Jobs
Interviews

1108 Security+ Jobs - Page 21

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

1.0 years

0 Lacs

Gurugram, Haryana, India

On-site

This role is for one of the Weekday's clients Min Experience: 1 years Location: India, Mumbai, Gurgaon JobType: full-time We are looking for a dedicated and detail-oriented IT Auditor with a passion for technology, process improvement, and risk management. This opportunity is specially crafted for candidates with special abilities who aspire to build a career in IT audit and compliance. You will be part of a supportive and inclusive environment that encourages growth and values your unique perspective and talents. Requirements Key Responsibilities: Perform audits of information systems and technology infrastructure to assess controls, risks, and compliance with internal policies and external regulations. Evaluate the design and effectiveness of IT controls related to applications, databases, networks, and operating systems. Assist in the planning, execution, and reporting phases of IT audits, including the development of audit scope, objectives, and testing procedures. Document audit findings, prepare audit reports, and communicate results and recommendations to relevant stakeholders. Collaborate with business units and IT teams to understand processes, identify risk areas, and recommend improvements. Monitor the implementation of audit recommendations and follow up to ensure timely resolution. Participate in assessments related to cybersecurity, disaster recovery, access management, and data privacy. Stay up to date with the latest trends and developments in IT audit, security frameworks, and regulatory requirements such as ISO 27001, NIST, COBIT, and GDPR. Required Skills and Qualifications: Bachelor's degree in Information Technology, Computer Science, Accounting, or a related field. 1-5 years of relevant work experience in IT audit, IT controls testing, information security, or risk management. Strong understanding of IT general controls (ITGC), system development life cycle (SDLC), and audit methodologies. Familiarity with compliance standards and industry best practices (e.g., SOX, ISO, COBIT, ITIL). Good analytical, problem-solving, and documentation skills. Ability to communicate clearly and effectively with technical and non-technical stakeholders. Proficiency with MS Office tools, and optionally audit or data analysis tools (e.g., ACL, Tableau, Power BI). Preferred Certifications (Not Mandatory): CISA (Certified Information Systems Auditor) CIA (Certified Internal Auditor) ISO 27001 Lead Auditor CompTIA Security+, CEH, or similar IT certifications Our Commitment to Inclusion: We are proud to be an equal opportunity employer. This role is exclusively reserved for Persons with Special Abilities (PwD) as part of our effort to create a more inclusive and accessible workplace. We provide reasonable accommodations, accessible workspaces, assistive technologies, and a culture that embraces diversity in all its forms.

Posted 1 month ago

Apply

1.0 years

0 Lacs

Mumbai Metropolitan Region

On-site

This role is for one of the Weekday's clients Min Experience: 1 years Location: India, Mumbai, Gurgaon JobType: full-time We are looking for a dedicated and detail-oriented IT Auditor with a passion for technology, process improvement, and risk management. This opportunity is specially crafted for candidates with special abilities who aspire to build a career in IT audit and compliance. You will be part of a supportive and inclusive environment that encourages growth and values your unique perspective and talents. Requirements Key Responsibilities: Perform audits of information systems and technology infrastructure to assess controls, risks, and compliance with internal policies and external regulations. Evaluate the design and effectiveness of IT controls related to applications, databases, networks, and operating systems. Assist in the planning, execution, and reporting phases of IT audits, including the development of audit scope, objectives, and testing procedures. Document audit findings, prepare audit reports, and communicate results and recommendations to relevant stakeholders. Collaborate with business units and IT teams to understand processes, identify risk areas, and recommend improvements. Monitor the implementation of audit recommendations and follow up to ensure timely resolution. Participate in assessments related to cybersecurity, disaster recovery, access management, and data privacy. Stay up to date with the latest trends and developments in IT audit, security frameworks, and regulatory requirements such as ISO 27001, NIST, COBIT, and GDPR. Required Skills and Qualifications: Bachelor's degree in Information Technology, Computer Science, Accounting, or a related field. 1-5 years of relevant work experience in IT audit, IT controls testing, information security, or risk management. Strong understanding of IT general controls (ITGC), system development life cycle (SDLC), and audit methodologies. Familiarity with compliance standards and industry best practices (e.g., SOX, ISO, COBIT, ITIL). Good analytical, problem-solving, and documentation skills. Ability to communicate clearly and effectively with technical and non-technical stakeholders. Proficiency with MS Office tools, and optionally audit or data analysis tools (e.g., ACL, Tableau, Power BI). Preferred Certifications (Not Mandatory): CISA (Certified Information Systems Auditor) CIA (Certified Internal Auditor) ISO 27001 Lead Auditor CompTIA Security+, CEH, or similar IT certifications Our Commitment to Inclusion: We are proud to be an equal opportunity employer. This role is exclusively reserved for Persons with Special Abilities (PwD) as part of our effort to create a more inclusive and accessible workplace. We provide reasonable accommodations, accessible workspaces, assistive technologies, and a culture that embraces diversity in all its forms.

Posted 1 month ago

Apply

0 years

0 Lacs

Rajkot, Gujarat, India

On-site

Job Title: Cyber Security Trainer Company: Techdefence Labs Solutions Ltd. Location: Rajkot, Gujarat Department: Training and Consulting Job Type: Full-Time About Techdefence: Techdefence is a leading cybersecurity solutions provider specializing in offensive and defensive security, AI-powered threat intelligence, and enterprise security frameworks. Our comprehensive services and product portfolio cater to global enterprises, government agencies, and critical infrastructure, ensuring proactive protection against cyber thre ats. With a strong R&D focus, Techdefence delivers cutting-edge security solutions in the areas of cloud security, network security, application security, penetration testing, SOC solutions, and managed security services. Our expertise in cyber resilience, risk management, and compliance frameworks (ISO 27001, NIST, GDPR, PCI-DSS, etc.) positions us as a trusted partner for organizations worldwide. Role Overview: We are seeking a knowledgeable and motivated Cyber Security Trainer to join our academic team. The Cyber Security Trainer plays a critical role in delivering high-quality academic and practical instruction in cyber security. This position combines teaching, mentorship, and curriculum development to equip students with the skills needed to navigate real-world cyber threats. By integrating current industry practices and fostering an engaging learning environment, the trainer contributes to both student success and the institution’s academic excellence in the cyber security domain Key Responsibilities: • Conduct theory lectures and hands-on lab sessions for undergraduate and postgraduate students in cyber security and related domains. • Prepare course materials, lab manuals, and digital resources aligned with curriculum objectives. • Evaluate student performance through internal assessments, practical exams, and end-semester examinations; participate in examination-related duties including question paper setting, invigilation, and evaluation. • Organize and lead technical seminars, workshops, faculty development programs (FDPs), and guest lectures to enhance learning and professional development. • Guide students in project work, certifications, and participation in cyber security challenges, hackathons, and competitions. Qualifications & Skills: • Bachelor’s/Master’s degree in Computer Science, Information Security, or a related field (PhD preferred for senior roles). • Relevant industry certifications (e.g., CEH, CompTIA Security+, CISSP, OSCP) are desirable. • Prior teaching/training experience or industry experience in cyber security domains such as network security, ethical hacking, digital forensics, or incident response. • Excellent communication and presentation skills. • Proficiency in using cyber security tools, simulators, and learning platforms.

Posted 1 month ago

Apply

5.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

VARITE is looking for a Vulnerability Analyst with one of its clients located in Bangalore. If you are interested in this opportunity, kindly respond ASAP with your updated resume or apply here. We will be glad to represent you to our client and help in your job search. About the client: Client is an American data infrastructure company that provides unified data storage, integrated data services, and cloud operations (CloudOps) solutions to enterprise customers. WHAT DO WE DO? VARITE is a global IT company providing software and engineering consulting and team augmentation services to Fortune 1000 companies in USA, CANADA, and INDIA. VARITE is currently a primary and direct vendor to the leading corporations in the areas of Cloud, Data Sciences, Infrastructure Application Software, Mobility, Robotics, Banking & Financial Systems. Job Responsibilities: About The Job: We are seeking a highly skilled and motivated Vulnerability Management Specialist with at least 5 years of hands-on experience in identifying, assessing, and mitigating security vulnerabilities across enterprise environments. The ideal candidate will have a strong understanding of cybersecurity principles, vulnerability scanning tools, and risk management frameworks, with the ability to communicate technical issues to non-technical stakeholders. Essential Job Functions: Manage the end-to-end vulnerability management lifecycle: discovery, classification, prioritization, remediation tracking, and reporting. Conduct regular vulnerability assessments using tools such as Qualys, Tenable, Nessus, or Rapid7. Collaborate with system owners, infrastructure teams, and developers to address and remediate vulnerabilities. Monitor threat intelligence feeds to identify and assess emerging vulnerabilities. Develop and maintain metrics and reports on vulnerability status, trends, and remediation progress. Ensure compliance with internal security policies and external regulatory standards (e.g., PCI-DSS, ISO 27001, HIPAA). Coordinate periodic penetration testing and work with external vendors as needed. Assist in maintaining and improving the organization's vulnerability management processes and tools. Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent work experience). Minimum of 2-3 years of professional experience in vulnerability management, information security, or a related domain. Strong knowledge of operating systems (Windows, Linux, Unix), network protocols, and application architectures. Hands-on experience with vulnerability scanning tools (e.g., Qualys, Nessus, Rapid7, Tenable.io). Familiarity with patch management practices and tools. Understanding of CVSS scoring, OWASP Top 10, and MITRE Telecommunication&CK framework. Experience interpreting and responding to vulnerability alerts (e.g., CVEs, vendor advisories). Preferred: Security certifications such as CEH, OSCP, CompTIA Security+, or GIAC. Experience with scripting languages (Python, PowerShell, Bash) for automation of vulnerability tasks. Exposure to cloud environments (AWS, Azure, GCP) and related security controls. Familiarity with SIEM and ticketing systems (e.g., Splunk, ServiceNow). Soft Skills Strong analytical and problem-solving skills. Excellent written and verbal communication. Ability to manage multiple priorities and work effectively in a fast-paced environment. Collaborative mindset with a strong sense of accountability. Location: Bangalore Please feel free to send your resume to himanshu@varite.com ** If you are not comfortable or interested in this job opening, please feel free to forward this to others.

Posted 1 month ago

Apply

5.0 years

0 Lacs

Noida, Uttar Pradesh

On-site

Job Information Date Opened 06/23/2025 Job Type Full time Industry IT Services City Noida State/Province Uttar Pradesh Country India Zip/Postal Code 201301 Job Description Job Summary: The IT Compliance and Security Analyst is responsible for ensuring the organization’s IT infrastructure, policies, and processes comply with regulatory and industry security standards. This role involves conducting risk assessments, managing audits, enforcing security policies, and mitigating potential vulnerabilities to protect organizational assets. Key Responsibilities: 1. IT Compliance & Risk Management Ensure adherence to IT security compliance frameworks such as SOC 2, ISO 27001, NIST, HIPAA, GDPR, and PCI-DSS. Conduct risk assessments and gap analyses to identify compliance risks and recommend mitigation strategies. Assist in the development, implementation, and maintenance of IT security policies and procedures. Stay updated on evolving compliance regulations and security best practices. 2. Security Monitoring & Incident Response Review security alerts and investigate potential threats or incidents. Support incident response activities, including forensic analysis, reporting, and mitigation plans. Work with IT teams to ensure security controls are implemented and maintained effectively. 3. Audit & Documentation Own internal and external security audits from IT perspective, including evidence collection and audit coordination and track to closure. Maintain records and documentation related to security controls, compliance reports, and risk assessments. Liaise with stakeholders and follow up diligently until issues are fully resolved or mitigated. Take a 360-degree approach to identifying and prioritising required evidence, ensuring it is provided correctly the first time (FTR – First Time Right). Ensure all compliance tasks are completed on time and tracked properly, preventing any delays or breaches that could lead to non-compliance. Track audit findings and ensure timely remediation of identified gaps. Conduct rigorous follow-ups on all ongoing tasks, ensuring nothing is overlooked and providing timely updates to the respective stakeholders. 4. Security Awareness & Training Conduct compliance awareness training programs for employees. Educate teams on compliance best practices, requirements. 5. Vendor & Third-Party Compliance Assess third-party vendors for compliance risks. Ensure vendor contracts align with IT security policies and regulatory requirements. Technical understanding of IT infrastructure-related compliances ensures adherence to compliance standards and all processes. Required Qualifications & Skills: Bachelor’s degree in information security, IT, Computer Science, or a related field. 5+ years of experience in IT compliance, risk management, or audit functions. Able to discuss past role(s) to demonstrate capabilities for this role. Knowledge of security frameworks such as ISO 27001, SOC 2, NIST, GDPR, HIPAA, or PCI-DSS. Experience with IT governance, risk assessment, and regulatory compliance. Strong analytical, problem-solving, and communication skills. Certifications such as CISA, CEH, or Security+ are a plus. Preferred Skills: Familiarity with security tools such as SIEM, vulnerability scanners, patch management, and endpoint protection Experience in cloud security compliance (AWS, Azure, GCP). Understanding of Data Loss Prevention (DLP) and Identity & Access Management (IAM). Ability to work collaboratively with IT, Legal, and business teams. Requirements Job Summary: The IT Compliance and Security Analyst is responsible for ensuring the organization’s IT infrastructure, policies, and processes comply with regulatory and industry security standards. This role involves conducting risk assessments, managing audits, enforcing security policies, and mitigating potential vulnerabilities to protect organizational assets. Key Responsibilities: 1. IT Compliance & Risk Management Ensure adherence to IT security compliance frameworks such as SOC 2, ISO 27001, NIST, HIPAA, GDPR, and PCI-DSS. Conduct risk assessments and gap analyses to identify compliance risks and recommend mitigation strategies. Assist in the development, implementation, and maintenance of IT security policies and procedures. Stay updated on evolving compliance regulations and security best practices. 2. Security Monitoring & Incident Response Review security alerts and investigate potential threats or incidents. Support incident response activities, including forensic analysis, reporting, and mitigation plans. Work with IT teams to ensure security controls are implemented and maintained effectively. 3. Audit & Documentation Own internal and external security audits from IT perspective, including evidence collection and audit coordination and track to closure. Maintain records and documentation related to security controls, compliance reports, and risk assessments. Liaise with stakeholders and follow up diligently until issues are fully resolved or mitigated. Take a 360-degree approach to identifying and prioritising required evidence, ensuring it is provided correctly the first time (FTR – First Time Right). Ensure all compliance tasks are completed on time and tracked properly, preventing any delays or breaches that could lead to non-compliance. Track audit findings and ensure timely remediation of identified gaps. Conduct rigorous follow-ups on all ongoing tasks, ensuring nothing is overlooked and providing timely updates to the respective stakeholders. 4. Security Awareness & Training Conduct compliance awareness training programs for employees. Educate teams on compliance best practices, requirements. 5. Vendor & Third-Party Compliance Assess third-party vendors for compliance risks. Ensure vendor contracts align with IT security policies and regulatory requirements. Technical understanding of IT infrastructure-related compliances ensures adherence to compliance standards and all processes. Required Qualifications & Skills: Bachelor’s degree in information security, IT, Computer Science, or a related field. 5+ years of experience in IT compliance, risk management, or audit functions. Able to discuss past role(s) to demonstrate capabilities for this role. Knowledge of security frameworks such as ISO 27001, SOC 2, NIST, GDPR, HIPAA, or PCI-DSS. Experience with IT governance, risk assessment, and regulatory compliance. Strong analytical, problem-solving, and communication skills. Certifications such as CISA, CEH, or Security+ are a plus. Preferred Skills: Familiarity with security tools such as SIEM, vulnerability scanners, patch management, and endpoint protection Experience in cloud security compliance (AWS, Azure, GCP). Understanding of Data Loss Prevention (DLP) and Identity & Access Management (IAM). Ability to work collaboratively with IT, Legal, and business teams.

Posted 1 month ago

Apply

4.0 years

0 Lacs

Mumbai Metropolitan Region

On-site

Description Responsibilities: Investigate alerts, security incidents and seeking out potential security issues through log analysis, and use of tools such as SIEM, UEBA, EDR, etc. ▪ Ensure that there is a timely response to any cyber incidents to minimise the impact to the business, including interacting with different technical teams and business areas where needed. ▪ Primary escalation point for complex incidents to conduct investigation, and initiate containment actions required ▪ Escalate high priority or high severity alerts/incidents to escalations team according to the prescribed process. ▪ Safely acquire and preserve the integrity of cyber security data required for incident analysis to help determine the technical/operational impact, root cause(s), scope, and nature of incidents. ▪ Escalation point to provide process and/or technical advice for Level 1 analysts. ▪ Manages shift workload to make sure they are assigned and handled according to KPI targets. ▪ Prepare and send the end of shift report to Leadership team. ▪ Document, attend and lead the handover call to ensure updates, unassigned tickets, tasks, and incident investigation that needs to be continued by next shift will be communicated ▪ Perform quality audit for tickets that were handled by Level 1s to ensure incidents were handled according to prescribed processes. ▪ Recommend alert/s for tuning to minimize false positives and improve the businesses’ security posture against attackers and threats. ▪ Regularly contribute to the SOC playbooks and knowledgebase with findings from investigations such as different attacker tools, tactics, and procedures which can be applied to future investigations. ▪ Help deliver training to mature skills of new joiners or colleagues Requirement You will be working as part of a 24/7 SOC across different locations and therefore you must be a true team player, with the ability and desire to engage with different internal stakeholders and colleagues to deliver the very highest standards of service and support. ▪ 4 - 7 Years’ Experience working as part of a mature cyber defence centre or security operations centre. ▪ To be effective, you need to have great troubleshooting skills, the ability to research problems and the ability to effectively communicate during stressful times, while keeping a cool, calm, and friendly approach when dealing with stakeholders and colleagues. ▪ Solid time management skills and be dependable. ▪ Hands on experience of using a SIEM, UEBA, and EDR as a Level 2 security analyst. ▪ Leading Investigations and comfortable talking to stakeholders and colleagues on both a technical and non-technical level Great verbal and written communication skills, and the ability to write reports in a structured methodology. ▪ BSc/MSc in a security field or equivalent experience working within a security related function ▪ To be inquisitive, with a strong sense of personal responsibility for learning and self-development. ▪ Being able to identify common attack techniques within the context of specific technologies. ▪ Working knowledge of networking protocols/technologies (e.g. TCP, IP, HTTP/HTTPS). ▪ Working knowledge of Unix, Linux, and Windows operating systems Qualifications Graduate. Any relevant security certifications (SSCP, OCSP, Security+, CySA+, etc.). ▪ Any relevant network certifications (Network +, CCNA, etc.). ▪ Knowledge of other key IT fields (such as Web Applications, databases, Active Directory, network security systems such as web proxies, firewalls & data loss protection) ▪ Exposure to attack and penetration methods and tools. ▪ Working knowledge of scripts, tools, or methodologies to enhance our incident investigation and processes (such as Python, PowerShell, etc.).

Posted 1 month ago

Apply

1.0 - 31.0 years

2 - 3 Lacs

Electronics City, Bengaluru/Bangalore

On-site

Job Responsibilities: Provide on-site and remote IT support to clients (primarily within Bangalore). Troubleshoot and resolve network issues, system errors, and general IT infrastructure problems. Support and maintain video conferencing systems and other collaboration tools. Configure and manage IT security appliances and solutions based on client needs. Work on projects involving network setup, firewall implementation, and VPN configuration. Collaborate with senior engineers to deploy and maintain enterprise-grade IT solutions. Key Requirements: 1–2 years of hands-on experience as a System Administrator or Network Support Engineer. Must have experience installing and managing managed network switches and creating VLANs. Should have knowledge of firewalls and prior experience configuring or implementing them. Experience managing SSL VPN and Remote VPN solutions is highly desirable. Familiarity with basic network troubleshooting, TCP/IP, routing, and switching. Good understanding of Windows/Linux system administration. Willingness to travel to client locations (mostly within Bangalore) for support and implementation tasks. Excellent communication and customer service skills. Nice to Have: Exposure to enterprise security products listed in Gartner or MITRE. Certifications such as CCNA, CompTIA Security+, or similar are a plus. Experience working in an IT consulting or client-facing support role. What We Offer: Great learning curve with access to a wide range of IT security technologies and enterprise tools. Opportunity to work closely with certified professionals and senior consultants. Exposure to real-world IT challenges across multiple industries. Collaborative and supportive work environment.

Posted 1 month ago

Apply

2.0 years

0 Lacs

Ahmedabad, Gujarat, India

On-site

Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Senior Associate Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. As a cybersecurity generalist at PwC, you will focus on providing comprehensive security solutions and experience across various domains, maintaining the protection of client systems and data. You will apply a broad understanding of cybersecurity principles and practices to address diverse security challenges effectively. *Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us. At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Job Description & Summary: We are seeking a professional to join our Cybersecurity and Privacy services team, where you will have the opportunity to help clients implement effective cybersecurity programs that protect against threats. Responsibilities: L1 - Minimum 2 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/ Vulnerability Management/ SOC platform management/ Automation/Asset Integration/ Threat Intel Management /Threat Hunting. L2 - Minimum 4 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/Vulnerability Management/ SOC platform management/ Automation/ Asset Integration/ Threat Intel Management/Threat Hunting. · Round the clock threat monitoring & detection · Analysis of any suspicious, malicious, and abnormal behavior. · Alert triage, Initial assessment, incident validation, its severity & urgency · Prioritization of security alerts and creating Incidents as per SOPs. · Reporting & escalation to stakeholders · Post-incident Analysis · Consistent incident triage & recommendations using playbooks. · Develop & maintain incident management and incident response policies and procedures. · Preservation of security alerts and security incidents artefacts for forensic purpose. · Adherence to Service Level Agreements (SLA) and KPIs. · Reduction in Mean Time to Detection and Response (MTTD & MTTR). Mandatory skill sets: Mandatory (Any-one): - Certified SOC Analyst (EC-Council), Computer Hacking Forensic Investigator (EC-Council), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc. Preferred skill sets: SOC - Splunk Years of experience required: 2-5 Years Education qualification: B.Tech/MCA/MBA with IT background/ Bachelor’s degree in Information Technology, Cybersecurity, Computer Science Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Master of Business Administration, Bachelor of Engineering Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills SoCs Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Analytical Thinking, Azure Data Factory, Communication, Creativity, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Learning Agility, Managed Services, Optimism, Privacy Compliance, Regulatory Response, Security Architecture {+ 8 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date

Posted 1 month ago

Apply

2.0 years

0 Lacs

Ahmedabad, Gujarat, India

On-site

Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Senior Associate Job Description & Summary In-depth knowledge of application development processes and at least one programming and one scripting language (e.g., Java, Scala, C#, JavaScript, Angular, ReactJs, Ruby, Perl, Python, Shell). •Knowledge on OS security (Windows, Unix/Linux systems, Mac OS, VMware), network security and cloud security. *Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us. At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Job Description & Summary: We are seeking a professional to join our Cybersecurity and Privacy services team, where you will have the opportunity to help clients implement effective cybersecurity programs that protect against threats. Responsibilities: L1 - Minimum 2 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/ Vulnerability Management/ SOC platform management/ Automation/Asset Integration/ Threat Intel Management /Threat Hunting. L2 - Minimum 4 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/Vulnerability Management/ SOC platform management/ Automation/ Asset Integration/ Threat Intel Management/Threat Hunting. · Round the clock threat monitoring & detection · Analysis of any suspicious, malicious, and abnormal behavior. · Alert triage, Initial assessment, incident validation, its severity & urgency · Prioritization of security alerts and creating Incidents as per SOPs. · Reporting & escalation to stakeholders · Post-incident Analysis · Consistent incident triage & recommendations using playbooks. · Develop & maintain incident management and incident response policies and procedures. · Preservation of security alerts and security incidents artefacts for forensic purpose. · Adherence to Service Level Agreements (SLA) and KPIs. · Reduction in Mean Time to Detection and Response (MTTD & MTTR). Mandatory skill sets: Certified SOC Analyst (EC-Council), Computer Hacking Forensic Investigator (EC-Council), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc. Preferred skill sets: SOC - Splunk Years of experience required: 2-5 Years Education qualification: B.Tech/MCA/MBA with IT background/ Bachelor’s degree in Information Technology, Cybersecurity, Computer Science Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering, Master of Business Administration Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills SOC Operations Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Analytical Thinking, Azure Data Factory, Communication, Creativity, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Learning Agility, Managed Services, Optimism, Privacy Compliance, Regulatory Response, Security Architecture {+ 8 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date

Posted 1 month ago

Apply

2.0 years

0 Lacs

Ahmedabad, Gujarat, India

On-site

Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Senior Associate Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. As a cybersecurity generalist at PwC, you will focus on providing comprehensive security solutions and experience across various domains, maintaining the protection of client systems and data. You will apply a broad understanding of cybersecurity principles and practices to address diverse security challenges effectively. *Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us. At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Job Description & Summary: We are seeking a professional to join our Cybersecurity and Privacy services team, where you will have the opportunity to help clients implement effective cybersecurity programs that protect against threats. Responsibilities: L1 - Minimum 2 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/ Vulnerability Management/ SOC platform management/ Automation/Asset Integration/ Threat Intel Management /Threat Hunting. L2 - Minimum 4 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/Vulnerability Management/ SOC platform management/ Automation/ Asset Integration/ Threat Intel Management/Threat Hunting. · Round the clock threat monitoring & detection · Analysis of any suspicious, malicious, and abnormal behavior. · Alert triage, Initial assessment, incident validation, its severity & urgency · Prioritization of security alerts and creating Incidents as per SOPs. · Reporting & escalation to stakeholders · Post-incident Analysis · Consistent incident triage & recommendations using playbooks. · Develop & maintain incident management and incident response policies and procedures. · Preservation of security alerts and security incidents artefacts for forensic purpose. · Adherence to Service Level Agreements (SLA) and KPIs. · Reduction in Mean Time to Detection and Response (MTTD & MTTR). Mandatory skill sets: Certified SOC Analyst (EC-Council), Computer Hacking Forensic Investigator (EC-Council), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc. Preferred skill sets: SOC - Splunk Years of experience required: 2-5 Years Education qualification: B.Tech/MCA/MBA with IT background/ Bachelor’s degree in Information Technology, Cybersecurity, Computer Science Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering, Master of Business Administration Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills SoCs Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Analytical Thinking, Azure Data Factory, Communication, Creativity, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Learning Agility, Managed Services, Optimism, Privacy Compliance, Regulatory Response, Security Architecture {+ 8 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date

Posted 1 month ago

Apply

2.0 years

0 Lacs

Ahmedabad, Gujarat, India

On-site

Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Senior Associate Job Description & Summary In-depth knowledge of application development processes and at least one programming and one scripting language (e.g., Java, Scala, C#, JavaScript, Angular, ReactJs, Ruby, Perl, Python, Shell). •Knowledge on OS security (Windows, Unix/Linux systems, Mac OS, VMware), network security and cloud security. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Job Description & Summary: We are seeking a professional to join our Cybersecurity and Privacy services team, where you will have the opportunity to help clients implement effective cybersecurity programs that protect against threats. Responsibilities: L1 - Minimum 2 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/ Vulnerability Management/ SOC platform management/ Automation/Asset Integration/ Threat Intel Management /Threat Hunting. L2 - Minimum 4 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/Vulnerability Management/ SOC platform management/ Automation/ Asset Integration/ Threat Intel Management/Threat Hunting. · Round the clock threat monitoring & detection · Analysis of any suspicious, malicious, and abnormal behavior. · Alert triage, Initial assessment, incident validation, its severity & urgency · Prioritization of security alerts and creating Incidents as per SOPs. · Reporting & escalation to stakeholders · Post-incident Analysis · Consistent incident triage & recommendations using playbooks. · Develop & maintain incident management and incident response policies and procedures. · Preservation of security alerts and security incidents artefacts for forensic purpose. · Adherence to Service Level Agreements (SLA) and KPIs. · Reduction in Mean Time to Detection and Response (MTTD & MTTR). Mandatory skill sets: Certified SOC Analyst (EC-Council), Computer Hacking Forensic Investigator (EC-Council), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc. Preferred skill sets: SOC - Splunk Years of experience required: 2-5 Years Education qualification: B.Tech/MCA/MBA with IT background/ Bachelor’s degree in Information Technology, Cybersecurity, Computer Science a Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering, Master of Business Administration Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills SOC Operations Optional Skills SoCs Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date

Posted 1 month ago

Apply

2.0 years

0 Lacs

Ahmedabad, Gujarat, India

On-site

Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Senior Associate Job Description & Summary In-depth knowledge of application development processes and at least one programming and one scripting language (e.g., Java, Scala, C#, JavaScript, Angular, ReactJs, Ruby, Perl, Python, Shell). •Knowledge on OS security (Windows, Unix/Linux systems, Mac OS, VMware), network security and cloud security. *Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us. At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Job Description & Summary: We are seeking a professional to join our Cybersecurity and Privacy services team, where you will have the opportunity to help clients implement effective cybersecurity programs that protect against threats. Responsibilities: L1 - Minimum 2 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/ Vulnerability Management/ SOC platform management/ Automation/Asset Integration/ Threat Intel Management /Threat Hunting. L2 - Minimum 4 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/Vulnerability Management/ SOC platform management/ Automation/ Asset Integration/ Threat Intel Management/Threat Hunting. · Round the clock threat monitoring & detection · Analysis of any suspicious, malicious, and abnormal behavior. · Alert triage, Initial assessment, incident validation, its severity & urgency · Prioritization of security alerts and creating Incidents as per SOPs. · Reporting & escalation to stakeholders · Post-incident Analysis · Consistent incident triage & recommendations using playbooks. · Develop & maintain incident management and incident response policies and procedures. · Preservation of security alerts and security incidents artefacts for forensic purpose. · Adherence to Service Level Agreements (SLA) and KPIs. · Reduction in Mean Time to Detection and Response (MTTD & MTTR). Mandatory skill sets: Certified SOC Analyst (EC-Council), Computer Hacking Forensic Investigator (EC-Council), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc. Preferred skill sets: SOC - Splunk Years of experience required: 2-5 Years Education qualification: B.Tech/MCA/MBA with IT background/ Bachelor’s degree in Information Technology, Cybersecurity, Computer Science Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering, Master of Business Administration Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills SoCs Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Analytical Thinking, Azure Data Factory, Communication, Creativity, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Learning Agility, Managed Services, Optimism, Privacy Compliance, Regulatory Response, Security Architecture {+ 8 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date

Posted 1 month ago

Apply

2.0 years

0 Lacs

Ahmedabad, Gujarat, India

On-site

Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Senior Associate Job Description & Summary In-depth knowledge of application development processes and at least one programming and one scripting language (e.g., Java, Scala, C#, JavaScript, Angular, ReactJs, Ruby, Perl, Python, Shell). •Knowledge on OS security (Windows, Unix/Linux systems, Mac OS, VMware), network security and cloud security. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Job Description & Summary: We are seeking a professional to join our Cybersecurity and Privacy services team, where you will have the opportunity to help clients implement effective cybersecurity programs that protect against threats. Responsibilities: L1 - Minimum 2 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/ Vulnerability Management/ SOC platform management/ Automation/Asset Integration/ Threat Intel Management /Threat Hunting. L2 - Minimum 4 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/Vulnerability Management/ SOC platform management/ Automation/ Asset Integration/ Threat Intel Management/Threat Hunting. · Round the clock threat monitoring & detection · Analysis of any suspicious, malicious, and abnormal behavior. · Alert triage, Initial assessment, incident validation, its severity & urgency · Prioritization of security alerts and creating Incidents as per SOPs. · Reporting & escalation to stakeholders · Post-incident Analysis · Consistent incident triage & recommendations using playbooks. · Develop & maintain incident management and incident response policies and procedures. · Preservation of security alerts and security incidents artefacts for forensic purpose. · Adherence to Service Level Agreements (SLA) and KPIs. · Reduction in Mean Time to Detection and Response (MTTD & MTTR). Mandatory skill sets: Certified SOC Analyst (EC-Council), Computer Hacking Forensic Investigator (EC-Council), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc. Preferred skill sets: SOC - Splunk Years of experience required: 2-5 Years Education qualification: B.Tech/MCA/MBA with IT background/ Bachelor’s degree in Information Technology, Cybersecurity, Computer Science Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering, Master of Business Administration Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills SOC Operations Optional Skills SoCs Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date

Posted 1 month ago

Apply

3.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Data Encryption Good to have skills : NA Minimum 3 Year(s) Of Experience Is Required Educational Qualification : 15 years full time education Job Description: We are seeking a dedicated and detail-oriented Analyst to join our Identity and Access Management (IAM) team, supporting a major US-based client. The role focuses on Public Key Infrastructure (PKI) operations with additional responsibilities around Enterprise Key Management System (EKMS) and Identity governance tools. This is a hands-on operational role requiring support in a 24x7 environment, following a rotational shift model. Roles & Responsibilities: - Perform day-to-day operations of PKI services including certificate issuance, renewal, revocation, and monitoring. - Maintain and troubleshoot Certificate Authorities (CAs), Online Responders (OCSP), and Certificate Enrollment Web Services (CEP/CES). - Support integration and certificate management for enterprise applications, servers, network devices, and security appliances. - Execute and monitor certificate lifecycle management tasks and ensure compliance with security standards. - Troubleshoot SSL/TLS-related issues and assist with application-level binding of certificates (e.g., IIS, LDAPS, etc.). - Maintain service availability, perform routine health checks, and participate in DR/Resiliency testing. - Work closely with the IAM team on access control and authentication mechanisms where certificate-based auth is integrated. - Provide operational support for EKMS (Enterprise Key Management System) as an added advantage. - Follow ITIL processes for incident, change, and problem management. - Prepare and maintain SOPs, documentation, and runbooks for PKI and associated tools. Professional & Technical Skills: - Strong hands-on experience with Microsoft PKI, including Root and Subordinate CAs. - Experience in certificate lifecycle management for diverse enterprise environments. - Familiarity with Active Directory Certificate Services (ADCS). - Working knowledge of Online Responders, CEP/CES,NDES and Auto-Enrollment policies. - Knowledge on DigiCert certificates and management. - Good understanding of SSL/TLS protocols and digital certificates. - Basic scripting skills (PowerShell preferred) for automation of routine tasks. -IAM concepts and experience with directory services (Active Directory, Entra ID/Azure AD) is an added advantage. - Exposure to EKMS solutions (e.g., Thales, Venafi, or other HSM-integrated key management platforms) is a plus - Preferred Certifications:Microsoft certifications related to security or infrastructure.,CompTIA Security+, Certified PKI Professional (CPKI), or similar.,Azure Security, SC-300 or SC-900 (optional, for IAM). Additional Information: - The candidate should have minimum 3 years of experience. - This position is based at our Bengaluru office. - A 15 years full time education is required.

Posted 1 month ago

Apply

8.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Job Title: Senior SOC Analyst (L2/L3) – Threat Detection | SIEM Experience: 8+ Years Key Skills / Keywords: SOC Analyst | Threat Detection | SIEM (ArcSight, Splunk) | Incident Response | EDR (CrowdStrike, SentinelOne) SOAR Automation | Malware Analysis | RCA | CHFI | MITRE ATTCCK | VAPT | Cybersecurity Operations | Red/Blue Team | L3/L4 Security Support | GovTech Cybersecurity | ISO 27001 | NIST CSF Roles and Responsibilities Security Monitoring & Threat Detection: Operate SIEM platforms (ArcSight, Splunk, ELK) for real-time threat visibility Build and tune custom correlation rules, use cases, and threat detection dashboards Perform IOC analysis, log correlation, and malware behavior inspection Incident Response & RCA Ownership: Lead incident triage, containment, and recovery processes Conduct deep forensic investigations using CHFI methodologies (host, network, memory) Document RCA reports, incident timelines, and post-mortem summaries Act as L2/L3 escalation point within the SOC Threat Hunting & Vulnerability Management: Execute threat hunts using MITRE ATTCCK, anomaly baselines, and behavioral analytics Collaborate with VAPT teams on identifying and closing security gaps Analyze exploits and simulated attacks using Metasploit, Burp Suite, OpenVAS, Nessus Automation & Knowledge Sharing: Use or contribute to SOAR platforms and response playbook development Mentor junior analysts and lead security awareness initiatives (KnowBe4) Contribute to internal cyber threat intelligence practices and secure configurations Candidate Profile Experience: 8–12 years in SOC, Threat Detection, and Cybersecurity Operations Role Type: Individual Contributor, L2 Hands-On Specialist Strong communication skills: Able to document, articulate, and coordinate effectively with technical and non-technical stakeholders. Location: Onsite – Manesar, Haryana (Government Sector Deployment) Availability: Immediate or within 1 month Engagement: Full-time via VVNT SEQUOR LLP Preferred Qualifications Bachelor’s in Cybersecurity, Information Security, or IT Certifications preferred: CHFI, CEH, Security+, GCIA, GCFA Splunk Certified Analyst, PCNSE, AWS Security Essentials Experience with: Tripwire, KnowBe4, or Azure Sentinel / AWS GuardDuty

Posted 1 month ago

Apply

0.0 years

0 Lacs

Mumbai, Maharashtra

On-site

202500564 Mumbai, Maharashtra, India Bevorzugt Description Responsibilities: Investigate alerts, security incidents and seeking out potential security issues through log analysis, and use of tools such as SIEM, UEBA, EDR, etc. Ensure that there is a timely response to any cyber incidents to minimise the impact to the business, including interacting with different technical teams and business areas where needed. Primary escalation point for complex incidents to conduct investigation, and initiate containment actions required . Escalate high priority or high severity alerts/incidents to escalations team according to the prescribed process. Safely acquire and preserve the integrity of cyber security data required for incident analysis to help determine the technical/operational impact, root cause(s), scope, and nature of incidents. Escalation point to provide process and/or technical advice for Level 1 analysts. Manages shift workload to make sure they are assigned and handled according to KPI targets. Prepare and send the end of shift report to Leadership team. Document, attend and lead the handover call to ensure updates, unassigned tickets, tasks, and incident investigation that needs to be continued by next shift will be communicated . Perform quality audit for tickets that were handled by Level 1s to ensure incidents were handled according to prescribed processes. Recommend alert/s for tuning to minimize false positives and improve the businesses’ security posture against attackers and threats. Regularly contribute to the SOC playbooks and knowledgebase with findings from investigations such as different attacker tools, tactics, and procedures which can be applied to future investigations. Help deliver training to mature skills of new joiners or colleagues Requirement: You will be working as part of a 24/7 SOC across different locations and therefore you must be a true team player, with the ability and desire to engage with different internal stakeholders and colleagues to deliver the very highest standards of service and support. 4 - 7 Years’ Experience working as part of a mature cyber defence centre or security operations centre. To be effective, you need to have great troubleshooting skills, the ability to research problems and the ability to effectively communicate during stressful times, while keeping a cool, calm, and friendly approach when dealing with stakeholders and colleagues. Solid time management skills and be dependable. Hands on experience of using a SIEM, UEBA, and EDR as a Level 2 security analyst. Leading Investigations and comfortable talking to stakeholders and colleagues on both a technical and non-technical level Great verbal and written communication skills, and the ability to write reports in a structured methodology. BSc/MSc in a security field or equivalent experience working within a security related function . To be inquisitive, with a strong sense of personal responsibility for learning and self-development. Being able to identify common attack techniques within the context of specific technologies. Working knowledge of networking protocols/technologies (e.g. TCP, IP, HTTP/HTTPS). Working knowledge of Unix, Linux, and Windows operating systems Qualifications Graduate. Any relevant security certifications (SSCP, OCSP, Security+, CySA+, etc.). Any relevant network certifications (Network +, CCNA, etc.). Knowledge of other key IT fields (such as Web Applications, databases, Active Directory, network security systems such as web proxies, firewalls & data loss protection) . Exposure to attack and penetration methods and tools. Working knowledge of scripts, tools, or methodologies to enhance our incident investigation and processes (such as Python, PowerShell, etc.).

Posted 1 month ago

Apply

0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Vectra® is the leader in AI-driven threat detection and response for hybrid and multi-cloud enterprises. The Vectra AI Platform delivers integrated signal across public cloud, SaaS, identity, and data center networks in a single platform. Powered by patented Attack Signal Intelligence, it empowers security teams to rapidly prioritize, investigate and respond to the most advanced cyber-attacks. With 35 patents in AI-driven threat detection and the most vendor references in MITRE D3FEND, organizations worldwide rely on the Vectra AI to move at the speed and scale of hybrid attackers. For more information, visit www.vectra.ai. This role is hybrid (in the Bangalore office 3 days/week) Job Summary: Vectra AI is at the forefront of cybersecurity, leveraging its platform to capture packets and logs across network environments, public clouds, SaaS, and identity systems. By applying our patented, security-led AI, we surface and prioritize threats, enabling rapid response and preemptive threat mitigation. Powered by a deep understanding of attacker methods and problem-optimized AI algorithms, our platform delivers alerts that reveal attacker behaviors and correlate them across customer environments to expose real threats. Organizations worldwide rely on ACME to detect and neutralize threats before breaches occur. We are looking for a motivated Technical Integrations Engineer to join our Technical Marketing Group. This role involves working closely with the Technical Integrations Lead to design, develop, test, and maintain integrations with Vectra's technology partners. The ideal candidate will have a strong understanding of security tools, particularly in the areas of SIEM and SOAR, and be adept at working with RESTful APIs. Key Responsibilities: Technical Reference for Integration Requests: Serve as the primary technical contact for inbound technical integration requests from customers and partners. Collaborate with Vectra's technology partners to design end-to-end integration solutions that meet customer requirements and align with Vectra's platform capabilities. Solution Design and Collaboration: Work with customers, prospects, and partners to gather and define integration requirements and use cases. Contribute to the architectural design of integration solutions, ensuring they meet technical and business objectives. Project and Development Management: Manage outsourced projects, overseeing development and ensuring that solutions are delivered on time and meet specified requirements. Coordinate with external developers and internal teams to ensure seamless integration and implementation. Testing and Validation: Test and validate developed solutions to ensure they function as intended and meet all planned requirements. Identify and troubleshoot any issues that arise during the testing phase, ensuring that all solutions are reliable and effective. Content Development and Enablement: Develop technical demos, enablement content, videos, and documentation to support the integration process. Create comprehensive technical materials to assist with product launches, campaigns, and customer onboarding. Collaboration and Support: Work closely with the Technical Integrations Lead to identify and implement new features and enhancements required for strong and reliable integrations. Provide technical support during product launches and campaigns, ensuring that all technical aspects are handled efficiently. Required Skills: Security Tools Expertise: Strong understanding of Security Information and Event Management (SIEM) systems, with proficiency in at least one leading SIEM platform. Strong understanding of Security Orchestration, Automation, and Response (SOAR) systems, with proficiency in creating automated workflows using a leading SOAR platform. API and Programming Proficiency: Proficient in programming and working with RESTful APIs, with a deep understanding of general RESTful API structures and components. Experience with RESTful API query tools and languages such as Postman, Python, JavaScript, or similar. Project Management: Demonstrated experience managing projects from concept to production, with a strong ability to coordinate multiple stakeholders and deliver on time. Ability to handle the full lifecycle of integration projects, from requirement gathering to testing and deployment. Technical Communication: Strong communication skills, with the ability to create technical documentation, video tutorials, and other enablement content that effectively conveys complex technical concepts. Team Collaboration: Ability to work effectively with cross-functional teams, including marketing, development, and product management, to deliver integrated solutions that meet customer needs. Preferred Qualifications: Experience with cloud platforms (e.g., AWS, Azure) and their integration with security tools. Relevant certifications such as CompTIA Security+, CISSP, or equivalent. Working Conditions: This role may require occasional after-hours work to address critical issues or perform maintenance during off-peak times. The position may involve some travel to other company locations or to attend industry conferences and training. Vectra provides a comprehensive total rewards package that supports the financial, physical, mental and overall health of our employees and their families. Compensation includes competitive base pay, incentive plan eligibility, and participation in the employee equity plan (stock options). Specific benefits offered varies by location, but commonly include health care insurance, income protection / life insurance, access to retirement savings plans, behavioral & emotional wellness services, generous time away from work, and a comprehensive employee recognition program. Vectra is committed to creating a diverse environment and is proud to be an equal opportunity employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status.

Posted 1 month ago

Apply

3.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Saint-Gobain group through its group company Grindwell Norton Limited has established INDEC - an International Delivery Center in Mumbai to provide IT solutions and services to the groups’ businesses Globally. INDEC is currently organized into INDEC Application Development, INDEC Infrastructure Management and Cyber Security Management. While INDEC Apps specializes in Software application development and maintenance services (ADM), INDEC Infra specializes in monitoring and managing the key IT infrastructure assets of the group deployed globally across 70 countries worldwide. INDEC provides IT Services and Solutions to the Saint-Gobain group through its state-of-the-art delivery centers based at Andheri – East in Mumbai. There are approximately 1200+ associates working in INDEC currently. INDEC Apps provides software application development and maintenance services across a wide spectrum covering SAP, Java, PHP, .Net, CRM, Mobility, Digital, Artificial Intelligence (AI), and Robotic Automation. INDEC Infra on the other hand operates the following service lines: Network Coordination Center (NCC/NOC), Data Center Infrastructure Support, IT Standards, Tools Engineering and Reporting Automation. INDEC Cybersecurity provides 24/7 Security monitoring to detect & react on any suspicious activity in Saint- Gobain. It provides services on vulnerability scanning, web application firewall, endpoint protection, strong authentication, digital certificate, Win 10 MBAM and SFTS support . Key Responsibiities: • Evaluate and enhance the performance of SIEM/SOAR systems to ensure optimal threat detection and incident response. • Develop and maintain automation scripts and playbooks to streamline incident detection, analysis, and response processes. Leverage SOAR capabilities to reduce manual intervention and improve response times. • Oversee the day-to-day administration of SIEM/SOAR platforms, ensuring their availability, reliability, and security. Perform regular updates, patches, and configuration changes. • Collaborate with the Incident Response team to ensure seamless integration of detection and response functions. Provide support during security incidents to ensure timely and effective remediation. • Work closely with other IT and security teams to develop specific use cases and to enhance the overall security posture of the organization. Share insights and recommendations to improve overall cybersecurity posture. • Maintain detailed documentation of automation, scripts, and improvement. • Manage execution of standard procedures for the administration, content management, change management, version/patch management, and lifecycle management of the SIEM/SOAR platforms. • Manage technical documentation around the content deployed to the SIEM/SOAR. • Manage reports, dashboards, metrics for CyberSOC KPIs and presentation to senior management & other stakeholders Qualificaton: • Bachelor's degree in Computer Science, Information Security, EXTC or related field. • Relevant certifications (e.g., CISSP, CCSP, CompTIA Security+) are highly desirable. • Proven experience (3+ years) working within the Cybersecurity field, with a focus on security platform implementation & administration. • Experience with deploying and managing a large SIEM/SOAR environment. • Experience with Palo Alto XDR and/or other SIEM platforms like Sentinel, Qradar, Splunk, ArcSight, etc. • Experience with Palo Alto XSOAR and/or equivalent SOAR Platforms like Resilient, Phantom, etc. • Proficiency in scripting languages (e.g., Python, Bash) for automation and customization of security processes is highly desirable. Functional Skills/Competencies: • Has a systematic, disciplined, and analytical approach to problem solving. • Excellent ability to think critically under pressure. • Strong communication skills to convey technical concepts clearly to both technical and non- technical stakeholders. • Willingness to stay updated with evolving cyber threats, technologies, and industry trends. • Capacity to work collaboratively with cross-functional teams, developers, and management to implement robust security measures. SELECTION PROCESS: Interested Candidates are mandatorily required to apply through this listing on Jigya. Only applications received through Jigya will be evaluated further. Shortlisted candidates may be required to appear in an Online Assessment administered by Jigya on behalf of Saint-Gobain INDEC Candidates selected after the screening test will be interviewed by Saint-Gobain INDEC

Posted 1 month ago

Apply

2.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Operates company's internal data communications systems. Plans, designs and implements local and wide-area network solutions between multiple platforms and protocols (including IP and VOIP). Supports/troubleshoots network issues and coordinates with vendors for installation of such items as routers and switches. Works on project implementation. Provides training and assists with proposal writing. Conducts project planning, cost analysis and vendor comparisons. Builds proof-of concept solutions with networking system technology and architects and implements networking solutions to address client requirements. Works with products or solutions on vendor hardware and operating system software. Requires knowledge in networking system technology areas including routers, networking controllers, bridges, or networking software related to these technologies. Job Description Are you a tech-savvy problem-solver with a passion for ensuring optimal network performance? If so, look no further – Kyndryl is seeking a Network Support Specialist who will be the go-to expert for installing, maintaining, and troubleshooting computer networks. As our Network Support Specialist, you'll be working in a complex, multi-vendor environment, and will use your analytical skills to identify and resolve network issues, make configuration changes, and implement security policies. This role requires someone who can think on their feet, test and apply corrective actions (including emergency changes), and participate in change reviews as needed. And with the ever-changing nature of technology, you'll be constantly learning and growing in your role. You will work alongside a talented team of experts to plan and execute routine network changes, troubleshoot and solve network issues and outages, and maintain excellent communication with our end customers, project managers, and service engineers. You’ll be responsible for maintaining network components, monitoring network performance, and maintaining network security. You will also be providing user support for network-related issues, ensuring that our customers receive the highest level of support possible. If you're ready to take on a fast-paced and rewarding role in the world of network support, apply to join the Kyndryl team today! Key Responsibilities: Security Monitoring: Actively monitor security event logs and alerts from various security tools (firewalls, intrusion detection systems, etc.). Analyse security alerts to identify potential security incidents and escalate critical issues to senior engineers. Perform initial threat analysis on detected alerts to determine severity and potential impact. Incident Response: Respond to low-level security incidents by following established procedures. Gather evidence and document incident details for further analysis. Assist in implementing containment measures for security incidents. Access Control: Manage user access levels and permissions according to security policies. Review and approve access requests as needed. Security Configuration Management: Implement basic security configurations on network devices and systems as per security standards. Ensure security settings are applied consistently across the network. Compliance and Reporting: Maintain documentation related to security events and activities. Generate reports on security metrics and compliance status. Skill sets & Certification requirement: Certifications: CCNP, CCIE or equivalent, CompTIA Security+ Technical Skills: Basic understanding of network protocols and security concepts (firewalls, IDS/IPS, VPNs, etc.) Familiarity with security tools and log management systems Knowledge of operating systems and system administration practices Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are ou’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Skills And Experience Bachelor's degree in computer science, cybersecurity, or related field Entry-level experience in cybersecurity or network administration preferred Relevant security certifications (e.g., CompTIA Security+, Network+ ) can be beneficial 2+ Years of hands-on experience Other Important Skill Sets & Product Knowledge. Strong analytical and problem-solving abilities Attention to detail and ability to prioritize tasks Excellent communication skills to report findings and escalate issues Ability to work effectively in a team environment Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 1 month ago

Apply

8.0 years

0 Lacs

Mumbai, Maharashtra, India

Remote

Scope of Work: Support services shall cover monitoring, maintenance, management & daily BAU operations of Cyber Security technologies which include WAF, NAC, Anti-DDOS & DLP deployed in Mumbai and DRS at Gift City, Gujarat, Near Online Site (Mumbai) till one year from the onboarding of services. Resources will be deployed at Mumbai Office and remote support for DR site. Resource Level: L3 Minimum Experience: 8 Years OEM Certification: Resources must hold at least Two of the following industry- recognized certifications i.e. Certified Ethical Hacker (CEH), GIAC Security Essentials (GSEC), CompTIA Security+, Cisco Certified Cyber-Ops Professional, WAF, NAC, Anti-DDOS & DLP. Cyber Security Technologies: WAF, NAC, Anti-DDOS, DLP (ANY TWO)

Posted 1 month ago

Apply

5.0 years

0 Lacs

Delhi

On-site

As a member of the Support organization, your focus is to deliver post-sales support and solutions to the Oracle customer base while serving as an advocate for customer needs. This involves resolving post-sales non-technical customer inquiries via phone and electronic means, as well as, technical questions regarding the use of and troubleshooting for our Electronic Support Services. A primary point of contact for customers, you are responsible for facilitating customer relationships with Support and providing advice and assistance to internal Oracle employees on diverse customer situations and escalated issues. Oracle IDAM – Job Experience Requirement (5 -10 Years experience) Design, develop, implement, and support Oracle Identity and Access Management (IDAM) solutions including: Oracle Identity Manager (OIM) Oracle Access Manager (OAM) Oracle Unified Directory (OUD) Oracle Internet Directory (OID) Oracle Entitlements Server (OES) Administer and maintain user lifecycle management , role-based access controls, and single sign-on (SSO) mechanisms. Develop and manage custom connectors and provisioning workflows in OIM. Configure and troubleshoot authentication/authorization policies in OAM. Implement integrations with LDAP directories , Active Directory , WebLogic , and external applications . Support incident management , problem resolution , and performance tuning of Oracle IDAM components. Collaborate with internal security, compliance, and infrastructure teams to ensure regulatory compliance (e.g., SOX, GDPR). Execute patching, upgrades, and migrations of Oracle IDAM components. Perform regular health checks, log monitoring , and vulnerability assessments. Required Skills: Hands-on experience with Oracle IDAM Suite (11g/12c) . Strong understanding of SSO, Federation (SAML, OAuth, OpenID Connect) , and multi-factor authentication . Experience with WebLogic Server administration and Oracle DBs. Scripting knowledge (e.g., Shell, WLST, Python ) for automation and operations. Knowledge of REST/SOAP APIs and web service security. Familiarity with RBAC, ABAC, fine-grained access controls , and compliance reporting . Preferred Certifications: Oracle Certified Associate/Professional – Identity and Access Management Relevant security certifications (e.g., CISSP, CISA, CompTIA Security+ ) Oracle IDAM – Job Experience Requirement (5 -10 Years experience) Design, develop, implement, and support Oracle Identity and Access Management (IDAM) solutions including: Oracle Identity Manager (OIM) Oracle Access Manager (OAM) Oracle Unified Directory (OUD) Oracle Internet Directory (OID) Oracle Entitlements Server (OES) Administer and maintain user lifecycle management , role-based access controls, and single sign-on (SSO) mechanisms. Develop and manage custom connectors and provisioning workflows in OIM. Configure and troubleshoot authentication/authorization policies in OAM. Implement integrations with LDAP directories , Active Directory , WebLogic , and external applications . Support incident management , problem resolution , and performance tuning of Oracle IDAM components. Collaborate with internal security, compliance, and infrastructure teams to ensure regulatory compliance (e.g., SOX, GDPR). Execute patching, upgrades, and migrations of Oracle IDAM components. Perform regular health checks, log monitoring , and vulnerability assessments. Required Skills: Hands-on experience with Oracle IDAM Suite (11g/12c) . Strong understanding of SSO, Federation (SAML, OAuth, OpenID Connect) , and multi-factor authentication . Experience with WebLogic Server administration and Oracle DBs. Scripting knowledge (e.g., Shell, WLST, Python ) for automation and operations. Knowledge of REST/SOAP APIs and web service security. Familiarity with RBAC, ABAC, fine-grained access controls , and compliance reporting . Preferred Certifications: Oracle Certified Associate/Professional – Identity and Access Management Relevant security certifications (e.g., CISSP, CISA, CompTIA Security+ )

Posted 1 month ago

Apply

15.0 years

0 Lacs

Bengaluru

On-site

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Data Encryption Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Job Description: We are seeking a dedicated and detail-oriented Analyst to join our Identity and Access Management (IAM) team, supporting a major US-based client. The role focuses on Public Key Infrastructure (PKI) operations with additional responsibilities around Enterprise Key Management System (EKMS) and Identity governance tools. This is a hands-on operational role requiring support in a 24x7 environment, following a rotational shift model. Roles & Responsibilities: - Perform day-to-day operations of PKI services including certificate issuance, renewal, revocation, and monitoring. - Maintain and troubleshoot Certificate Authorities (CAs), Online Responders (OCSP), and Certificate Enrollment Web Services (CEP/CES). - Support integration and certificate management for enterprise applications, servers, network devices, and security appliances. - Execute and monitor certificate lifecycle management tasks and ensure compliance with security standards. - Troubleshoot SSL/TLS-related issues and assist with application-level binding of certificates (e.g., IIS, LDAPS, etc.). - Maintain service availability, perform routine health checks, and participate in DR/Resiliency testing. - Work closely with the IAM team on access control and authentication mechanisms where certificate-based auth is integrated. - Provide operational support for EKMS (Enterprise Key Management System) as an added advantage. - Follow ITIL processes for incident, change, and problem management. - Prepare and maintain SOPs, documentation, and runbooks for PKI and associated tools. Professional & Technical Skills: - Strong hands-on experience with Microsoft PKI, including Root and Subordinate CAs. - Experience in certificate lifecycle management for diverse enterprise environments. - Familiarity with Active Directory Certificate Services (ADCS). - Working knowledge of Online Responders, CEP/CES,NDES and Auto-Enrollment policies. - Knowledge on DigiCert certificates and management. - Good understanding of SSL/TLS protocols and digital certificates. - Basic scripting skills (PowerShell preferred) for automation of routine tasks. -IAM concepts and experience with directory services (Active Directory, Entra ID/Azure AD) is an added advantage. - Exposure to EKMS solutions (e.g., Thales, Venafi, or other HSM-integrated key management platforms) is a plus - Preferred Certifications:Microsoft certifications related to security or infrastructure.,CompTIA Security+, Certified PKI Professional (CPKI), or similar.,Azure Security, SC-300 or SC-900 (optional, for IAM). Additional Information: - The candidate should have minimum 3 years of experience. - This position is based at our Bengaluru office. - A 15 years full time education is required. 15 years full time education

Posted 1 month ago

Apply

5.0 years

5 - 9 Lacs

Bengaluru

On-site

Location Bangalore, Karnataka, 560100 Category Engineering / Information Technology Job Type Full time Job Id 1186287 No Guardicore Segmentation – Run and Maintain SME This role has been designed as ‘Hybrid’ with an expectation that you will work on average 2 days per week from an HPE office. Who We Are: Hewlett Packard Enterprise is the global edge-to-cloud company advancing the way people live and work. We help companies connect, protect, analyze, and act on their data and applications wherever they live, from edge to cloud, so they can turn insights into outcomes at the speed required to thrive in today’s complex world. Our culture thrives on finding new and better ways to accelerate what’s next. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. If you are looking to stretch and grow your career our culture will embrace you. Open up opportunities with HPE. Job Description: HPE Operations is our innovative IT services organization. It provides the expertise to advise, integrate, and accelerate our customers’ outcomes from their digital transformation. Our teams collaborate to transform insight into innovation. In today’s fast paced, hybrid IT world, being at business speed means overcoming IT complexity to match the speed of actions to the speed of opportunities. Deploy the right technology to respond quickly to market possibilities. Join us and redefine what’s next for you. What you’ll do: We are looking for an experienced Guardicore Segmentation Run and Maintain SME to manage the day-to-day operations, monitoring, troubleshooting, and optimization of our microsegmentation platform. This role is critical in ensuring that segmentation policies are operating effectively, systems are compliant, and issues are quickly identified and resolved with minimal business disruption. Key Responsibilities: Monitor and maintain the Guardicore Segmentation platform across on-prem and cloud environments. Act as the primary point of contact for operational issues, policy updates, and platform health. Perform regular health checks , ensure system stability, and escalate vendor-related issues when necessary. Analyze logs and alerts to detect anomalies, policy violations, or performance issues. Collaborate with infrastructure, application, and security teams to validate changes , update policy sets, and remediate policy conflicts. Ensure documentation is up-to-date, including operational procedures, escalation protocols, and known issue repositories. Support audits and compliance requests by providing relevant segmentation evidence and reports. Maintain operational SLAs , including incident response, change management, and patch management for Guardicore components. Proactively identify opportunities for process improvement , automation, and system optimization. What you need to bring: Required Qualifications: 5+ years of experience in security operations , network administration , or IT infrastructure support . Hands-on experience managing and maintaining Guardicore Centra (Akamai Guardicore Segmentation Platform). Solid understanding of network flows , segmentation rules, and firewall policy operations. Familiarity with change management processes , incident handling , and ticketing systems (e.g., ServiceNow, Jira). Strong troubleshooting and problem-resolution skills for security tools and network-related issues. Basic scripting ability (e.g., Python, Bash, PowerShell) for routine maintenance or data extraction. Preferred Skills: Experience supporting hybrid environments (on-prem + AWS/Azure/GCP). Knowledge of SIEM integration and log analysis (e.g., Splunk, QRadar). Familiarity with compliance frameworks (e.g., NIST, PCI, ISO 27001). Guardicore/Akamai certifications or related security certifications (Security+, Network+, or equivalent). Additional Skills: Accountability, Accountability, Action Planning, Active Learning (Inactive), Active Listening, Bias, Business Growth, Business Planning, Coaching, Commercial Acumen, Creativity, Critical Thinking, Cross-Functional Teamwork, Customer Experience Strategy, Customer Solutions, Data Analysis Management, Data Collection Management (Inactive), Data Controls, Design Thinking, Empathy, Follow-Through, Growth Mindset, Intellectual Curiosity (Inactive), Long Term Planning, Managing Ambiguity {+ 5 more} What We Can Offer You: Health & Wellbeing We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing. Personal & Professional Development We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have — whether you want to become a knowledge expert in your field or apply your skills to another division. Unconditional Inclusion We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. Let's Stay Connected: Follow @HPECareers on Instagram to see the latest on people, culture and tech at HPE. #india #operations Job: Services Job Level: Expert HPE is an Equal Employment Opportunity/ Veterans/Disabled/LGBT employer. We do not discriminate on the basis of race, gender, or any other protected category, and all decisions we make are made on the basis of qualifications, merit, and business need. Our goal is to be one global team that is representative of our customers, in an inclusive environment where we can continue to innovate and grow together. Please click here: Equal Employment Opportunity. Hewlett Packard Enterprise is EEO Protected Veteran/ Individual with Disabilities. HPE will comply with all applicable laws related to employer use of arrest and conviction records, including laws requiring employers to consider for employment qualified applicants with criminal histories.

Posted 1 month ago

Apply

8.0 years

6 - 9 Lacs

Bengaluru

On-site

(8-10 Years) Role Summary: We are seeking an experienced and highly motivated IT Manager to lead and build our internal technology infrastructure and operations. As our dedicated IT Manager, you will be pivotal in establishing secure, scalable, and efficient IT systems from the ground up. This role requires a hands-on leader who can manage all aspects of IT, from day-to-day support to strategic planning, ensuring our team has the tools and environment needed to thrive in a fast-paced startup. Mandatory Skill Sets/Expertise: 8+ years of progressive experience in IT roles, with a significant portion in an IT management or lead capacity, preferably within a fast-paced startup or high-growth environment. Strong hands-on experience with cloud platforms (e.g., AWS, Azure, Google Cloud), including managing cloud-based infrastructure and services. Proven expertise in network administration (TCP/IP, DNS, DHCP, VPNs, firewalls). Solid experience with endpoint management for macOS and Windows environments. Demonstrated knowledge and practical experience with cybersecurity principles, tools, and best practices. Experience with identity management systems (e.g., Okta, Azure AD, Google SSO). Proficiency in administering SaaS applications (e.g., Google Workspace/Microsoft 365, Slack, Jira) Experience in vendor management and IT procurement. Experience with IT budgeting and financial management. Good To Have: Relevant certifications (e.g., AWS Certified SysOps Administrator, CCNA, CompTIA Security+, ITIL). Experience implementing or maintaining compliance frameworks (ISO 27001, SOC 2). Scripting skills (e.g., Python, PowerShell) for automation. Prior experience in a DevOps or DevSecOps environment. Key Attributes: Good communication and customer service skills Adaptability and willingness to learn new technologies Excellent problem-solving skills and the ability to troubleshoot complex technical issues independently. Ability to work autonomously, prioritize tasks effectively, and adapt to a rapidly changing environment. Detail-oriented and committed to delivering high-quality solutions Ability to collaborate effectively in a team environment. Key Responsibilities: IT Infrastructure & Operations: Design, implement, and maintain scalable and secure IT infrastructure, including cloud environments (e.g., AWS, Azure, GCP), networking, servers, and storage solutions. Oversee all IT operations, ensuring high availability and performance of critical systems and applications. Manage and optimize network infrastructure, including Wi-Fi, VPN, firewalls, and routing. User Support & Management: Provide expert-level technical support for all internal employees, troubleshooting hardware, software, and network issues. Manage user accounts, access controls, and provisioning/de-provisioning across various systems (e.g., Google Workspace/Microsoft 365, internal applications) during onboarding & offboarding process. Develop and maintain documentation for IT processes, policies, and user guides. Cybersecurity & Compliance: Implement and enforce robust cybersecurity best practices, including endpoint security, identity management, data loss prevention, and incident response planning. Support in conducting regular security assessments, vulnerability scans, and penetration tests to identify and mitigate risks. Develop and maintain IT security policies and ensure compliance with relevant industry standards (e.g., ISO 27001, SOC 2, GDPR) as the company scales. Strategic Planning & Vendor Management: Develop and manage the IT budget, forecasting future needs and optimizing costs. Evaluate, select, and manage relationships with IT vendors, service providers, and software partners. Contribute to the strategic direction of the company’s technology roadmap, aligning IT initiatives with business goals. Hardware & Software Management: Procure, deploy, and manage company-owned hardware (laptops, monitors, peripherals) and software licenses. Implement and manage Mobile Device Management (MDM) solutions. Team Leadership & Development (Future): As the company grows, potentially build and mentor a small IT support team. Foster a culture of continuous improvement and learning within the IT function. Drop your CVs to joinourteam@accorian.com

Posted 1 month ago

Apply

5.0 years

3 - 7 Lacs

India

On-site

We are seeking an experienced and passionate Cybersecurity Trainer to join our team. The ideal candidate will have strong technical expertise in cybersecurity domains and a passion for teaching and mentoring. You will be responsible for delivering engaging, practical training sessions to students or professionals, preparing them for industry-recognized certifications and real-world challenges. Key Responsibilities: Design and deliver cybersecurity training programs (online/offline) Create course content, labs, quizzes, and study materials Provide guidance on certification paths like CEH, CompTIA Security+, CISSP, etc. Conduct assessments and provide feedback to learners Stay updated with the latest cybersecurity trends and tools Support learners in resolving queries and understanding concepts Assist in curriculum updates and improvements Required Skills & Qualifications: Minimum 5 years of experience in cybersecurity or related fields In-depth knowledge of cybersecurity fundamentals, network security, ethical hacking, vulnerability assessment, and risk management Hands-on experience with tools like Wireshark, Nmap, Metasploit, Burp Suite, etc. Familiarity with common cyber threats and mitigation strategies Strong communication and presentation skills Experience in mentoring or training others (formal or informal) Industry certifications preferred: CEH, CompTIA Security+, CISSP, CISA, etc. Job Type: Full-time Pay: ₹30,000.00 - ₹60,000.00 per month Application Question(s): Have you previously worked as a trainer or delivered technical workshops? Are you fluent in English and comfortable conducting technical sessions? Experience: teaching: 5 years (Preferred)

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies