Education: BCA/ bachelor’s in computer science, Information Technology, or related discipline (final-semester students with relevant internships welcome). Experience: 0-2 years in a helpdesk, sysadmin, or DevOps internship/role. Technical Foundations: Basic Windows/Linux CLI skills and networking fundamentals (TCP/IP, VLANs, DNS). Familiarity with at least one public cloud (AWS, Azure, or GCP). Understanding of authentication (OAuth, SAML, MFA) and source-control (Git). Good To Have Certifications: CompTIA A+, Network+, Security+; Microsoft AZ-900 (or AWS) Experience with infrastructure-as-code (Terraform, CloudFormation) or scripting (PowerShell, Bash, Python). Exposure/ understanding of security frameworks (CIS Benchmarks, ISO 27001) or ticketing tools (Jira Service Management, Fresh service). Knowledge of containerization (Docker/Kubernetes) basics.

Posted 3 days ago

Apply

15.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

We have new opportunity for the role "Project Manager" with our client. Interested candidates send me your CV to kirthika.r@lancesoft.com Title - Project Manager Location - Bangalore - onsite (WFO) Duration - 12+ months of contract Notice period - Immediate joiner preferred/ 30 days max Description: 📌Essential knowledge: ✅Have over 15+ years of rich experience in data protection, information security domain and Project Management. ✅Experience of managing enterprise Data Protection projects and of direct and in-direct relationship with senior and executive management. ✅Familiarity with advanced Data Privacy and Protection technologies, risk, threat and vulnerability assessments, and security measures. ✅ Strong experience and knowledge across the Data Protection and Information Security domains including technical measures, policy procedures, compliance management, risk management and Incident Response etc. ✅Extensive knowledge of data protection solutions and technologies for Data Loss and leakage Prevention (DLP). Experience implementing and managing (DLP) solutions. ✅Strong experience in Banking environment with strong understanding on key data protection regulations and standards such as ISO 27001, NIST CSF, GDPR etc. 📌 Other: ✅Sound knowledge of evolving advanced tech stacks and related control and risk universe from a data protection perspective. ✅Sound knowledge and expertise in conducting risk assessment and management. ✅The ideal candidate will have a degree in Information Security, Computer Science, or a related field. Professional certifications : CISSP, PMP, CCSP, CompTIA Security+, CIPT , CISM etc 📌 Relevant years of experience : 10-15 yrs 📌 Industry & Education background : Bachelor’s degree in computer science, Engineering, or a related field, or equivalent work experience.

Posted 4 days ago

Apply

0 years

0 Lacs

India

Remote

Linkedin logo

Company Description Thinkcloudly is a global IT learning platform dedicated to upskilling individuals to become IT professionals. The platform offers courses that focus on developing employment abilities and interview preparation skills in rapidly changing technology fields. Thinkcloudly's mission is to provide high-quality training to individuals looking to make a positive impact on the world through technology. Role Description This is a part-time remote role for a SOC Part Time Trainer at Thinkcloudly. The trainer will be responsible for delivering training sessions, preparing course materials, and supporting students in their learning journey. This role involves providing guidance and mentorship to students pursuing careers in IT security operations. Qualifications Experience in IT security operations Knowledge of SOC (Security Operations Center) procedures Strong communication and presentation skills Ability to create engaging and informative training materials Experience in conducting virtual training sessions Relevant certifications such as CompTIA Security+, CISSP, or CISM Experience working with diverse student populations Flexibility and adaptability to meet the needs of students

Posted 4 days ago

Apply

6.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Experience Required: - 6 to 8 Years Location:- Noida Role Overview- We are seeking a skilled and driven Sr. Security Engineer with a strong background in penetration testing (web, mobile, and network) and an understanding of security compliance standards such as SOC 2, ISO 27001, and GDPR. The ideal candidate will have hands-on experience identifying and exploiting vulnerabilities, preparing technical and compliance reports, and guiding clients or internal teams on remediation and governance. Key Responsibilities- • Conduct penetration testing of web applications, mobile apps (iOS/Android), and internal/external networks. • Perform vulnerability assessments and risk evaluations across client environments. • Create detailed technical and executive reports with prioritized remediation strategies. • Assist in SOC 2 readiness assessments, ISO 27001 implementation, and GDPR compliance checks. • Collaborate with cross-functional teams for remedial activities to improve the security posture. • Stay updated with the latest exploits, tools, and compliance updates. Required Qualifications- • 6-8 years of experience in cybersecurity with a focus on penetration testing and compliance. • Proficiency in tools like Burp Suite, Nmap, Metasploit, Nessus, MobSF, and manual testing techniques. • Strong knowledge of OWASP Top 10, secure coding practices, network protocols, and common attack vectors. • Understanding of SOC 2, ISO 27001, GDPR, and associated implementation or audit processes. Certifications (Preferred)- • CEH (Certified Ethical Hacker) • ISO/IEC 27001 Lead Auditor / Lead Implementer • Other relevant certs: e.g., CompTIA Security+, eWPT, eCPPT, GPEN Nice-to-Have Skills- • Familiarity with DevSecOps pipelines, source code reviews, or CI/CD security integration. • Client-facing consulting experience or report presentation skills. • Cyber Security vibe is a must.

Posted 4 days ago

Apply

4.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Note : If you have not worked for any Cybersecurity Company or Products please don't Apply. About the Role: We are seeking a versatile and experienced Cybersecurity Advisor to join our growing team. This is a hybrid role that merges the hands-on security expertise of a Cybersecurity Advisor and digital engagement focus of a Scaled Customer Success Advisor. You will be responsible for guiding customers on their security journey from onboarding and ensuring they maximize the value of our cybersecurity solutions, and scaling customer success through digital channels and automation. This role is both proactive and reactive, combining technical acumen, customer relationship management, and strategic communication to support and elevate customer experience at scale. Key Responsibilities: Serve as a trusted cybersecurity advisor to clients, guiding them on threat mitigation, incident response, and security posture improvement. Assist in reviewing, triaging, and addressing alerts alongside security analysts. Develop and deliver customer-facing materials including executive briefings, security reports, and strategic action plans. Maintain up-to-date knowledge of the cybersecurity landscape, tools, and frameworks. Respond to inbound customer inquiries via email or digital triggers and ensure timely, accurate, and helpful responses. Provide product guidance and direct customers to relevant resources (e.g., Rapid7 Academy, knowledge bases, community forums). Use engagement signals (e.g., NPS, CSAT, support tickets) to drive adoption and customer health improvements. Support the creation and deployment of digital lifecycle programs, messaging, and scalable customer touchpoints Support onboarding activities of a customer Team Collaboration Act as a point of escalation and peer coach for the team, supporting resolution paths for complex customer needs. Collaborate with Renewals, Sales, Support, and GTC teams to align on customer strategy and value realization. Lead initiatives to improve digital processes and enhance operational workflows. Analytics & Feedback Forecast customer health and sentiment post-engagement and communicate risk or opportunity to internal teams. Collect and report on customer feedback, influencing product and service enhancements. Skills & Qualifications: 4+ years of experience in Cybersecurity, SaaS Customer Success, or Technical Account Management roles. Strong understanding of security frameworks, threat detection, incident response, and vulnerability management. Proven ability to manage client relationships, resolve technical issues, and communicate with technical and executive stakeholders. Prior technology deployment and configuration experience Strong project management and prioritization abilities Experience with CRM tools (e.g., Salesforce) and digital engagement tools. Exceptional written and verbal communication skills across multiple channels (email, Slack, presentations, etc.). Highly organized, self-driven, and comfortable managing multiple priorities in a fast-paced, global environment. Industry certifications such as CompTIA Security+, Cloud+, Network+, or CISSP are a strong plus.

Posted 4 days ago

Apply

3.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Position Summary... What you'll do... Job Summary You are a passionate front-end engineer who loves to code. You love to take ideas and build great products with JavaScript, HTML, and CSS. You know JavaScript is imperfect, but you embrace its functional side and genuinely enjoy coding with it. You might like to talk about obscure computer science topics, but really, you just want to write simple code and ship new products and features to customers (or improve existing ones). You have an eye for design and user experience. You care about more than just the code. You care about the customer experience and help our customers make better decisions while shopping. You love learning new things. Your focus is on frontend JavaScript code, but you can dig in wherever needed. You are curious and are always ready to learn new things and solve hard problems. You already know or are willing to learn Node.js, GraphQL, NextJS, Nx, build tools, shell scripts or anything else that is required for the job. About The Team Imagine working in an environment where one line of code can make life easier for hundreds of millions of people and put a smile on their face. Thats what we do at Walmart Global Tech. Were a team of 15,000+ software engineers, data scientists and service professionals within Walmart, the worlds largest retailer, delivering innovations that improve how our customers shop and empower our 2.2 million associates. To others, innovation looks like an app, service or some code,but Walmart has always been about people. People are why we innovate, and people power our innovations. Beinghuman-ledis our true disruption. What You'll Do Walmart International is a and fast-growing business unit, so you'll get experience on many different projects across the organization. That said, here are some things you'll do: Build reusable React components with modular CSS, manage data on the client with Redux, use react query, and GraphQL. Refactor or improve existing code. We constantly find ways to improve all of our JavaScript code and you are all aboard. Work closely with our product, design, and UX teams to create amazing and intuitive experiences that make it effortless to connect different apps together. Demonstrate technical expertise in solving challenging programming and design problems Ship to hundreds of thousands of users every day while having lots of autonomy in terms of code and feature ownership. Share what you know and learn either one-on-one or with lightning talks to the group. Work boldly with a sense of urgency; embrace mistakes, learn from them, and drive the team toward success What You'll Bring 3+ years of experience in building responsive, single page web applications using modern front-end JavaScript technologies like React, Angular, Vue etc. Deep understanding of React, Node.JS and its core principles Experience in creating and/or consuming RESTful web service BS/MS in computer science or equivalent work experience About Walmart Global Tech Imagine working in an environment where one line of code can make life easier for hundreds of millions of people. Thats what we do at Walmart Global Tech. Were a team of software engineers, data scientists, cybersecurity experts and service professionals within the worlds leading retailer who make an epic impact and are at the forefront of the next retail disruption. People are why we innovate, and people power our innovations. We are people-led and tech-empowered. We train our team in the skillsets of the future and bring in experts like you to help us grow. We have roles for those chasing their first opportunity as well as those looking for the opportunity that will define their career. Here, you can kickstart a great career in tech, gain new skills and experience for virtually every industry, or leverage your expertise to innovate at scale, impact millions and reimagine the future of retail. Flexible, hybrid work We use a hybrid way of working with primary in office presence coupled with an optimal mix of virtual presence. We use our campuses to collaborate and be together in person, as business needs require and for development and networking opportunities. This approach helps us make quicker decisions, remove location barriers across our global team, be more flexible in our personal lives. Benefits Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include a host of best-in-class benefits maternity and parental leave, PTO, health benefits, and much more. Belonging We aim to create a culture where every associate feels valued for who they are, rooted in respect for the individual. Our goal is to foster a sense of belonging, to create opportunities for all our associates, customers and suppliers, and to be a Walmart for everyone. At Walmart, our vision is ''everyone included.'' By fostering a workplace culture where everyone isand feelsincluded, everyone wins. Our associates and customers reflect the makeup of all 19 countries where we operate. By making Walmart a welcoming place where all people feel like they belong, were able to engage associates, strengthen our business, improve our ability to serve customers, and support the communities where we operate. Equal Opportunity Employer Walmart, Inc., is an Equal Opportunities Employer By Choice. We believe we are best equipped to help our associates, customers and the communities we serve live better when we really know them. That means understanding, respecting and valuing unique styles, experiences, identities, ideas and opinions while being welcoming of all people. Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Minimum Qualifications:Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 2years’ experience in software engineering or related area at a technology, retail, or data-driven company. Option 2: 4 years’ experience in software engineering or related area at a technology, retail, or data-driven company. Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, Network+, GISF, GSEC, CISSP, or CCSP, Master’s degree in Computer Science, Information Technology, Engineering, Information Systems, Cybersecurity, or related area Primary Location... Pardhanani Wilshire Ii, Cessna Business Park, Kadubeesanahalli Village, Varthur Hobli , India R-2119531

Posted 4 days ago

Apply

5.0 years

0 Lacs

India

Remote

Linkedin logo

Welcome to Veradigm! Our Mission is to be the most trusted provider of innovative solutions that empower all stakeholders across the healthcare continuum to deliver world-class outcomes. Our Vision is a Connected Community of Health that spans continents and borders. With the largest community of clients in healthcare, Veradigm is able to deliver an integrated platform of clinical, financial, connectivity and information solutions to facilitate enhanced collaboration and exchange of critical patient information. Veradigm Veradigm is here to transform health, insightfully. Veradigm delivers a unique combination of point-of-care clinical and financial solutions, a commitment to open interoperability, a large and diverse healthcare provider footprint, along with industry proven expert insights. We are dedicated to simplifying the complicated healthcare system with next-generation technology and solutions, transforming healthcare from the point-of-patient care to everyday life. For more information, please explore www.veradigm.com. What Will Your Job Look Like Cyber Security Engineers supports and implements cloud and application security tools and technologies. These technologies include firewalls, IDS/IPS, antivirus, web proxy, certificate management, SIEM, patch management, access controls as well as vulnerability assessments within the Veradigm environment. The Cyber Security Engineer should be comfortable working with a variety of security technologies and implements security measures to protect our systems from attacks, intrusion, and infiltration. An Ideal Candidate Will Have 5+ years of experience monitoring and maintaining firewalls, IDS/IPS systems, web proxy, and content filtering security products for policy violations, intrusions, anomalous behaviors, and day to day incident response activities. Experience with deployment, administration and troubleshooting of endpoint detection and response (EDR) and antivirus (AV) solutions supporting both servers and workstations. Experience securing cloud infrastructure (Azure or AWS). Administers authentication and access controls including provisioning, changes and deprovisioning of user and system accounts, security/access roles and access permissions. Monitoring and analyzing system access logs and deployment and implementation of SIEM solution such as Microsoft Sentinel or Splunk. Experience with Active Directory, Entra ID, and IAM protocols such as SAML, Single Sign On (SSO) and MFA solutions. Experience with email security and filtering, and sender authentication. Experience creating and maintaining automation and scripting tools such as PowerShell, JavaScript, Python, Perl, or Bash. Working knowledge of Windows Server administration and support including security best practices and understanding of Active Directory/Entra ID. Analyze and report organizational security posture trends. Experience with Linux distros such as RHEL, CentOS, Ubuntu, or Oracle Linux a plus. Experience conducting vulnerability assessments or risk assessments with tools such as Nessus, Qualys, Metasploit, Kali and working with application and server owners to review scan results, suggest remediation actions, and track/report on progress to management Certification Requirements Comptia Security Certification Security+ or CySA+ or CASP+ or PenTest+ Other Security Certifications- GSEC or CEH or OSCP or CCSP or MS-500 or AZ-500 Benefits Veradigm believes in empowering our associates with the tools and flexibility to bring the best version of themselves to work. Through our generous benefits package with an emphasis on work/life balance, we give our employees the opportunity to allow their careers to flourish. Quarterly Company-Wide Recharge Days Flexible Work Environment (Remote/Hybrid Options) Peer-based incentive “Cheer” awards “All in to Win” bonus Program Tuition Reimbursement Program To know more about the benefits and culture at Veradigm, please visit the links mentioned below: - https://veradigm.com/about-veradigm/careers/benefits/ https://veradigm.com/about-veradigm/careers/culture/ We are an Equal Opportunity Employer. No job applicant or employee shall receive less favorable treatment or be disadvantaged because of their gender, marital or family status, color, race, ethnic origin, religion, disability or age; nor be subject to less favorable treatment or be disadvantaged on any other basis prohibited by applicable law. Veradigm is proud to be an equal opportunity workplace dedicated to pursuing and hiring a diverse and inclusive workforce. Thank you for reviewing this opportunity! Does this look like a great match for your skill set? If so, please scroll down and tell us more about yourself!

Posted 4 days ago

Apply

7.0 years

0 Lacs

India

Remote

Linkedin logo

Welcome to Veradigm! Our Mission is to be the most trusted provider of innovative solutions that empower all stakeholders across the healthcare continuum to deliver world-class outcomes. Our Vision is a Connected Community of Health that spans continents and borders. With the largest community of clients in healthcare, Veradigm is able to deliver an integrated platform of clinical, financial, connectivity and information solutions to facilitate enhanced collaboration and exchange of critical patient information. Veradigm Veradigm is here to transform health, insightfully. Veradigm delivers a unique combination of point-of-care clinical and financial solutions, a commitment to open interoperability, a large and diverse healthcare provider footprint, along with industry proven expert insights. We are dedicated to simplifying the complicated healthcare system with next-generation technology and solutions, transforming healthcare from the point-of-patient care to everyday life. For more information, please explore www.veradigm.com. What Will Your Job Look Like Cyber Security Engineers supports and implements cloud and application security tools and technologies. These technologies include firewalls, IDS/IPS, antivirus, web proxy, certificate management, SIEM, patch management, access controls as well as vulnerability assessments within the Veradigm environment. The Cyber Security Engineer should be comfortable working with a variety of security technologies and implements security measures to protect our systems from attacks, intrusion, and infiltration. An Ideal Candidate Will Have 7+ years of experience monitoring and maintaining firewalls, IDS/IPS systems, web proxy, and content filtering security products for policy violations, intrusions, anomalous behaviors, and day to day incident response activities. Experience with deployment, administration and troubleshooting of endpoint detection and response (EDR) and antivirus (AV) solutions supporting both servers and workstations. Experience securing cloud infrastructure (Azure or AWS). Administers authentication and access controls including provisioning, changes and deprovisioning of user and system accounts, security/access roles and access permissions. Monitoring and analyzing system access logs and deployment and implementation of SIEM solution such as Microsoft Sentinel or Splunk. Experience with Active Directory, Entra ID, and IAM protocols such as SAML, Single Sign On (SSO) and MFA solutions. Experience with email security and filtering, and sender authentication. Experience creating and maintaining automation and scripting tools such as PowerShell, JavaScript, Python, Perl, or Bash. Working knowledge of Windows Server administration and support including security best practices and understanding of Active Directory/Entra ID. Analyze and report organizational security posture trends. Experience with Linux distros such as RHEL, CentOS, Ubuntu, or Oracle Linux a plus. Experience conducting vulnerability assessments or risk assessments with tools such as Nessus, Qualys, Metasploit, Kali and working with application and server owners to review scan results, suggest remediation actions, and track/report on progress to management Certification Requirements Comptia Security Certification Security+ or CySA+ or CASP+ or PenTest+ Other Security Certifications- GSEC or CEH or OSCP or CCSP or MS-500 or AZ-500 Benefits Veradigm believes in empowering our associates with the tools and flexibility to bring the best version of themselves to work. Through our generous benefits package with an emphasis on work/life balance, we give our employees the opportunity to allow their careers to flourish. Quarterly Company-Wide Recharge Days Flexible Work Environment (Remote/Hybrid Options) Peer-based incentive “Cheer” awards “All in to Win” bonus Program Tuition Reimbursement Program To know more about the benefits and culture at Veradigm, please visit the links mentioned below: - https://veradigm.com/about-veradigm/careers/benefits/ https://veradigm.com/about-veradigm/careers/culture/ We are an Equal Opportunity Employer. No job applicant or employee shall receive less favorable treatment or be disadvantaged because of their gender, marital or family status, color, race, ethnic origin, religion, disability or age; nor be subject to less favorable treatment or be disadvantaged on any other basis prohibited by applicable law. Veradigm is proud to be an equal opportunity workplace dedicated to pursuing and hiring a diverse and inclusive workforce. Thank you for reviewing this opportunity! Does this look like a great match for your skill set? If so, please scroll down and tell us more about yourself!

Posted 4 days ago

Apply

4.0 years

0 Lacs

Gandhinagar, Gujarat, India

Remote

Linkedin logo

Job Description We are seeking an experienced Network Security Engineer to join our full-time team. The ideal candidate will have 4 to 5 years of hands-on experience in implementing and managing network security solutions and a strong understanding of network infrastructure. Key Responsibilities: Design, implement, and manage secure network environments, including firewalls, VPNs, and intrusion prevention systems. Perform network security assessments and provide actionable recommendations. Troubleshoot and resolve complex network security issues. Collaborate with clients to address their specific security needs. Document network configurations, security policies, and process changes. Provide remote technical support and expert guidance for projects. Required Skills: 4 to 5 years of hands-on experience in network security roles Strong understanding of network security principles and best practices Experience with firewall configuration and management (any leading vendor) Solid knowledge of networking concepts (TCP/IP, Routing, VPNs, VLANs) Ability to analyze, mitigate, and respond to network security risks Strong troubleshooting, problem-solving, and communication skills Ability to work independently and deliver results Nice to Have: Experience with multiple firewall platforms (Fortinet, Cisco, CheckPoint, etc.) Knowledge of SIEM or endpoint security tools Relevant certifications (CCNA Security, CompTIA Security+, etc.) Why Join Us? 100% Remote Work Opportunity Full-Time, Stable Employment Work alongside passionate cybersecurity professionals Opportunity for skill enhancement and career growth Exposure to global clients and modern security projects

Posted 4 days ago

Apply

15.0 years

0 Lacs

India

On-site

Linkedin logo

Client Introduction: In this role, you will have the opportunity to work closely with one of our esteemed clients. This client is a global leader in the Banking Industry, known for its commitment to quality and innovation. They have chosen Dautom as their trusted partner for their upcoming projects. Job Summary: Have over 15+ years of rich experience in data protection, information security domain and Project Management. Experience of managing enterprise Data Protection projects and of direct and in-direct relationship with senior and executive management. Familiarity with advanced Data Privacy and Protection technologies, risk, threat and vulnerability assessments, and security measures. Strong experience and knowledge across the Data Protection and Information Security domains including technical measures, policy procedures, compliance management, risk management and Incident Response etc. Extensive knowledge of data protection solutions and technologies for Data Loss and leakage Prevention (DLP). Experience implementing and managing (DLP) solutions. Strong experience in Banking environment with strong understanding on key data protection regulations and standards such as ISO 27001, NIST CSF, GDPR etc. Skills and Application Leads the development and implementation of comprehensive Data Protection strategies that address identified risks and compliance requirements, incorporating advanced technologies and methodologies to enhance security posture. Manages cross-functional teams to execute Data Protection initiatives, ensuring that projects are completed on time, within budget, and achieve desired outcomes. Strategic Insight Integrates Data Protection and Information Security considerations into broader bank’s strategies, recognizing the importance of Data Protection in achieving business objectives and competitive advantage. Communicates the strategic value of Data Protection and Information Security investments to executive leadership and key stakeholders, advocating for resources and support to strengthen the organization's capabilities. Cultivates an organizational culture that prioritizes Data Protection, encouraging proactive security practices and continuous improvement across all departments. Strong interpersonal, analytical, and technical skills with strong decision making and prioritization skills. Other Sound knowledge of evolving advanced tech stacks and related control and risk universe from a data protection perspective. Sound knowledge and expertise in conducting risk assessment and management. The ideal candidate will have a degree in Information Security, Computer Science, or a related field. Professional certifications : CISSP, PMP, CCSP, CompTIA Security+, CIPT , CISM etc Relevant years of experience : 10-15 yrs Industry & Education background : Bachelor’s degree in computer science, Engineering, or a related field, or equivalent work experience. Dautom Company Introduction: Dautom is a prominent name across the globe in IT consulting services. With a relentless commitment to innovation and excellence, we empower businesses to bolster their IT teams with top-tier talent. Our greatest asset is our talented team of IT professionals. Our journey towards becoming an employer of choice has been built on a foundation of trust, respect, and unwavering support for our employees' growth and well-being.

Posted 4 days ago

Apply

14.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Saviynt is an identity authority platform built to power and protect the world at work. In a world of digital transformation, where organizations are faced with increasing cyber risk but cannot afford defensive measures to slow down progress, Saviynt’s Enterprise Identity Cloud gives customers unparalleled visibility, control and intelligence to better defend against threats while empowering users with right-time, right-level access to the digital technologies and tools they need to do their best work. Saviynt is looking for Principal Architect – Identity Management to design, deploy, configure and implement its leading Identity Governance (IGA) solution based on customer requirements. As an expert in deploying Identity Governance solutions, the primary responsibility will be to lead Saviynt solution deployments to meet customer requirements. WHAT YOU WILL BE DOING Provide thought leadership to customers for IGA in general and Saviynt in specific Provide industry wide best solution for the customer’s use cases meeting functional as well as non functional requirements Provide consulting and advisory skills, capable of addressing customer expectations Architect and deploy Saviynt Identity Governance solution to meet customer requirements Design, deploy, implement, and integrate Saviynt with critical applications and infrastructure Follow approved life cycle methodologies, create documentation for design and testing Interact/coordinate with customers as required Provide technical oversight and direction to mid-level and junior Engineers Train and Groom top talent to be experts in Saviynt technology and IAM in general Assist operations team as required, coordinate with the product engineering team to advocate for the new features in the product Resolve technical issues through debugging, research, and investigation Technical pre-sales support for direct and partner sales teams Provide technical expertise and real-life experience in creating solutions, designs, proof of concept, and implementation Conduct research and use knowledge of competitive solutions to effectively address and dispel customer objections Ensures delivery of high-quality product on time and within budget WHAT YOU BRING Bachelor’s/equivalent in Engineering 14+ years of industry experience in design, development, customization, configuration, deployment of any Identity Management and Governance products Thorough domain knowledge on User Lifecycle Management, Provisioning and Reconciliation, Auditing, Reporting, and user activity Monitoring, Access Certification, SOD, Cloud Security Direct customer interaction and management skills Strong technical presentation and communication skills, both verbal and written Knowledge of Java/J2EE, SQL, Web Services (REST/SOAP), Directories, etc Strong consulting and advisory experience Good problem solving and analytical skills Experience with RFP responses and proposals Good To Have: Cybersecurity certifications (CISSP, CISA, CISM, CompTIA Security+ and CEH etc.) Saviynt or any equivalent IGA product certification If required for this role, you will: - Complete security & privacy literacy and awareness training during onboarding and annually thereafter - Review (initially and annually thereafter), understand, and adhere to Information Security/Privacy Policies and Procedures such as (but not limited to): > Data Classification, Retention & Handling Policy > Incident Response Policy/Procedures > Business Continuity/Disaster Recovery Policy/Procedures > Mobile Device Policy > Account Management Policy > Access Control Policy > Personnel Security Policy > Privacy Policy Saviynt is an amazing place to work. We are a high-growth, Platform as a Service company focused on Identity Authority to power and protect the world at work. You will experience tremendous growth and learning opportunities through challenging yet rewarding work which directly impacts our customers, all within a welcoming and positive work environment. If you're resilient and enjoy working in a dynamic environment you belong with us! Saviynt is an equal opportunity employer and we welcome everyone to our team. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.

Posted 4 days ago

Apply

3.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Position Summary... Demonstrates up-to-date expertise and applies this to the development, execution, and improvement of action plans by providing expert advice and guidance to others in the application of information and best practices; supporting and aligning efforts to meet customer and business needs; and building commitment for perspectives and rationales. Provides and supports the implementation of business solutions by building relationships and partnerships with key stakeholders; identifying business needs; determining and carrying out necessary processes and practices; monitoring progress and results; recognizing and capitalizing on improvement opportunities; and adapting to competing demands, organizational changes, and new responsibilities. Models compliance with company policies and procedures and supports company mission, values, and standards of ethics and integrity by incorporating these into the development and implementation of business plans; using the Open Door Policy; and demonstrating and assisting others with how to apply these in executing business processes and practices. What you'll do... About The Team Imagine working in an environment where one line of code can make life easier for hundreds of millions of people and put a smile on their face. That’s what we do at Walmart Global Tech. We’re a team of 15,000+ software engineers, data scientists and service professionals within Walmart, the world’s largest retailer, delivering innovations that improve how our customers shop and empower our 2.2 million associates. To others, innovation looks like an app, service or some code, but Walmart has always been about people. People are why we innovate, and people power our innovations. Being human-led is our true disruption. What You’ll Do Walmart International is a diverse and fast-growing business unit, so you'll get experience on many different projects across the organization. That said, here are some things you'll do: Build reusable React components with modular CSS, manage data on the client with Redux, use react query, and GraphQL. Refactor or improve existing code. We constantly find ways to improve all of our JavaScript code and you are all aboard. Work closely with our product, design, and UX teams to create amazing and intuitive experiences that make it effortless to connect different apps together. Demonstrate technical expertise in solving challenging programming and design problems Ship to hundreds of thousands of users every day while having lots of autonomy in terms of code and feature ownership. Share what you know and learn either one-on-one or with lightning talks to the group. Work boldly with a sense of urgency; embrace mistakes, learn from them, and drive the team toward success What You’ll Bring 3+ years of experience in building responsive, single page web applications using modern front-end JavaScript technologies like React, Angular, Vue etc. Deep understanding of React, Node.JS and its core principles Experience in creating and/or consuming RESTful web service BS/MS in computer science or equivalent work experience About Walmart Global Tech Imagine working in an environment where one line of code can make life easier for hundreds of millions of people. That’s what we do at Walmart Global Tech. We’re a team of software engineers, data scientists, cybersecurity expert's and service professionals within the world’s leading retailer who make an epic impact and are at the forefront of the next retail disruption. People are why we innovate, and people power our innovations. We are people-led and tech-empowered. We train our team in the skillsets of the future and bring in experts like you to help us grow. We have roles for those chasing their first opportunity as well as those looking for the opportunity that will define their career. Here, you can kickstart a great career in tech, gain new skills and experience for virtually every industry, or leverage your expertise to innovate at scale, impact millions and reimagine the future of retail. Flexible, hybrid work We use a hybrid way of working with primary in office presence coupled with an optimal mix of virtual presence. We use our campuses to collaborate and be together in person, as business needs require and for development and networking opportunities. This approach helps us make quicker decisions, remove location barriers across our global team, be more flexible in our personal lives. Benefits Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include a host of best-in-class benefits maternity and parental leave, PTO, health benefits, and much more. Belonging We aim to create a culture where every associate feels valued for who they are, rooted in respect for the individual. Our goal is to foster a sense of belonging, to create opportunities for all our associates, customers and suppliers, and to be a Walmart for everyone. At Walmart, our vision is "everyone included." By fostering a workplace culture where everyone is—and feels—included, everyone wins. Our associates and customers reflect the makeup of all 19 countries where we operate. By making Walmart a welcoming place where all people feel like they belong, we’re able to engage associates, strengthen our business, improve our ability to serve customers, and support the communities where we operate. Equal Opportunity Employer Walmart, Inc., is an Equal Opportunities Employer – By Choice. We believe we are best equipped to help our associates, customers and the communities we serve live better when we really know them. That means understanding, respecting and valuing unique styles, experiences, identities, ideas and opinions – while being inclusive of all people. Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Minimum Qualifications:Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 2years’ experience in software engineering or related area at a technology, retail, or data-driven company. Option 2: 4 years’ experience in software engineering or related area at a technology, retail, or data-driven company. Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, Network+, GISF, GSEC, CISSP, or CCSP, Master’s degree in Computer Science, Information Technology, Engineering, Information Systems, Cybersecurity, or related area Primary Location... Pardhanani Wilshire Ii, Cessna Business Park, Kadubeesanahalli Village, Varthur Hobli , India R-2161338

Posted 4 days ago

Apply

3.0 years

3 - 8 Lacs

Hyderābād

On-site

GlassDoor logo

Position Summary We are looking for a proactive and detail-oriented Senior/ IT Security Analyst to lead and support enterprise-wide security initiatives. This role plays a critical part in advancing our Governance, Risk, and Compliance (GRC) maturity, enhancing operational security, and fostering a strong security culture across global teams. The ideal candidate will bring deep expertise in ISO 27001, NIS2 alignment, incident response, and modern security technologies. Key Responsibilities 1. Governance, Risk, and Compliance Excellence Maintain ISO 27001 certification through annual internal audits and timely reporting. Align the Information Security Management System (ISMS) and security policies with the NIS2 Directive in collaboration with Legal. Conduct quarterly Risk Analysis reviews and maintain an up-to-date Enterprise Risk Register. Coordinate external audits, ensuring zero major non-conformities. 2. Security Operations and Incident Response Monitor and respond to IT Security queries. Conduct quarterly firewall port and application access reviews for all critical systems. Complete annual security reviews for key applications and maintain updated exception handling processes. 3. Policy, Awareness, and Collaboration Lead annual global policy reviews, ensuring alignment with regulatory requirements. Organize Cybersecurity Awareness Month and publish monthly “Knowledge Bytes” in collaboration to foster security culture. 4. Strategic Security Initiatives and Capability Building Support SIEM implementation with full log integration from critical assets. Deploy DLP and other security stack with milestone-based tracking. Complete RFPs and vendor security questionnaires. Maintain and update the Project Security Manual quarterly. Required Qualifications Bachelor’s degree in Information Security, Computer Science, or a related field. Minimum 3-8 years of experience in IT security, with a strong background in GRC and operational security. Proven experience with ISO 27001, NIS2, and enterprise risk management frameworks. Hands-on expertise with SIEM, DLP, vulnerability management, and access control tools. Strong analytical, documentation, and stakeholder engagement skills. Preferred Qualifications Professional certifications such as ISO 27001 Lead Auditor/Implementor, CEH, Security+, SSCP or equivalent. Experience coordinating external audits and managing cross-regional compliance programs. Business area Enabling Functions Locations Hyderabad

Posted 4 days ago

Apply

8.0 years

0 Lacs

Kanayannur, Kerala, India

Remote

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Attack and Penetration Testing Manager As part of our Cyber Security team, you shall perform penetration testing which includes internet, intranet, wireless, web application, social engineering and physical penetration testing. You shall also perform in-depth analysis of penetration testing results and create report that describes findings, exploitation procedures, risks and recommendations. The opportunity As a Manager in the Cyber Security Team, you will contribute technically to client engagements and services development activities. An important part of your role will be to actively establish, maintain and strengthen client’s relationships. You will also identify potential business opportunities for EY within existing engagements and escalate these as appropriate. You will be responsible for overall client service quality delivery in accordance with EY quality guidelines & methodologies. You will need to manage accounts and relationships on a day-to-day basis and explore new business opportunities for the firm. Establishing, strengthening and nurturing relationships with clients (functional heads & key influencers) and internally across service lines and proactively will also be a part of your day-to-day activities. You will assist in developing new methodologies and internal initiatives and help in creating a positive learning culture by coaching, counselling and developing junior team members. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards, by reviewing the work provided by junior members. Your Key Responsibilities Lead engagements from kickoff with clients through scoping engagements, penetration testing and reporting while adhering to the agreed scope and deadlines. Perform technical QAs for the penetration testing engagements which includes Network, web application, Mobile app (both Android & iOS), APIs Cloud Security, wireless, social engineering, physical penetration testing. Lead penetration testing projects using the established methodology, tools and rules of engagements. Execute red team assessments to highlight gaps impacting organizations security postures. Identify and exploit security vulnerabilities in a wide array of systems in a variety of situations. Drive in client conversations strategically. Engage in handling escalations. Be uptodate with all the latest Pentest techniques including emerging tech such as AI. Perform in-depth analysis of penetration testing results and create report that describes findings, exploitation procedures, risks and recommendations. Convey complex technical security concepts to technical and non-technical audiences including executives. Confident with OWASP Top 10 and SANS Top 25 vulnerabilities and ability to effectively communicate methodologies and techniques with development teams Understanding and experience with Active Directory attacks. Keeping up to date with Industry trends for Application security testing Knowledge of TCP/IP, OSI Layer, IPv4 & IPv6, Network Protocols and Wireless Communication skills preferred. Develop automated solutions that mitigate risks throughout the organization. Ability to automate DAST/SAST solutions and reporting Support SDLC and agile environments with application security testing and source code reviews. Serve as a mentor and guide to junior pen testers, sharing your knowledge, skills, and best practices to nurture their growth and development. Provide technical expertise and guidance to clients on remediation strategies and security best practices. Build strong internal relationships within EY Advisory Services and with other service lines across the organization. Skills And Attributes For Success Client responsibilities: Provide guidance and share knowledge with team members and participate in performing procedures focusing on complex, judgmental and/or specialized issues. Work with the team and the client to create plans for accomplishing engagement objectives and a strategy that complies with professional standards and addresses the risks inherent in the engagement. Brief the engagement team on the client's environment and industry trends. Maintain relationships with client management to manage expectations of service, including work products, timing, and deliverables. Demonstrate a thorough understanding of complex information systems and apply it to client situations. Use extensive knowledge of the client's business/industry to identify technological developments and evaluate impacts on the client's business. Demonstrate excellent project management skills, inspire teamwork and responsibility with engagement team members, and use current technology/tools to enhance the effectiveness of deliverables and services. Understand EY and its service lines and actively assess what the firm can deliver to serve clients. Assist Partners & Senior Managers in driving the business development process on existing client engagements by gathering appropriate resources, gaining access to key contacts & supervising proposal preparation. Create innovative insights for clients, adapts methods & practices to fit operational team needs & contributes to thought leadership documents. Practice secondment for developing new methodologies. Facilitate discussions / knowledge sharing with key client personnel and contribute to EY thought leadership. Plan & schedule client engagements. Determine and deploy the right team with adequate skill sets for executing engagements and periodically review status of engagements and work products. Demonstrate strong project management skills Maintain a strong client focus by effectively serving client needs and developing productive working relationships with client personnel. Stay abreast of current business and economic developments and new pronouncements/standards relevant to the client's business. Demonstrate industry expertise (deep understanding of the industry, emerging trends, issues/challenges, key players & leading practices) Review status updates and prepare management presentations Actively contribute to improving operational efficiency on projects & internal initiatives. People responsibilities: Identify buyers, influencers & stakeholders in existing client engagements and build strong relationships. Display teamwork, integrity and leadership. Work with team members to set goals and responsibilities for specific engagements. Foster teamwork and innovation. Drive performance management for self and team. Driving the quality culture agenda at GD Manage the performance management for the direct reportees, as per the organization policies Training and mentoring of project resources Participating in the organization-wide people initiatives To qualify for the role, you must have Graduates /BE / M Sc (Stats, Maths, Computer Science) / MBA with background in computer science and programming /MCA with minimum 8 years of work experience in penetration testing which includes internet, intranet, web application penetration tests, wireless, social engineering, and Red Team assessments. Any two of the following certifications: CISSP, OSCP, OSWP, GPEN, GWAPT, OSCE, OSEE, GXPN Network Security certifications (C|EH, Security+, SANS, ISACA, product certifications). Quality Management training/certification (e.g. ITIL, Six Sigma, TQM) Knowledge of Windows, Linux, UNIX, any other major operating systems. Deep understanding of TCP/IP network protocols. Deep understanding and experience with various Active Directory attack techniques. Understanding of network security and popular attacks vectors. In-depth understanding of OWASP Top 10 vulnerabilities and their mitigation strategies. Experience with manual attack and penetration testing. Experience with scripting / programming skills (e.g., Python, PowerShell, Java, Perl etc.).Updated and familiarized with the latest exploits and security trends. Experience to lead a technical team to conduct remote and on-site penetration testing within defined rules of engagement. Familiarity to perform network penetration testing in stealth manner. Understanding of software security, network security, and information technology management technologies and principles Knowledge of vulnerability management, patch management, and configuration management best practices Ideally, you’ll also have Project management skills Certifications: CREST Demonstrable flair for technical writing, including engagement reports, presentations and operating procedures What We Look For Who can Perform penetration testing which includes Network, web application, Mobile app (both Android & iOS), APIs Cloud Security, wireless, social engineering, physical penetration testing and provide analysis for the testing results. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 4 days ago

Apply

3.0 years

0 Lacs

Kolkata, West Bengal, India

Remote

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Staff (CTM – Threat Detection & Response) KEY Capabilities: Experience in working with Splunk Enterprise, Splunk Enterprise Security & Splunk UEBA Minimum of Splunk Power User Certification Good knowledge in programming or Scripting languages such as Python (preferred), JavaScript (preferred), Bash, PowerShell, Bash, etc Assist in remote and on-site gap assessment of the SIEM solution. Work on defined evaluation criteria & approach based on the Client requirement & scope factoring industry best practices & regulations Assist in interview with stakeholders, review documents (SOPs, Architecture diagrams etc) Asist in evaluating SIEM based on the defined criteria and prepare audit reports Good experience in providing consulting to customers during the testing, evaluation, pilot, production and training phases to ensure a successful deployment. Experience in onboarding data into Splunk from various sources including unsupported (in-house built) by creating custom parsers Verification of data of log sources in the SIEM, following the Common Information Model (CIM) Experience in parsing and masking of data prior to ingestion in SIEM Provide support for the data collection, processing, analysis and operational reporting systems including planning, installation, configuration, testing, troubleshooting and problem resolution Assist clients to fully optimize the SIEM system capabilities as well as the audit and logging features of the event log sources Assist client with technical guidance to configure their log sources (in-scope) to be integrated to the SIEM Experience in SIEM content development which includes : Hands-on experience in development and customization of Splunk Apps & Add-Ons Builds advanced visualizations (Interactive Drilldown, Glass tables etc) Build and integrate contextual data into notable events Experience in creating use cases under Cyber kill chain and MITRE attack framework Capability in developing advanced dashboards (with CSS, JavaScript, HTML, XML) and reports that can provide near real time visibility into the performance of client applications. Sound knowledge in configuration of Alerts and Reports. Good exposure in automatic lookup, data models and creating complex SPL queries. Create, modify and tune the SIEM rules to adjust the specifications of alerts and incidents to meet client requirement Experience in creating custom commands, custom alert action, adaptive response actions etc Qualification & experience: Minimum of 3 years’ experience in Splunk and 3 to 5 years of overall experience with knowledge in Operating System and basic network technologies Experience in SOC as L1/L2 Analyst will be an added advantage Strong oral, written and listening skills are an essential component to effective consulting. Good to have knowledge of Vulnerability Management, Windows Domains, trusts, GPOs, server roles, Windows security policies, user administration, Linux security and troubleshooting Certification in any other SIEM Solution such as IBM QRadar, Exabeam, Securonix will be an added advantage Certifications in a core security related discipline (CEH, Security+, etc) will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 5 days ago

Apply

3.0 years

0 Lacs

Kanayannur, Kerala, India

Remote

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Staff (CTM – Threat Detection & Response) KEY Capabilities: Experience in working with Splunk Enterprise, Splunk Enterprise Security & Splunk UEBA Minimum of Splunk Power User Certification Good knowledge in programming or Scripting languages such as Python (preferred), JavaScript (preferred), Bash, PowerShell, Bash, etc Assist in remote and on-site gap assessment of the SIEM solution. Work on defined evaluation criteria & approach based on the Client requirement & scope factoring industry best practices & regulations Assist in interview with stakeholders, review documents (SOPs, Architecture diagrams etc) Asist in evaluating SIEM based on the defined criteria and prepare audit reports Good experience in providing consulting to customers during the testing, evaluation, pilot, production and training phases to ensure a successful deployment. Experience in onboarding data into Splunk from various sources including unsupported (in-house built) by creating custom parsers Verification of data of log sources in the SIEM, following the Common Information Model (CIM) Experience in parsing and masking of data prior to ingestion in SIEM Provide support for the data collection, processing, analysis and operational reporting systems including planning, installation, configuration, testing, troubleshooting and problem resolution Assist clients to fully optimize the SIEM system capabilities as well as the audit and logging features of the event log sources Assist client with technical guidance to configure their log sources (in-scope) to be integrated to the SIEM Experience in SIEM content development which includes : Hands-on experience in development and customization of Splunk Apps & Add-Ons Builds advanced visualizations (Interactive Drilldown, Glass tables etc) Build and integrate contextual data into notable events Experience in creating use cases under Cyber kill chain and MITRE attack framework Capability in developing advanced dashboards (with CSS, JavaScript, HTML, XML) and reports that can provide near real time visibility into the performance of client applications. Sound knowledge in configuration of Alerts and Reports. Good exposure in automatic lookup, data models and creating complex SPL queries. Create, modify and tune the SIEM rules to adjust the specifications of alerts and incidents to meet client requirement Experience in creating custom commands, custom alert action, adaptive response actions etc Qualification & experience: Minimum of 3 years’ experience in Splunk and 3 to 5 years of overall experience with knowledge in Operating System and basic network technologies Experience in SOC as L1/L2 Analyst will be an added advantage Strong oral, written and listening skills are an essential component to effective consulting. Good to have knowledge of Vulnerability Management, Windows Domains, trusts, GPOs, server roles, Windows security policies, user administration, Linux security and troubleshooting Certification in any other SIEM Solution such as IBM QRadar, Exabeam, Securonix will be an added advantage Certifications in a core security related discipline (CEH, Security+, etc) will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 5 days ago

Apply

3.0 years

0 Lacs

Trivandrum, Kerala, India

Remote

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Staff (CTM – Threat Detection & Response) KEY Capabilities: Experience in working with Splunk Enterprise, Splunk Enterprise Security & Splunk UEBA Minimum of Splunk Power User Certification Good knowledge in programming or Scripting languages such as Python (preferred), JavaScript (preferred), Bash, PowerShell, Bash, etc Assist in remote and on-site gap assessment of the SIEM solution. Work on defined evaluation criteria & approach based on the Client requirement & scope factoring industry best practices & regulations Assist in interview with stakeholders, review documents (SOPs, Architecture diagrams etc) Asist in evaluating SIEM based on the defined criteria and prepare audit reports Good experience in providing consulting to customers during the testing, evaluation, pilot, production and training phases to ensure a successful deployment. Experience in onboarding data into Splunk from various sources including unsupported (in-house built) by creating custom parsers Verification of data of log sources in the SIEM, following the Common Information Model (CIM) Experience in parsing and masking of data prior to ingestion in SIEM Provide support for the data collection, processing, analysis and operational reporting systems including planning, installation, configuration, testing, troubleshooting and problem resolution Assist clients to fully optimize the SIEM system capabilities as well as the audit and logging features of the event log sources Assist client with technical guidance to configure their log sources (in-scope) to be integrated to the SIEM Experience in SIEM content development which includes : Hands-on experience in development and customization of Splunk Apps & Add-Ons Builds advanced visualizations (Interactive Drilldown, Glass tables etc) Build and integrate contextual data into notable events Experience in creating use cases under Cyber kill chain and MITRE attack framework Capability in developing advanced dashboards (with CSS, JavaScript, HTML, XML) and reports that can provide near real time visibility into the performance of client applications. Sound knowledge in configuration of Alerts and Reports. Good exposure in automatic lookup, data models and creating complex SPL queries. Create, modify and tune the SIEM rules to adjust the specifications of alerts and incidents to meet client requirement Experience in creating custom commands, custom alert action, adaptive response actions etc Qualification & experience: Minimum of 3 years’ experience in Splunk and 3 to 5 years of overall experience with knowledge in Operating System and basic network technologies Experience in SOC as L1/L2 Analyst will be an added advantage Strong oral, written and listening skills are an essential component to effective consulting. Good to have knowledge of Vulnerability Management, Windows Domains, trusts, GPOs, server roles, Windows security policies, user administration, Linux security and troubleshooting Certification in any other SIEM Solution such as IBM QRadar, Exabeam, Securonix will be an added advantage Certifications in a core security related discipline (CEH, Security+, etc) will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 5 days ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies