Home
Jobs

691 Security+ Jobs - Page 6

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Ping Identity Good to have skills : NA Minimum 5 Year(s) Of Experience Is Required Educational Qualification : 15 years full time education Summary: As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting security controls, and transitioning to cloud security-managed operations, all while ensuring compliance with industry standards and best practices. Roles & Responsibilities: -Designing and Implementing IAM Solutions: -Utilizing PingOne DaVinci to design, implement, and maintain secure identity and access management solutions. -Creating and configuring applications within PingOne DaVinci. -Configuring flow policies for applications. -Designing and implementing authentication, registration, MFA, and password reset flows. -Integrating PingOne DaVinci flows into web applications using various methods (widget, API calls, OIDC, SAML). -Integrating PingOne SSO and identities within DaVinci flows. -Working with OAuth, OIDC, SAML, and Header-based authentication. -PingOne DaVinci Management and Development: -Managing PingOne DaVinci environments and connectors. -Creating, maintaining, testing, troubleshooting, and implementing identity orchestration flows. -Importing and exporting flows and creating/using subflows to manage complexity. -Configuring input and output schemas. -Expanding flow functionality with custom JavaScript. -Managing multiple flow versions. -Creating and configuring connector instances (e.g., HTTP, Challenge, Flow Conductor, Function, Code Snippet). -Building basic user interactions with DaVinci flows and customizing HTML templates for user experience. -Providing L1/L2 daily run support for PingOne CIAM platform, including user provisioning, authentication flows, and policy enforcement. -Monitoring platform health and performance, responding to alerts. -Troubleshooting and resolving incidents related to SSO, MFA, token exchanges, and directory syncs. -Supporting application onboarding and integration with PingOne. -Performing routine access reviews, audit log reviews, and user lifecycle management tasks. -Maintaining and updating runbooks, knowledge articles, and SOPs. -Collaborating with engineering and IAM architecture teams for issue escalation and permanent fixes. -Collaboration and Testing: -Participating in Scrum calls and other agile ceremonies. -Performing application unit and smoke testing. -Conducting A/B testing for user journey optimization. Professional & Technical Skills: -Strong expertise in PingOne DaVinci: In-depth understanding of its features, flow building, connector functionality, and application integration. -Identity and Access Management (IAM) Concepts: Solid understanding of federation, single sign-on (SSO), OAuth, OpenID Connect (OIDC), SAML, MFA, and related protocols. -Ping Identity Products: Experience with other Ping Identity products such as Ping Access, Ping Federate, Ping Directory, PingID, and PingOne for Customers/Workforce. -Directory Services: Experience with LDAP, Azure AD, and other cloud directories. -Programming/Scripting: Proficiency in JavaScript for custom flow functionality. Familiarity with API tools (e.g., Postman) and basic scripting (Shell, Python) for automation and diagnostics is often a plus. -API Integration: Experience with REST APIs and JSON. -Cloud Environments: Familiarity with IaaS and PaaS cloud environments (e.g., AWS, Azure). -Strong analytical and troubleshooting abilities to identify and resolve complex IAM issues. -Ability to design optimal solutions based on customer requirements. -Experience working in Agile/Scrum environments. -Understanding of ITIL-based environments (Incident, Change, Problem Management) is often preferred. -Certifications (Desired, not always mandatory): -Ping Identity Certified Professional – PingOne DaVinci. -Other Ping Identity certifications (e.g., PingFederate, PingAccess, PingDirectory). -CompTIA Security+, Certified Identity and Access Manager (CIAM), or equivalent. -This type of role is crucial for organizations looking to build seamless, secure, and optimized user experiences through intelligent identity orchestration. Additional Information: - The candidate should have minimum 5 years of experience in Ping Identity. - This position is based at our Gurugram office. - A 15 years full time education is required.

Posted 1 week ago

Apply

7.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Location(s) Posting Location: Noida, India City/Cities Noida Country India Working Schedule Full-Time Work Arrangement Hybrid Relocation Assistance Available No Posted Date 30-May-2024 Job ID 3094 Description And Requirements Position Summary The Firewall and Network Security Senior Analyst works to continuously improve MetLife’s cybersecurity posture by providing firewall and network device security subject matter expertise. This role will primarily manage and improve the process to ensure enterprise firewalls and network devices (routers, switches and wireless access points) are adequately secured and monitored. In addition to strong technical knowledge of firewalls and other network devices, this role requires a high level of organization, excellent communication/collaboration skills with peers and all levels of management, and the ability to influence and to quickly re-prioritize and pivot as threats and objectives change. Key Responsibilities Ensure security tools designed to perform periodic network device assessments and validate that they meet compliance standards and are updated Ensure security standards and baseline policies are in place on critical applications that are hosted on SaaS WAF tool Gain a solid understanding of firewalls’ various security features and help deploy those features efficiently. Work with the firewall engineering team to ensure firewalls are properly configured according to industry best practices and MetLife standards Maintain and enhance IDS/IPS standards; Document, review and approve traffic configuration rules Responsible for helping create a firewall analytics and dashboarding process based on Splunk Maintain and document security policy and standards for all authorized network devices (Firewalls, routers, switches, wireless access points). Proactively identify and make recommendations on potential security issues and solutions. Knowledge, Skills And Abilities Education Bachelor’s degree in computer science, information systems or related field, or equivalent work experience Experience Candidate must have a combined minimum of 7 years hands on experience in the fields of IT and Cyber Security Experience managing, implementing, and supporting the core functions of Akamai Kona Site Defender Experience with Cisco routers, Palo Alto firewalls; Experience with AP's and Wireless Controllers; Experience with SolarWinds Network Performance Monitor and Network Configuration Manager; Ability to interpret PCAPs; Experience with BlueCoat, WAF; Familiar with CSC 11,12,15 Knowledge and skills (general and technical) Strong grasp of operational processes, IT general controls, security controls and vulnerability management Candidate must have experience working in complex, diverse and international environments and possess excellent communication and presentation skills Ability to lead and influence team members and cross-functional teams Experience managing projects involving interdepartmental teams and external vendors / third parties Experience in application security best practices and how to mitigate common attack vectors Other Requirements (licenses, Certifications, Specialized Training – If Required) Ability to perform basic scripting to analyze and automate repeatable processes Relevant industry certifications such as CISM, CISSP, CISA, CCNA-Security, Security+, MCSE, GSEC, GIAC, PMP, LEAN and Six Sigma are desired Working Relationships Internal Contacts (and Purpose Of Relationship) All Internal GOSC Stake Holders External Contacts (and purpose of relationship) – If Applicable Stateside Client/ Engineers from different regional Security teams About MetLife Recognized on Fortune magazine's list of the 2025 "World's Most Admired Companies" and Fortune World’s 25 Best Workplaces™ for 2024, MetLife , through its subsidiaries and affiliates, is one of the world’s leading financial services companies; providing insurance, annuities, employee benefits and asset management to individual and institutional customers. With operations in more than 40 markets, we hold leading positions in the United States, Latin America, Asia, Europe, and the Middle East. Our purpose is simple - to help our colleagues, customers, communities, and the world at large create a more confident future. United by purpose and guided by empathy, we’re inspired to transform the next century in financial services. At MetLife, it’s #AllTogetherPossible. Join us!

Posted 1 week ago

Apply

0 years

0 Lacs

Guindy, Tamil Nadu, India

Remote

Linkedin logo

Req ID: 127121 Remote Position: No Region: Asia Country: India State/Province: Chennai City: Guindy, Chennai Summary Position Summary: The Cybersecurity Fresher Hire will work alongside experienced cybersecurity professionals to gain practical experience in various aspects of information security. This role will provide hands-on training and mentorship, enabling the successful candidate to develop a strong foundation in cybersecurity principles and practices. The ideal candidate will be eager to learn, possess a strong work ethic, and demonstrate a genuine passion for cybersecurity. Detailed Description Responsibilities Assist in monitoring security systems and logs for potential security incidents. Participate in security assessments and vulnerability scans. Support the implementation and maintenance of security tools and technologies. Contribute to the development and maintenance of security documentation and procedures. Assist in incident response activities, including data collection and analysis. Stay up-to-date on the latest cybersecurity threats and trends. Collaborate with other IT teams to ensure security best practices are followed. Perform1 basic security configuration tasks as directed. Participate in security awareness training and initiatives. Assist in the creation of basic security reports. Knowledge/Skills/Competencies Required Skills And Qualifications Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field (or equivalent2 coursework/certifications). Basic understanding of networking concepts (TCP/IP, DNS, etc.). Familiarity with operating systems (Windows, Linux). Knowledge of cybersecurity principles and concepts (firewalls, intrusion detection, etc.). Strong analytical and problem-solving skills. Excellent communication and interpersonal skills. Ability to work independently and as part of a team.3 Strong work ethic and attention4 to detail. Eagerness to learn and adapt to new technologies. Basic scripting knowledge (e.g., Python, Bash) is a plus. Relevant certifications (e.g., CompTIA Security+, Network+) are a plus. Genuine interest in pursuing a career in cybersecurity. Preferred Skills (Optional) Experience with security tools (e.g., Wireshark, Nmap). Knowledge of security frameworks (e.g., NIST, ISO 27001). Understanding of cloud security concepts. Experience in a lab environment dealing with virtual machines. Training And Development On-the-job training and mentorship from experienced cybersecurity professionals. Opportunities to pursue relevant industry certifications. Access to internal and external training resources. Exposure to various cybersecurity domains. Benefits Competitive salary and benefits package. Opportunity to work in a dynamic and growing field. Career advancement opportunities. Supportive and collaborative work environment. To Apply: Please submit your resume, cover letter, and any relevant certifications or projects to [email address/application portal]. Note: This job description is intended to provide a general overview of the responsibilities and qualifications for this position. It is5 not intended to be an exhaustive list of all duties and responsibilities. The company reserves the right to modify this job description as needed. Physical Demands Duties of this position are performed in a normal office environment. Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. Repetitive manual movements (e.g., data entry, using a computer mouse, using a calculator, etc.) are frequently required. Typical Experience Typical Education Bachelor's Degree or consideration of an equivalent combination of education and experience. Educational Requirements may vary by Geography Notes This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time. Celestica is an equal opportunity employer. All qualified applicants will receive consideration for employment and will not be discriminated against on any protected status (including race, religion, national origin, gender, sexual orientation, age, marital status, veteran or disability status or other characteristics protected by law). At Celestica we are committed to fostering an inclusive, accessible environment, where all employees and customers feel valued, respected and supported. Special arrangements can be made for candidates who need it throughout the hiring process. Please indicate your needs and we will work with you to meet them. Company Overview Celestica (NYSE, TSX: CLS) enables the world’s best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development – from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers. Celestica would like to thank all applicants, however, only qualified applicants will be contacted. Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services.

Posted 1 week ago

Apply

3.0 years

0 Lacs

Kerala, India

On-site

Linkedin logo

About The Job We are seeking a skilled Cyber Security Engineer to join our team in Kochi. In this role, you will play a crucial part in safeguarding our digital assets and ensuring the integrity of our systems. About If you are passionate about cybersecurity, enjoy tackling complex challenges, and thrive in a dynamic environment, we want to hear from : Implement and manage security measures to protect systems, networks, and data. Conduct vulnerability assessments and penetration testing. Monitor security incidents and respond in a timely manner to mitigate risks. Collaborate with cross-functional teams to ensure security best practices are integrated into all aspects of our technology stack. Stay updated on emerging threats and trends in cybersecurity to proactively address potential : Bachelors degree in Computer Science, Information Technology, or a related field. 3+ years of experience in cybersecurity roles, with a proven track record in implementing security solutions. Strong understanding of networking protocols, security standards, and risk assessment methodologies. Hands-on experience with security tools such as SIEM, IDS/IPS, endpoint protection, etc. Relevant certifications (e.g., CISSP, CEH, CompTIA Security+) preferred. Excellent analytical and problem-solving skills with a keen attention to detail. Ability to work independently and collaboratively in a fast-paced : Competitive salary and performance-based incentives. Opportunities for professional growth and development. Comprehensive health benefits package. Dynamic and inclusive work culture with a focus on innovation. Join Talrop in defending our digital future (ref:hirist.tech)

Posted 1 week ago

Apply

3.0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

Key Accountabilities Support Parexel end users, clients, stakeholder and partners via call, chat, and email mediums Act as a 24x7 support point to IT Infrastructure / Applications /Site Services support teams. Provide 1st line diagnosis and ticket resolution Log all relevant incidents / Service requests details into the ticketing tool based on priority seriousness and categorization Escalate incidents and requests to appropriate service department for Level 2 & 3 resolution Adhere to work instructions and processes defined in SOPs Adhere to defined SLAs, KPIs and quality metrics to achieve IT goals Own the tickets and follow up until resolution on user behalf, communicate with end-users keeping them informed of ticket progress and its changes to deliver positive customer experience Update knowledge base with up-to-date relevant information as and when needed Report identified challenges and improvement opportunities to drive CSI Manage support queues to ensure all tickets are actioned on time Pro-actively identify system impacting issues through the analysis of user calls and tickets. Perform real-time tier 1 troubleshooting via remote access to system components to isolate, manage and resolve issues. Coordinates and tracks all maintenance activities. Manage the intake of information and record accurately. Develop and maintain positive communications between IT Infrastructure / IT Applications / IT Operations Use acquired knowledge to influence and improve IT practices and technologies. Skills Open minded and ready to learn and absorb things. Excellent interpersonal, verbal, and written communication skills Excellent problem-solving skills Customer focused approach to work; excellent customer service skills Experience in working with Incident / Service Requests. Experience in handling calls, Chats, and emails from global users and effectively able to communicate remediate their queries and issues Capable to handle VIP users and user escalations Good experience in desktop support and operations, including PC and User support Good experience in troubleshooting PC OS, Software, and PC accessories Ability to handle multiple tasks concurrently. Ground concepts of networking, windows, MS Office, and other application environments Windows 2008/2012 knowledge, understanding of active directory, basic knowledge ITSD tools like remote software, software installation services etc. Basic Knowledge of ITIL processes like Major incidents, Problem and Change. Strong verbal and written communication skills required. Ability to effectively communicate with all levels of personnel. Perform shift handover activities Must work well in a team environment. Desired Academic & Good to have Professional Qualification Graduate (10+2+3) or (10+2+4) : (BE/B.Tech/B.Sc/BCA) IT Security : CCNA (Security)/ CompTIA Security+ /RHCSS (Red Hat Certified Security Specialist)/ECSA (EC Council Certified Security Analyst) Networking : CCNA (Routing and Switching or Voice) / CompTIA Network+ Systems (Servers) : MCSE / MCITP/MCP/ RHCSA (Red Hat Certified System Administrator)/ VCP (VMware Certified Professional) Applications(Databases) : OCA (Oracle Certified Database Administrator)/ MCDBA/MCSA (SQL Server)/MCSD (Web Applications)/ SCJA (Sun Certified Java Associate) Language Skills English (Written & Verbal) Expertise Minimum Work Experience Total Work Experience: 3+ year. Relevant Work Experience : 6 months

Posted 1 week ago

Apply

0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Embark your transformative journey as Vice President Cyber Operations. You will work as an Incident Response T3 Analyst at Barclays and become a crucial defender of our digital landscape. In this role, you will be instrumental in protecting our systems and data, ensuring its confidentiality, integrity and availability. As a key member of the Cyber Operations Team, your insights will significantly impact our ability to proactively identify, thoroughly investigate, and effectively neutralize security threats. You will focus on rapid response, meticulous containment, and continuous improvement, collaborating closely with security engineers, threat intelligence experts, and key stakeholders across the organization. To be successful as Vice President Cyber Operations, you should have experience with: Security Information and Event Management (SIEM) platforms (e.g., Splunk, QRadar, etc) for real-time monitoring, correlation and analysis of security events. Endpoint Detection and Response (EDR) tools (e.g., CrowdStrike) for threat detection, investigation and response on endpoints. Incident response methodologies (e.g., NIST, SANS) and frameworks for handling security incidents effectively. Operating systems (Windows, Linux, macOS) and networking concepts for understanding system behavior and network traffic. Security tools and technologies such as firewalls, intrusion detection/prevention systems (IDS/IPS), vulnerability scanners and penetration testing tools. Additional Relevant Skills Include Analyzing security logs and events to identify potential security threats and incidents,Conducting initial triage and analysis of security incidents to determine scope, severity and impact. Following established incident response procedures to contain, eradicate and recover from security incidents and hands-on experience in analyzing high priority large scale Cyber Incidents. *Experience with Cyber Regulatory Exercises and create Work Instructions for Junior analysts to work on Cyber Incidents. Documenting security incidents thoroughly and accurately, including details of the incident, actions taken and lessons learned and communicating effectively with technical and non-technical stakeholders regarding security incidents. Experience with threat intelligence platforms and sources for staying up-to-date on the latest threats and vulnerabilities Knowledge of malware analysis and reverse engineering techniques for understanding malicious software, scripting skills (e.g., Python, PowerShell) for automating incident response tasks. Certifications such as CompTIA Security+, GSEC, GCIH, GPEN, GCFA, CISM, CISSP. You may be assessed on the key critical skills relevant for success in role, such as risk and controls, change and transformation, business acumen strategic thinking and digital and technology, as well as job-specific technical skills. This role is for Pune Location. Purpose of the role To monitor the performance of operational controls, implement and manage security controls and consider lessons learnt in order to protect the bank from potential cyber-attacks and respond to threats. Accountabilities Management of security monitoring systems, including intrusive prevention and detection systems, to alert, detect and block potential cyber security incidents, and provide a prompt response to restore normal operations with minimised system damage. Identification of emerging cyber security threats, attack techniques and technologies to detect/prevent incidents, and collaborate with networks and conferences to gain industry knowledge and expertise. Management and analysis of security information and event management systems to collect, correlate and analyse security logs, events and alerts/potential threats. Triage of data loss prevention alerts to identify and prevent sensitive data for being exfiltrated from the banks network. Management of cyber security incidents including remediation & driving to closure. Vice President Expectations Advise key stakeholders, including functional leadership teams and senior management on functional and cross functional areas of impact and alignment. Manage and mitigate risks through assessment, in support of the control and governance agenda. Demonstrate leadership and accountability for managing risk and strengthening controls in relation to the work your team does. Demonstrate comprehensive understanding of the organisation functions to contribute to achieving the goals of the business. Collaborate with other areas of work, for business aligned support areas to keep up to speed with business activity and the business strategies. Create solutions based on sophisticated analytical thought comparing and selecting complex alternatives. In-depth analysis with interpretative thinking will be required to define problems and develop innovative solutions. Adopt and include the outcomes of extensive research in problem solving processes. Seek out, build and maintain trusting relationships and partnerships with internal and external stakeholders in order to accomplish key business objectives, using influencing and negotiating skills to achieve outcomes. All colleagues will be expected to demonstrate the Barclays Values of Respect, Integrity, Service, Excellence and Stewardship – our moral compass, helping us do what we believe is right. They will also be expected to demonstrate the Barclays Mindset – to Empower, Challenge and Drive – the operating manual for how we behave.

Posted 1 week ago

Apply

0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Embark your transformative journey as Vice President Cyber Operations. You will work as an Incident Response T3 Analyst at Barclays and become a crucial defender of our digital landscape. In this role, you will be instrumental in protecting our systems and data, ensuring its confidentiality, integrity and availability. As a key member of the Cyber Operations Team, your insights will significantly impact our ability to proactively identify, thoroughly investigate, and effectively neutralize security threats. You will focus on rapid response, meticulous containment, and continuous improvement, collaborating closely with security engineers, threat intelligence experts, and key stakeholders across the organization. To be successful as Vice President Cyber Operations, you should have experience with: Security Information and Event Management (SIEM) platforms (e.g., Splunk, QRadar, etc) for real-time monitoring, correlation and analysis of security events. Endpoint Detection and Response (EDR) tools (e.g., CrowdStrike) for threat detection, investigation and response on endpoints. Incident response methodologies (e.g., NIST, SANS) and frameworks for handling security incidents effectively. Operating systems (Windows, Linux, macOS) and networking concepts for understanding system behavior and network traffic. Security tools and technologies such as firewalls, intrusion detection/prevention systems (IDS/IPS), vulnerability scanners and penetration testing tools. Additional Relevant Skills Include Analyzing security logs and events to identify potential security threats and incidents,Conducting initial triage and analysis of security incidents to determine scope, severity and impact. Following established incident response procedures to contain, eradicate and recover from security incidents and hands-on experience in analyzing high priority large scale Cyber Incidents. *Experience with Cyber Regulatory Exercises and create Work Instructions for Junior analysts to work on Cyber Incidents. Documenting security incidents thoroughly and accurately, including details of the incident, actions taken and lessons learned and communicating effectively with technical and non-technical stakeholders regarding security incidents. Experience with threat intelligence platforms and sources for staying up-to-date on the latest threats and vulnerabilities Knowledge of malware analysis and reverse engineering techniques for understanding malicious software, scripting skills (e.g., Python, PowerShell) for automating incident response tasks. Certifications such as CompTIA Security+, GSEC, GCIH, GPEN, GCFA, CISM, CISSP. You may be assessed on the key critical skills relevant for success in role, such as risk and controls, change and transformation, business acumen strategic thinking and digital and technology, as well as job-specific technical skills. This role is for Pune Location. Purpose of the role To monitor the performance of operational controls, implement and manage security controls and consider lessons learnt in order to protect the bank from potential cyber-attacks and respond to threats. Accountabilities Management of security monitoring systems, including intrusive prevention and detection systems, to alert, detect and block potential cyber security incidents, and provide a prompt response to restore normal operations with minimised system damage. Identification of emerging cyber security threats, attack techniques and technologies to detect/prevent incidents, and collaborate with networks and conferences to gain industry knowledge and expertise. Management and analysis of security information and event management systems to collect, correlate and analyse security logs, events and alerts/potential threats. Triage of data loss prevention alerts to identify and prevent sensitive data for being exfiltrated from the banks network. Management of cyber security incidents including remediation & driving to closure. Vice President Expectations Advise key stakeholders, including functional leadership teams and senior management on functional and cross functional areas of impact and alignment. Manage and mitigate risks through assessment, in support of the control and governance agenda. Demonstrate leadership and accountability for managing risk and strengthening controls in relation to the work your team does. Demonstrate comprehensive understanding of the organisation functions to contribute to achieving the goals of the business. Collaborate with other areas of work, for business aligned support areas to keep up to speed with business activity and the business strategies. Create solutions based on sophisticated analytical thought comparing and selecting complex alternatives. In-depth analysis with interpretative thinking will be required to define problems and develop innovative solutions. Adopt and include the outcomes of extensive research in problem solving processes. Seek out, build and maintain trusting relationships and partnerships with internal and external stakeholders in order to accomplish key business objectives, using influencing and negotiating skills to achieve outcomes. All colleagues will be expected to demonstrate the Barclays Values of Respect, Integrity, Service, Excellence and Stewardship – our moral compass, helping us do what we believe is right. They will also be expected to demonstrate the Barclays Mindset – to Empower, Challenge and Drive – the operating manual for how we behave. Back to nav Share job X(Opens in new tab or window) Facebook(Opens in new tab or window) LinkedIn(Opens in new tab or window)

Posted 1 week ago

Apply

0 years

0 Lacs

Delhi Cantonment, Delhi, India

On-site

Linkedin logo

Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Security Consultant is a seasoned level role, responsible for translating clients’ cybersecurity requirements and customizing and implementing security solutions into specific systems, applications and product designs. This role identifies and develops the security solutions for clients using company products, outsourced technology solutions and technical tools. This role consults with clients regarding secure product configuration, deployment, and security patches to minimize security vulnerabilities and provides comprehensive scanning, penetration testing, vulnerability assessments, monitoring services and source code analysis and delivers detailed results to clients. This role guides and supports clients in the development and implementation of product security controls. What You'll Be Doing Key Responsibilities: Works on strategic projects that ensure the efficient and effective reaction to security breaches to mitigate immediate and potential threats. Uses mitigation, preparedness, response and recovery approaches to minimize business disruptions and commercial consequences. Offers detailed technical support investigation and analysis response activities and evaluate the effectiveness of and improvements to existing practices. Conducts regular threat and vulnerability assessments and determine deviations from acceptable configurations or policies. Participates in the assessment of the level of risk and support the development of appropriate mitigation countermeasures in operational and non-operational situations. Analyzes evidence to support network vulnerability mitigation. Supports peers in the management and implementation of the information security management system. Participates in the implementation of policies, processes and guidelines to ensure the standardization of security management throughout the organization. Applies tactics, techniques, and procedures to a full range of tools and processes related to administrative, criminal, and counterintelligence gathering (e.g., in-depth case analyses, continuous monitoring, malware analysis, clear documentation). Proactively searches through our critical infrastructure, systems and networks to detect and isolate advanced threats that may cause harm to our organization. Use both manual approaches and automated tools to identify, analyze, and report events and support the development of countermeasures to proactively protect against these threats in the future. Knowledge and Attributes: Strong understanding of information technology and information security Solid understanding of security risks and preventative controls Excellent understanding of security operational processes and controls Service consulting aptitude, focusing on the business, service and sales aspects Excellent verbal and written communication skills Demonstrate impeccable attention to detail are able to translate internal customer requirements into solutions Maintain up-to-date knowledge of security threats, countermeasures, security tools, and network technologies High level of drive and ability to work under pressure Ability to build and maintain cross-functional relationships with a variety of stakeholders Understanding of relevant laws, regulations, and compliance frameworks affecting the technology sector. Good ability to assess and manage cybersecurity risks at both organizational and project levels. Good knowledge of security frameworks and standards like NIST, ISO/IEC 27001, CIS, etc. Academic Qualifications and Certifications: Bachelor's degree or equivalent in Information Technology or Computer Science or Engineering or related field. Industry relevant certifications such as CISSP, CISM, CEH, GSEC or CompTIA Security+ essential. Required Experience: Seasoned demonstrable experience in the Information Technology Security Industry or relevant experience in similar role within a related environment. Seasoned experience with security architecture design principles. Seasoned experience with industry compliance and standards such as ISO 27000, PCI DSS, NIST, HIPAA or others. Seasoned experience with security tools and techniques to cover SANS Top 25, OWASP or others. Seasoned experience working in a multi-team environment across multiple geographies. Workplace type: Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.

Posted 1 week ago

Apply

0 years

0 Lacs

Delhi Cantonment, Delhi, India

On-site

Linkedin logo

Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Senior Associate Security Consultant is responsible for developing expertise in their area of specialization. This role is responsible for translating clients’ cybersecurity requirements and customizing and implementing security solutions into specific systems, applications and product designs. This role identifies and develops the security solutions for clients using company products, outsourced technology solutions and technical tools. This role consults with clients regarding secure product configuration, deployment, and security patches to minimize security vulnerabilities. In addition, this role provides comprehensive scanning, penetration testing, vulnerability assessments, monitoring services and source code analysis and delivers detailed results to clients, as well as guides and supports clients in the development and implementation of product security controls. What You'll Be Doing Key Responsibilities: Assists in conducting security assessments, vulnerability scans, and penetration tests to identify weaknesses in client systems. Analyzes security data, logs, and reports to detect and investigate security incidents or anomalies. Prepares and maintains documentation, including security assessment reports, findings, and recommendations. Collaborates with senior consultants to provide advice and support to clients on security best practices and risk mitigation strategies. Learns and uses various security tools and technologies for assessments and monitoring. Stays updated on the latest cybersecurity threats, vulnerabilities, and industry best practices. Assists in evaluating client systems for compliance with industry standards (e.g., ISO 27001, NIST) and regulatory requirements. Communicates effectively with clients to understand their security needs and concerns. Participates in training programs and certifications to develop expertise in cybersecurity. Knowledge and Attributes: Strong interest in cybersecurity and a desire to learn and grow in the field. Knowledge of basic cybersecurity concepts, principles, and best practices. Familiarity with common security tools and technologies is a plus. Excellent analytical and problem-solving skills. Effective communication skills, both written and verbal. Ability to work collaboratively in a team environment. Eagerness to stay up to date with the evolving cybersecurity landscape. Academic Qualifications and Certifications: Bachelor's degree or equivalent in Information Technology or Computer Science or Engineering or related field. Industry relevant certifications such as CISSP, CISM, CEH, GSEC or CompTIA Security+ essential. Required Experience: Moderate level of demonstrable experience in the Information Technology Security Industry or relevant experience in similar role within a related environment. Moderate level of experience with security architecture design principles. Moderate level of experience with industry compliance and standards such as ISO 27000, PCI:DSS, NIST, HIPAA or others. Moderate level of experience with security tools and techniques to cover SANS Top 25, OWASP or others. Workplace type: Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.

Posted 1 week ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Managed Services Information Security Analyst is a seasoned subject matter expert, responsible for working with security tools and other security teams to monitor, analyze, interpret and report on the incoming client data for the purpose of delivering security information and recommendations to the clients, enabling the organization to deliver the contracted security services. This role includes performing tasks such as security incident detection and response, security event reporting, threat hunting, content maintenance (tuning) and interacting with clients to ensure their understanding of the information generated, recommending client system changes as well as answering security related queries from the clients. What You'll Be Doing Key Responsibilities: Works as part of a global Cyber Defense Centre (CDC) team that works 24/7 on rotational shifts. Works with client stakeholders and relevant internal teams to tune the MSSP platform and client SIEM to enable more efficient detection, analysis and reporting. Monitors security tools to review and analyze security logs from client environments. Generates continuous improvement ideas for supported security tools/technologies, to enable improvements to the company services, employee experience and client experience. Adheres to SOPs, customer Run Books and standard processes to ensure a globally consistent delivery whilst also proposing changes and improvements to these standards. Utilizes and documents best practices and amends existing documentation as required. Identifies opportunities to make automations which will help the clients and security delivery teams. Performs security incident handling and response from several vectors including End Point Protection and Enterprise Detection and response tools, attack analysis, malware analysis, network forensics, computer forensics., Utilizes a broad range of skills in LAN technologies, Windows and Linux O/S’s, and general security infrastructure. Ensures usage of knowledge articles in incident diagnosis and resolution and assists with updating as and when required. Performs defined tasks to inform and monitor service delivery against service level agreements and maintain records of relevant information. Undertakes threat hunting activities across both individual client estates, as well as cross client hunting. Manages unresolved incidents and follows up until incidents are resolved. Works closely with client delivery teams to support their activities related to client delivery. Cooperates closely with colleagues to share knowledge and build a cohesive and effective team environment, benefiting the individual, the business and the client. Performs any other related task as required. Customer interactions and attending bridge calls to work with customers and relative technical teams. Understanding of threat hunt methodologies and perform threat hunting. Knowledge and Attributes: Seasoned knowledge on implementation and monitoring of a company supported SIEM or security tools/technologies/concepts. Seasoned knowledge on security architecture, worked across different security technologies. Seasoned knowledge and understanding of the operation of modern computer systems and networks and how they can be compromised. Displays excellent customer service orientation and pro-active thinking. Displays problem solving abilities and is highly driven and self-organized. Excellent attention to detail. Excellent analytical and logical thinking. Excellent spoken and written communication abilities. Team player with the ability to work well with others and in group with colleagues and stakeholders. Ability to remain calm in pressurized situations. Ability to keep current on emerging trends and new technologies in area of specialization. Academic Qualifications and Certifications: Bachelor's degree or relevant qualification in Information Technology or Computing or a related field. Security certifications such as (but not limited to) AZ-500, SC-200, Security+, CEH, CISSP, CISM or similar Certification in different networking technologies such as CCNA, JNCIA, ACCA, PCNSA, CCSA is advantageous. Required Experience: Seasoned experience in SOC Analysis Operations. Seasoned experience in SIEM usage for investigations. Seasoned experience in Security technologies such as (but not limited to) Firewall, IPS, IDS, Proxy. Seasoned experience in dealing with technical support to clients. Seasoned experience in handling security incidents end to end. Seasoned experience in configuring/managing security controls, such as SIEM, Firewall, IDS/IPS, EDR, NDR, UTM, Proxy, SOAR, Honeypots and other security tools. Seasoned experience in Security Analysis or Engineering preferably gained within a global services organization. Workplace type: Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.

Posted 1 week ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Associate Managed Services Information Security Analyst is an entry level subject matter expert, responsible for monitoring, analyzing, interpreting and reporting on the incoming client data for the purpose of delivering security information and recommendations to the clients, enabling the organization to deliver the contracted security services. This role includes performing tasks such as security incident detection and response, security event reporting, threat hunting, content maintenance (tuning) and interacting with clients to ensure their understanding of the information generated, recommending client system changes as well as answering security related queries from the clients. This is an entry level role within the Managed Services Information Security Analyst team and works under guidance of more experienced analysts within the team. What You'll Be Doing Key Responsibilities: Works as part of a global Cyber Defense Centre (CDC) team that works 24/7 on rotational shifts. Works with client stakeholders and relevant internal teams to tune the MSSP platform and client SIEM to enable more efficient detection, analysis and reporting. Under guidance, generates continuous improvement ideas for supported security tools/technologies, to enable improvements to the company services, employee experience and client experience. Adheres to SOPs, customer Run Books and standard processes to ensure a globally consistent delivery whilst also proposing changes and improvements to these standards. Utilizes and document best practices and amend existing documentation as required. Support with security incident handling and response from several vectors including End Point Protection and Enterprise Detection and response tools, attack analysis, malware analysis, network forensics, computer forensics. Learns and utilizes a broad range of skills in LAN technologies, Windows and Linux O/S’s, and general security infrastructure. Ensures usage of knowledge articles in incident diagnosis and resolution. Under guidance, perform defined tasks to inform and monitor service delivery against service level agreements and maintain records of relevant information. Cooperates closely with colleagues to share knowledge and build a cohesive and effective team environment, benefiting the individual, the business and the client. Performs any other related task as required. Knowledge and Attributes: Knowledge on implementation and monitoring of a company supported SIEM or security tools/technologies/concepts. Knowledge on security architecture, worked across different security technologies. Knowledge and understanding of the operation of modern computer systems and networks and how they can be compromised. Displays excellent customer service orientation and pro-active thinking. Displays problem solving abilities and is highly driven and self-organized. Good attention to detail. Displays analytical and logical thinking. Well spoken and written communication abilities. Ability to remain calm in pressurized situations. Ability to keep current on emerging trends and new technologies in area of specialization. Academic Qualifications and Certifications: Bachelor's degree or relevant qualification in Information Technology or Computing or a related field. Security certifications such as (but not limited to) AZ-500, SC-200, Security+, CEH, CISSP, CISM or similar Certification in different networking technologies such as CCNA, JNCIA, ACCA, PCNSA, CCSA is advantageous. Required Experience: Entry level experience in SOC Analysis Operations. Entry level experience in SIEM usage for investigations. Entry level experience in Security technologies such as (but not limited to) Firewall, IPS, IDS, Proxy. Entry level experience in dealing with technical support to clients. Entry level experience in handling security incidents end to end. Entry level experience in configuring/managing security controls, such as SIEM, Firewall, IDS/IPS, EDR, NDR, UTM, Proxy, SOAR, Honeypots and other security tools. Entry level experience in Security Analysis or Engineering preferably gained within a global services organization. Workplace type: Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.

Posted 1 week ago

Apply

6.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

NationsBenefits is the leading provider of supplemental benefits, flex cards, and member engagement solutions that partners with managed care organizations to provide innovative healthcare solutions designed to drive growth, improve outcomes, reduce costs, and delight members. Our comprehensive suite of innovative supplemental benefits, payments platform, and member engagement solutions help health plans deliver high-quality benefits to their members, addressing social determinants of health and improving member health outcomes and satisfaction. With a compliance-focused infrastructure, proprietary technology systems, and premier service delivery model, we enable our health plan partners to deliver high-quality, valuebased care to millions of members. We offer a fulfilling work environment that attracts top talent and encourages all associates to do their part in delivering premier service to internal and external customers alike. It’s how we’re transforming the healthcare industry for the better. We provide career advancement opportunities within the organization with multiple locations in Florida, California, Pennsylvania, Tennessee, Texas, Utah, and India. You might also like to know that NationsBenefits is also recognized as one of the fastest growing companies in America. We’re proud of how far we’ve come, and a career with us also gives you growth opportunities. Position Overview The Senior Compliance Analyst is responsible for leading the assessment, monitoring, and maintenance of the organization’s internal control environment and compliance efforts related to key regulatory and industry standards, including HITRUST, SOC 2, and PCI DSS. This role will serve as a subject matter expert in audit readiness and compliance reporting, working closely with internal stakeholders, auditors, and assessors to ensure successful certification and audit outcomes. The Senior Compliance Analyst will also play a critical role in control testing, evidence gathering, and issue remediation tracking. Key Responsibilities Regulatory and Framework Compliance Oversight Serve as the internal point of contact for all matters related to HITRUST, SOC 2, and PCI DSS compliance. Coordinate and support the execution of external audits and assessments. Monitor ongoing compliance activities across departments to ensure adherence to regulatory requirements and industry frameworks. Maintain up-to-date knowledge of changes in applicable standards and regulations, proactively updating policies and controls. Internal Controls Monitoring and Testing Conduct routine internal control testing to validate design and operational effectiveness. Document findings, track remediation efforts, and escalate issues where necessary. Collaborate with control owners to ensure proper documentation, process alignment, and control maturity. Manage evidence collection and maintenance for audit readiness throughout the year. Audit Readiness and Execution Own end-to-end preparation for compliance audits including control mapping, pre-audit checks, and facilitating walkthroughs. Partner with internal teams and external auditors to manage audit logistics, request responses, and evidence delivery. Lead corrective action plans in response to audit findings. Policy and Procedure Support Assist in the development, review, and maintenance of compliance-related policies, procedures, and standard operating documents. Ensure controls and practices align with documentation and are consistently applied across the organization. Reporting and Risk Tracking Maintain dashboards and reports tracking control health, audit status, and compliance program KPIs. Support the GRC Director with compliance reporting for internal and external stakeholders. Qualifications Education Bachelor’s degree in information systems, Cybersecurity, Business Administration, or a related field. Master’s degree or equivalent experience preferred. Experience 4–6 years of experience in a compliance, risk, or IT audit role. Hands-on experience supporting HITRUST, SOC 2, or PCI DSS audits. Familiarity with risk assessment, control testing, and remediation tracking processes. Certifications (Preferred) Certified Information Systems Auditor (CISA) HITRUST Certified CSF Practitioner (CCSFP) Certified in Risk and Information Systems Control (CRISC) CompTIA Security+ or similar Skills Strong knowledge of compliance frameworks and internal control principles. Excellent project management and organizational skills. Ability to communicate effectively with both technical and non-technical stakeholders. Comfortable managing multiple priorities in a fast-paced environment. Proficiency with GRC tools and audit management platforms. Key Competencies Attention to Detail: Ability to meticulously validate evidence and control execution. Analytical Skills: Identify compliance gaps and recommend practical solutions. Collaboration: Work cross-functionally to gather evidence and align processes. Accountability: Drive audit preparation and closure of compliance gaps. Adaptability: Stay current with evolving regulatory requirements and apply them effectively

Posted 1 week ago

Apply

0 years

0 Lacs

India

Remote

Linkedin logo

🛡️ Cyber Security Analyst Intern 📍 Location: Remote (100% Virtual) 📅 Duration: 3 Months 💸 Stipend for Top Interns: ₹15,000 🎁 Perks: Certificate | Letter of Recommendation | Full-Time Offer (Performance-Based) About INLIGHN TECH INLIGHN TECH is a rapidly growing edtech startup focused on practical, real-world learning. Our Cyber Security Analyst Internship is built to provide aspiring professionals with the tools, knowledge, and experience needed to understand, detect, and respond to cyber threats. 🚀 Internship Overview As a Cyber Security Analyst Intern , you will gain hands-on experience in monitoring systems, identifying vulnerabilities, analyzing threats, and implementing basic security measures. You will work on real-time use cases and contribute to strengthening the organization’s cyber defense posture. 🔧 Key Responsibilities Monitor and analyze system logs and network traffic for suspicious activities Conduct vulnerability assessments and assist in penetration testing Use tools like Wireshark, Nmap, Nessus, Burp Suite, or Splunk Assist in implementing security policies, firewalls, and access controls Respond to simulated incident scenarios and create incident reports Stay updated with the latest cyber threats, malware trends, and attack vectors Document findings, recommendations, and best practices ✅ Qualifications Pursuing or recently completed a degree in Cybersecurity, Computer Science, IT , or related fields Familiarity with network protocols , Linux/Windows systems , and security tools Understanding of concepts like firewalls, encryption, OWASP Top 10, and vulnerability scanning Strong analytical thinking and problem-solving abilities Basic knowledge of scripting or automation tools (e.g., Bash, Python) is a plus Eagerness to learn, research, and grow in the cybersecurity domain 🎓 What You’ll Gain Real-world exposure to cyber threat analysis and defensive strategies Hands-on practice with popular security tools and platforms Internship Certificate upon successful completion Letter of Recommendation for outstanding performance Opportunity for a Full-Time Offer based on performance Experience to help prepare for certifications like CEH, CompTIA Security+, or OSCP

Posted 1 week ago

Apply

3.0 years

0 Lacs

Surat, Gujarat, India

On-site

Linkedin logo

Job Title: Security Engineer (2–3 Years Experience) Location: Surat Department: Information Security / IT Reports To: Security Lead / CISO Job Summary: We are looking for a proactive and detail-oriented Security Engineer with 2–3 years of experience to join our cybersecurity team. The ideal candidate will play a key role in protecting our infrastructure, applications, and data by implementing, managing, and improving security technologies and processes. Key Responsibilities: Monitor and analyse security alerts, logs, and events using SIEM and other monitoring tools. Investigate and respond to potential security incidents, ensuring timely containment and resolution. Implement and manage security tools such as firewalls, endpoint protection, IDS/IPS, DLP, and vulnerability scanners. Ensure secure configurations of servers, network devices, and cloud platforms (AWS, Azure, etc.). Support the configuration and maintenance of log forwarding systems (e.g., rsyslog , syslog-ng ). Assist in threat hunting, malware analysis, and forensic investigations when needed. Collaborate with IT, DevOps, and application teams to enforce security best practices. Participate in internal and external security audits and assist with compliance requirements (e.g., ISO 27001, SOC 2, SEBI-CSCRF). Document incident reports, security procedures, and risk mitigation strategies. Required Qualifications & Skills: Bachelor’s degree in Computer Science, IT, Cybersecurity, or a related field. 2–3 years of hands-on experience in cybersecurity or information security roles. Solid understanding of network security, system hardening, access control, and encryption. Experience with SIEM platforms. Proficiency in Linux and Windows environments. Hands-on experience with log management and analysis tools. Knowledge of security frameworks and regulatory standards. Strong troubleshooting, analytical, and problem-solving skills. Excellent communication and collaboration abilities. Preferred Skills & Certifications: Security certifications like CEH , CompTIA Security+ , OSCP . Experience with cloud security (AWS, Azure, or GCP). Familiarity with scripting languages (Python, PowerShell, Bash). Exposure to DevSecOps practices and CI/CD security tools. What We Offer: A dynamic and security-focused work environment. Opportunities for career growth and technical development. Access to modern tools, technologies, and training. Support for certifications and continued learning. Flexible work culture and employee-centric policies. Interested? Apply now and be a part of a mission-driven team safeguarding technology and data with passion and purpose. Show more Show less

Posted 1 week ago

Apply

2.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Job Title: IT Administrator with Networking & Server Administration Location : Hyderabad Experience : 6 months – 2 years Job Type: Paid Internship About Us: Instaresz Business Services Pvt Ltd is a forward-thinking, fast-growing technology company that thrives on innovative solutions. We are currently looking for an experienced IT Administrator who will take responsibility for managing and maintaining the network infrastructure, servers, and systems while ensuring smooth day-to-day IT operations across the organization. Key Responsibilities: Set up, configure, and maintain LAN/WAN networks, routers, switches, firewalls, and VPNs. Administer Windows/Linux servers, Active Directory, DNS, DHCP, and user access controls. Manage software and OS package installations using tools like apt, yum, dnf, and rpm. Monitor and troubleshoot network and system performance issues. Maintain web, file, mail, and database servers (Apache, Nginx, Postfix, MySQL, etc.). Implement and monitor IT security measures including firewalls, antivirus, and access policies. Perform system backups, restore processes, and support disaster recovery plans. Support virtualization platforms (VMware, Hyper-V) and assist with basic cloud infrastructure (AWS, Azure). Automate tasks using PowerShell or Bash scripting. Document IT procedures, configurations, and network diagrams. Required Skills & Qualifications: Proven Experience in IT system administration, networking, and server management. Hands-on Knowledge of networking protocols, IP addressing, subnetting, and VPNs. Experience with network devices such as routers, switches, and firewalls. Proficient in Windows Server (Active Directory, Group Policies, DNS, DHCP) and Linux administration (Ubuntu, CentOS, RHEL). In-depth knowledge of server administration , including web servers (Apache, Nginx), databases (MySQL, PostgreSQL), and mail servers (Postfix, Exchange). Experience with package management tools (apt, yum, dnf, rpm). Familiarity with cloud platforms (AWS, Azure) and virtualization tools (VMware, Hyper-V). Strong understanding of IT security practices , including firewalls, antivirus, VPNs, and access management. Scripting skills for automation (PowerShell, Bash). Excellent problem-solving and troubleshooting abilities. Preferred Certifications: CompTIA Network+ CompTIA Security+ Microsoft Certified: Windows Server / Azure Administrator Cisco Certified Network Associate (CCNA) Red Hat Certified System Administrator (RHCSA) ITIL Foundation (For IT Service Management) Additional Skills (Good to Have): Experience with containerization technologies (Docker, Kubernetes). Knowledge of Version Control Systems (Git). Why Join Us: Competitive salary and performance-based incentives Dynamic and collaborative work environment Opportunities for learning and growth Exposure to cutting-edge technologies and industry trends Show more Show less

Posted 1 week ago

Apply

8.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

Cybersecurity Operations Support (WAF, NAC, Anti-DDOS, DLP) Resource Requirement Level: L3 Experience: Minimum 8 years Certifications (any two): CEH, GSEC, Security+, Cisco CyberOps, WAF, NAC, Anti-DDOS, DLP Covered Technologies Web Application Firewall (WAF) Network Access Control (NAC) Anti-DDoS Data Loss Prevention (DLP) General Responsibilities (All Technologies) Health checks, uptime monitoring, performance optimization OEM/vendor coordination for troubleshooting & upgrades Incident response, RCA, remediation, post-incident review Audit & compliance (access/logging review, BCP-DR drills, VA remediation) Integration with AD/LDAP, SIEM, SNMP, SOAR Lifecycle management (license, certificate renewal, firmware upgrades, password & backup management) High Availability/Cluster sync, failover monitoring Technology-Specific Tasks WAF (On-Prem / Cloud) Annual architecture & configuration review Web app onboarding, custom signatures, URL/parameter learning OWASP Top 10 protection, bot protection, DoS rules, cookie/header inspection Managed rule tuning, staging vs enforcement modes Policy assignment, listener setup, application profiling Backup/restore validation, policy maturity, app decommissioning NAC Inline/out-of-band network integration, VLAN segmentation Agent/agentless posture assessment, policy-based access control Identity/location/device-based rules, remediation workflows RADIUS, MAC Auth Bypass, 802.1x, MFA integration Device profiling, endpoint behavior monitoring, NAC patch management Endpoint exception handling, automation scripts Coordination with network/IT teams for troubleshooting Anti-DDoS Detection profile setup (behavioral, signature, protocol-based) Mitigation config (rate limits, CAPTCHA, geo-blocking) Alert configuration, auto-mitigation tuning Coordination with SIEM, SOAR, firewall, SOC for use cases Regular DDOS simulation, testing & tuning DLP (incl. Classification & DRM) Policy creation (regex, fingerprinting, classification, blocking/alerting) Coverage across endpoints, email, and web Agent deployment & updates, inactive endpoint cleanup OS/DB cluster sync, data protection rule setup Kirti Rustagi kirti.rustagi@raspl.com Show more Show less

Posted 1 week ago

Apply

10.0 years

0 Lacs

Manesar, Haryana, India

On-site

Linkedin logo

Role Title: Cyber Defense Specialist – Senior SOC Analyst (L3/L4 | Threat Detection | Incident Response) 📍 Location: Manesar, Haryana (Onsite | Government Sector Engagement) 🏢 Organization: VVNT SEQUOR LLP, Noida 📅 Start Date: Immediate to ≤ 1 Month Preferred About the Role Join VVNT SEQUOR LLP as a Cyber Defense Specialist supporting our prestigious Government Sector client . With 8–10 years of deep expertise in SOC operations, SIEM platforms, and threat intelligence , you’ll be leading high-severity incident response efforts, forensic investigations, and proactive threat hunting. This is not just a monitoring role — it’s a frontline cybersecurity command post where you’ll shape detection strategies, automate response mechanisms, and act as a senior escalation point for L3/L4 security challenges. Your Core Responsibilities 🎯 SIEM & Threat Hunting Lead monitoring of security events using ArcSight , Splunk , ELK , and custom dashboards Develop and fine-tune correlation rules , detection use cases, and threat indicators Conduct proactive threat hunting using the MITRE ATT&CK framework, threat intel, and behavioral analytics 🚨 Incident Response & Digital Forensics Execute the full incident lifecycle —detection, containment, investigation, recovery, and RCA Perform forensic investigations : memory analysis, packet capture review, EDR telemetry (e.g., CrowdStrike , SentinelOne ) Conduct post-incident reviews , document findings, and coordinate RCA sessions with stakeholders 🛠️ Vulnerability Management & Infrastructure Security Conduct VAPT assessments using tools like Nessus , Qualys , OpenVAS , Metasploit , Burp Suite Manage and fine-tune Firewalls (Palo Alto, FortiGate) , WAF , IDS/IPS , and Anti-DDoS appliances Support audits and documentation for ISO 27001 , NIST CSF , and related compliance mandates ⚙️ Automation & Security Enablement Drive integration with SOAR platforms , building automated playbooks using Python , PowerShell , or REST APIs Mentor L1/L2 teams, lead internal security drills, and run awareness campaigns (e.g., KnowBe4 ) Collaborate on blue/purple team exercises to improve detection coverage Ideal Candidate Profile 8–10 years of SOC experience with strong L3/L4 exposure Expert in SIEM/EDR/SOAR tools , threat modeling, forensic analysis, and advanced detection Excellent in handling escalations, drafting RCA reports, and coordinating with InfoSec, Infra, and Audit teams Comfortable with mission-critical response , working in regulated or high-compliance environments Preferred Certifications / Experience Certifications: CEH, CHFI, GCFA, GCIA, Security+, Splunk Certified Analyst Experience with cloud security monitoring tools (AWS GuardDuty, Azure Sentinel, TIPs) Bonus: Exposure to OT/ICS environments , Red/Blue/Purple team operations, or critical infrastructure protection Why VVNT SEQUOR? Work on strategic cybersecurity projects for a Government client Get hands-on with next-gen detection tools and nation-grade threat response protocols Enjoy subsidized cab & lunch while working in a high-impact, innovation-led setup Be recognized as a cyber leader , not just an operator Application Process Send the following to: 📧 chaitali@vvntsequor.in , parveen.arora@vvntsequor.in 📱 WhatsApp: +91-9891810196 / +91-8802801739 Please include: Updated Resume (with certifications) Last Drawn & CTC Earliest Joining Date (Immediate to Max 1 Month only) Optimized Tags / Keywords Senior SOC Analyst | Cybersecurity Specialist | Threat Hunting | SIEM (Splunk, ArcSight) | Incident Response | Forensics | CrowdStrike | EDR | SOAR Automation | MITRE ATT&CK | ISO 27001 | NIST CSF | Python Scripting | VAPT | Firewall Security | L3 L4 Escalation Show more Show less

Posted 1 week ago

Apply

0.0 - 31.0 years

0 - 0 Lacs

Rajkot

Remote

Apna logo

Our Client is a leader in offensive & defensive security, threat intelligence, and enterprise cybersecurity, they are expanding their Training & Consulting team. They are hiring 3 Cyber Security Trainers who are passionate about educating the next generation of cyber warriors. 🔍 What You’ll Do: Conduct classroom and hands-on lab sessions for UG/PG students in cyber security. Prepare and manage course materials, lab manuals, and digital resources. Evaluate students through exams, assessments, and project work. Lead seminars, workshops, FDPs, and guest lectures. Mentor students in certifications, projects, and cybersecurity competitions. 🎓 Eligibility Criteria (Must-Have): M.Tech in Cyber Security (mandatory). Relevant certifications like CEH, OSCP, CISSP, or CompTIA Security+ are preferred. Experience in teaching/training or industry experience in areas like ethical hacking, incident response, or digital forensics. Excellent communication and presentation skills. Hands-on expertise in cybersecurity tools and platforms. 📍 Location: Rajkot, Gujarat 🕒 Job Type: Full-Time 📌 No. of Openings: 3

Posted 1 week ago

Apply

2.0 - 31.0 years

3 - 3 Lacs

Gultekdi, Pune

On-site

Apna logo

Job Title: IT System Engineer – Real Estate Job Summary: We are seeking a skilled and proactive IT System Engineer to manage and optimize our real estate company’s IT infrastructure. The ideal candidate will oversee the installation, configuration, and maintenance of servers, networks, and software systems used across departments such as sales, finance, construction, property management, and customer service. You will ensure technology supports the company's real estate operations, enhances productivity, and maintains data security. --- Key Responsibilities: Design, implement, and maintain the organization’s IT infrastructure, including servers, LAN/WAN, cloud services, and databases. Manage and support core applications used in real estate operations (e.g., CRM, ERP, Property Management Systems, document management, and BIM tools). Ensure data security, backup, and disaster recovery protocols are in place and regularly tested. Monitor system performance and troubleshoot hardware, software, and network issues across office and project locations. Support teams with software and hardware setup including laptops, desktops, mobile devices, printers, and conferencing systems. Coordinate with third-party vendors and service providers for IT procurement and technical support. Develop and maintain IT documentation including network diagrams, system configurations, and user manuals. Implement cybersecurity measures including firewalls, antivirus systems, and security awareness training. Participate in the evaluation and deployment of new technologies to enhance business operations and project execution. Provide user training and support for real estate-specific platforms such as ERP (e.g., SAP, Oracle), project collaboration tools (e.g., Procore, PlanGrid), and cloud-based solutions. --- Qualifications: Bachelor’s degree in Information Technology, Computer Science, or a related field. 3–6 years of experience as a System Engineer or similar IT role, preferably in a real estate, construction, or property management company. Strong knowledge of Windows Server, Active Directory, Office 365, virtualization (VMware/Hyper-V), cloud platforms (Azure, AWS), and network protocols. Experience with real estate software tools such as CRM, ERP, CAD/BIM integration, or property management systems is a strong plus. Familiarity with cybersecurity standards and data protection laws (e.g., GDPR, ISO 27001). Excellent problem-solving, communication, and project management skills. --- Preferred Skills: Certifications such as MCSA, CCNA, CompTIA Security+, or ITIL. Experience managing IT for construction sites or remote offices. Knowledge of smart building technologies or IoT in real estate.

Posted 1 week ago

Apply

4.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

JR0125211 Senior Analyst, Security (SOC Analyst)– Pune, India Want to work on global strategic initiatives with a FinTech company that is poised to revolutionize the industry? Are you excited to work within the Cyber Security space? Join the team and help shape our company’s digital capabilities and revolutionize an industry! Join Western Union as a Information Security Analyst. Western Union powers your pursuit. The Senior Information Security Analyst has a significant role in realizing the vision of the strategy and ensuring that products and services are developed with the needs of our customers in mind. This role has significance in system stability analysis and using insight from customers and colleagues worldwide to improve financial services for families, small businesses, multinational corporations, and non-profit organizations. Role Responsibilities The SOC analyst is responsible for activities relating to monitoring and responding to security events. The SOC analyst receives research, triages, and documents all security events and alerts as they are received. This individual supports multiple security-related platforms and technologies, interfacing with others within the IT organization, as well as other internal business units and external customers/partners. Events will be generated from endpoints, networks, security information and event management (SIEM) systems, threat intelligence platforms, employees, third parties and other sources. Role Requirements 4+ years of professional experience and 3+ years of information security monitoring and response or related experience. Working experience in SOC’s, EDR tool, Endpoint, WAF, Network Security (IPS/Network DDOS Protection/Firewall/Web Proxy). Ability to perform in-depth root cause analysis and co-relation of events to identify APTs and sophisticated attacks. Experience working with SIEM systems, security automation and orchestration solutions (SOAR), Threat intelligence platforms. Experience working in Email Security tools and SSL Certificate management. Knowledge of a variety of Internet protocols. Track record of acting with integrity (excellent work ethics), taking pride in work, seeking to excel, being curious and adaptable, and communicating effectively. Certifications such as CEH/GCIH/CompTIA Security+ certification are preferred. We make financial services accessible to humans everywhere. Join us for what’s next. Western Union is positioned to become the world’s most accessible financial services company transforming lives and communities. To support this, we have launched a Digital Banking Service and Wallet across several European markets to enhance our customers’ experiences by offering a state-of-the-art digital Ecosystem. More than moving money, we design easy-to-use products and services for our digital and physical financial ecosystem that help our customers move forward. Just as we help our global customers prosper, we support our employees in achieving their professional aspirations. You’ll have plenty of opportunities to learn new skills and build a career, as well as receive a great compensation package. If you’re ready to help drive the future of financial services, it’s time for the Western Union. Learn more about our purpose and people at https://careers.westernunion.com. Benefits You will also have access to short-term incentives, multiple health insurance options, accident and life insurance, and access to best-in-class development platforms, to name a few (https://careers.westernunion.com/global-benefits/). Please see the location-specific benefits below and note that your Recruiter may share additional role-specific benefits during your interview process or in an offer of employment. Your India Specific Benefits Include Employees Provident Fund [EPF] Gratuity Payment Public holidays Annual Leave, Sick leave, Compensatory leave, and Maternity / Paternity leave Annual Health Check up Hospitalization Insurance Coverage (Mediclaim) Group Life Insurance, Group Personal Accident Insurance Coverage, Business Travel Insurance Cab Facility Relocation Benefit Western Union values in-person collaboration, learning, and ideation whenever possible. We believe this creates value through common ways of working and supports the execution of enterprise objectives which will ultimately help us achieve our strategic goals. By connecting face-to-face, we are better able to learn from our peers, problem-solve together, and innovate. Our Hybrid Work Model categorizes each role into one of three categories. Western Union has determined the category of this role to be Hybrid. This is defined as a flexible working arrangement that enables employees to divide their time between working from home and working from an office location. The expectation is to work from the office a minimum of three days a week. We are passionate about diversity. Our commitment is to provide an inclusive culture that celebrates the unique backgrounds and perspectives of our global teams while reflecting the communities we serve. We do not discriminate based on race, color, national origin, religion, political affiliation, sex (including pregnancy), sexual orientation, gender identity, age, disability, marital status, or veteran status. The company will provide accommodation to applicants, including those with disabilities, during the recruitment process, following applicable laws. Estimated Job Posting End Date 06-23-2025 This application window is a good-faith estimate of the time that this posting will remain open. This posting will be promptly updated if the deadline is extended or the role is filled. Show more Show less

Posted 1 week ago

Apply

3.0 years

0 Lacs

Sadar, Uttar Pradesh, India

On-site

Linkedin logo

Job Overview We are looking for a motivated and skilled IT Governance, Risk & Cybersecurity Awareness Analyst to join our team. This position focuses on enhancing IT governance processes, promoting cybersecurity awareness, and ensuring compliance with internal policies and regulatory requirements. The ideal candidate will have 3-4 years of experience in IT governance, risk management, and cybersecurity, with a strong emphasis on communication and training initiatives. Qualifications And Skills Educational Background: Bachelor’s degree in Information Technology, Computer Science, Cybersecurity, or a related field. Experience: 3-4 years of experience in IT governance, risk management, or cybersecurity awareness, ideally within a corporate or multinational environment. Certifications: Relevant certifications such as, ISO 27001, ITIL, CompTIA Security+, or similar certifications are a plus. Technical Skills: Understanding of IT governance frameworks ( ISO20000, ITIL). Basic knowledge of cybersecurity concepts, risk management, and compliance frameworks (ISO20001, ISO 27001). Proficiency in Microsoft Office Suite (Excel, PowerPoint, Word, M365 Phishing Attack Simulation Tool. Knowledge of Software licensing compliance. Communication Skills: Strong verbal and written communication skills, with the ability to present complex information in an accessible and engaging manner. Experience creating training materials and conducting training sessions. Analytical Skills: Ability to analyze and report on cybersecurity awareness and risk management activities, identifying trends and areas for improvement. Project Management: Ability to manage multiple tasks and projects effectively while meeting deadlines. Work Environment : Posting at Faridabad/Greater Noida, May have to travel Chennai & Overseas. 5 days on-site Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Haryana, India

On-site

Linkedin logo

A Bit About Us Trek is an awesome place to work, with amazing benefits for all employees. We build only products we love, provide incredible hospitality to our customers, and change the world by getting more people on bikes. When you’re on our team, you’re taken care of, encouraged to learn and grow, and given lots of opportunities to do so. Give us your best, and we’ll give it right back. Sound pretty sweet? Then come join us! Job Description IT Security Operations Analyst Position Summary: Help us secure the Awesome Bus! We are looking for someone to join our global cybersecurity team. We are a highly effective team that works to protect and defend against intrusions into Trek’s systems. The candidate must be self-motivated with in-depth technical IT skills and a clear understanding of how changes impact enterprise IT systems worldwide. The individual needs to have a solid understanding of how a variety of information technologies work and how to gather information on and troubleshoot them. If you enjoy being a first responder to events and incidents; implementing, running, tuning, and troubleshooting platforms and tools; and continually improving your security skillset, this position will provide you with a unique and challenging opportunity to defend Trek against an increasingly sophisticated threat landscape. Travel is at a minimum but since this is a global company, some travel may be required. Responsibilities: Tuning, running, and improving technologies and configurations across all security domains to inform cyber risk decisions Identifying events of interest and investigating them for signs of abuse or misuse Relentlessly resolving security issues by gathering and analyzing event information and conducting root-cause analysis Supplying technical guidance, leadership, and assistance to other teams Creating, communicating, and maintaining incident documentation, reports, and playbooks Orchestrating and automating work Evangelizing information security within Trek worldwide Other duties as assigned Requirements: At least five years’ experience in IT systems administration/engineering, network administration/engineering, and/or DevOps At least two years’ experience in information security, including but not limited to incident response, vulnerability assessment, and alerting/monitoring Strong understanding of cloud technologies up and down the stack Strong understanding of Windows and *nix systems as well as network architecture and protocols, including TCP/IP, DNS, and HTTPS. Experience with anti-malware/XDR/advanced threat detection (Windows Defender, CrowdStrike Falcon, SentinelOne), network monitoring (Zscaler, Palo Alto Networks, Cisco Meraki, Suricata , Bro), identity service providers (Microsoft Entra ID), and log analysis tools (Splunk, Microsoft Sentinel, Graylog, ELK) Ability to troubleshoot Ability to communicate proficiently with technical and non-technical people around the world Become SANS GIAC certified within six months or hold a current and valid certification in any of the following: (ISC)2: CISSP, CCSP, SSCP, CAP; SANS GIAC: GCIH, GREM, GCIA, GCFA, GCFE, GPEN, GCED; CompTIA: Security+; EC Council: CEH; other IT certifications considered. Preferred: Experience using Splunk Experience building solutions in Python, PowerShell, zsh, and bash Bachelors' degree in Computer Science, Electrical/Computer Engineering, Information Security, Management Information Systems, or equivalent experience If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us! Show more Show less

Posted 1 week ago

Apply

4.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security (DPP)- Risk – Consulting – Senior As part of our EY-Cyber security in the Risk Consulting team, your role will be primarily responsible for the daily monitoring and/or maintenance of the enterprise Data Protection tools/solutions. The main duties of the person in this role will include proper care and administration of the Data Protection tools, monitoring and responding to the alerts that generate from the tool. This person will interface with IT Operations, Network Operations, Infrastructure teams, Legal, Risk Management, etc. The opportunity We’re looking for Senior consultants in the Risk Consulting team to work on various privacy/data protection related projects for our customers across the globe. In line with EY’s commitment to quality, consultant shall confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, consultant shall help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Build DATA PROTECTION solution concepts and deployment requirements Deploying DATA PROTECTION tools and implementation of endpoint protection. Work with vendors to support the DATA PROTECTION technology (troubleshooting, upgrades, etc.) Administration of the Data Protection tools which includes configuring policies, upgrading and patching, etc. Monitor and respond to alerts generated from the Data Protection systems and other technologies Understand and follow the incident response process through event escalations Respond to escalations by the Incident Response Team Follow processes to maintain the leading DATA LOSS PREVENTION/CASB system Assisting clients in privacy related incident response activities. Supporting the client’s team by acting as an interim team member (e.g., security officer, security manager, security analyst.) Skills And Attributes For Success Should be a good team player. Excellent verbal and written communication skill. Proficient Documentation and Power Point skills Good social, communication and technical writing skills Should interface with internal and external clients. Strong analytical/problem solving skills. Ability to prioritize tasks and work accurately under pressure to meet deadlines. Should understand and follow workplace policies and procedures. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. To qualify for the role, you must have Bachelor's or Master’s degree in Computer Science, Information Systems, Engineering or a related field. At least 4-6 years of experience in supporting Data Security Technology. At least 4-6 years of experience in two or more of the following: Information Security concepts related to Governance, Risk & Compliance Data Loss Prevention, CASB Technology support and Event Handling Experience of Administration of the DLP, CASB tools which includes configuring policies, upgrading and patching for leading vendors. (MS Purview, Digital Guardian, McAfee, Forcepoint, Netskope, Symantec CloudSOC, MDCA etc.) Must have skillset: hands-on working experience with MS Purview DLP, Information Protection, CASB and relevant compliance modules Good to have skillset: MS Defender for Cloud Apps, MS Priva, MS Purview Governance Technical/Vendor certification will be added advantage. Experience in utilizing and good knowledge of other data protection technology like Endpoint Security Suite, EDR, ATP will be added advantage. Maintain current data protection and privacy expertise, skills and competences. Ability to independently research and solve technical issues. Demonstrated integrity in a professional environment. Knowledge of core Information Security concepts related to Governance, Risk & Compliance. Ability to work in and adapt to a changing environment. Extend required support for any reported data protection and privacy incidents such as information breaches and leakages. Ability to communicate in a clear and concise manner. Ideally, you’ll also have Professional certificate or be actively pursuing related professional certifications such as the CompTia Security+, CEH, CISSP or Vendor/Technical certification. If not, certified candidates are expected to complete one of the business required certifications within 12 months of hire. To expect some weekend work and 20%-30% travel based on job requirement. What We Look For A Team of people with commercial acumen, technical experience and enthusiasm to learn new things in this fast-moving environment with consulting skills. An opportunity to be a part of market-leading, multi-disciplinary team of 1400 + professionals, in the only integrated global transaction business worldwide. Opportunities to work with EY Consulting practices globally with leading businesses across a range of industries What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 week ago

Apply

4.0 years

0 Lacs

Kanayannur, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security (DPP)- Risk – Consulting – Senior As part of our EY-Cyber security in the Risk Consulting team, your role will be primarily responsible for the daily monitoring and/or maintenance of the enterprise Data Protection tools/solutions. The main duties of the person in this role will include proper care and administration of the Data Protection tools, monitoring and responding to the alerts that generate from the tool. This person will interface with IT Operations, Network Operations, Infrastructure teams, Legal, Risk Management, etc. The opportunity We’re looking for Senior consultants in the Risk Consulting team to work on various privacy/data protection related projects for our customers across the globe. In line with EY’s commitment to quality, consultant shall confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, consultant shall help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Build DATA PROTECTION solution concepts and deployment requirements Deploying DATA PROTECTION tools and implementation of endpoint protection. Work with vendors to support the DATA PROTECTION technology (troubleshooting, upgrades, etc.) Administration of the Data Protection tools which includes configuring policies, upgrading and patching, etc. Monitor and respond to alerts generated from the Data Protection systems and other technologies Understand and follow the incident response process through event escalations Respond to escalations by the Incident Response Team Follow processes to maintain the leading DATA LOSS PREVENTION/CASB system Assisting clients in privacy related incident response activities. Supporting the client’s team by acting as an interim team member (e.g., security officer, security manager, security analyst.) Skills And Attributes For Success Should be a good team player. Excellent verbal and written communication skill. Proficient Documentation and Power Point skills Good social, communication and technical writing skills Should interface with internal and external clients. Strong analytical/problem solving skills. Ability to prioritize tasks and work accurately under pressure to meet deadlines. Should understand and follow workplace policies and procedures. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. To qualify for the role, you must have Bachelor's or Master’s degree in Computer Science, Information Systems, Engineering or a related field. At least 4-6 years of experience in supporting Data Security Technology. At least 4-6 years of experience in two or more of the following: Information Security concepts related to Governance, Risk & Compliance Data Loss Prevention, CASB Technology support and Event Handling Experience of Administration of the DLP, CASB tools which includes configuring policies, upgrading and patching for leading vendors. (MS Purview, Digital Guardian, McAfee, Forcepoint, Netskope, Symantec CloudSOC, MDCA etc.) Must have skillset: hands-on working experience with MS Purview DLP, Information Protection, CASB and relevant compliance modules Good to have skillset: MS Defender for Cloud Apps, MS Priva, MS Purview Governance Technical/Vendor certification will be added advantage. Experience in utilizing and good knowledge of other data protection technology like Endpoint Security Suite, EDR, ATP will be added advantage. Maintain current data protection and privacy expertise, skills and competences. Ability to independently research and solve technical issues. Demonstrated integrity in a professional environment. Knowledge of core Information Security concepts related to Governance, Risk & Compliance. Ability to work in and adapt to a changing environment. Extend required support for any reported data protection and privacy incidents such as information breaches and leakages. Ability to communicate in a clear and concise manner. Ideally, you’ll also have Professional certificate or be actively pursuing related professional certifications such as the CompTia Security+, CEH, CISSP or Vendor/Technical certification. If not, certified candidates are expected to complete one of the business required certifications within 12 months of hire. To expect some weekend work and 20%-30% travel based on job requirement. What We Look For A Team of people with commercial acumen, technical experience and enthusiasm to learn new things in this fast-moving environment with consulting skills. An opportunity to be a part of market-leading, multi-disciplinary team of 1400 + professionals, in the only integrated global transaction business worldwide. Opportunities to work with EY Consulting practices globally with leading businesses across a range of industries What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 week ago

Apply

4.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security (DPP)- Risk – Consulting – Senior As part of our EY-Cyber security in the Risk Consulting team, your role will be primarily responsible for the daily monitoring and/or maintenance of the enterprise Data Protection tools/solutions. The main duties of the person in this role will include proper care and administration of the Data Protection tools, monitoring and responding to the alerts that generate from the tool. This person will interface with IT Operations, Network Operations, Infrastructure teams, Legal, Risk Management, etc. The opportunity We’re looking for Senior consultants in the Risk Consulting team to work on various privacy/data protection related projects for our customers across the globe. In line with EY’s commitment to quality, consultant shall confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, consultant shall help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Build DATA PROTECTION solution concepts and deployment requirements Deploying DATA PROTECTION tools and implementation of endpoint protection. Work with vendors to support the DATA PROTECTION technology (troubleshooting, upgrades, etc.) Administration of the Data Protection tools which includes configuring policies, upgrading and patching, etc. Monitor and respond to alerts generated from the Data Protection systems and other technologies Understand and follow the incident response process through event escalations Respond to escalations by the Incident Response Team Follow processes to maintain the leading DATA LOSS PREVENTION/CASB system Assisting clients in privacy related incident response activities. Supporting the client’s team by acting as an interim team member (e.g., security officer, security manager, security analyst.) Skills And Attributes For Success Should be a good team player. Excellent verbal and written communication skill. Proficient Documentation and Power Point skills Good social, communication and technical writing skills Should interface with internal and external clients. Strong analytical/problem solving skills. Ability to prioritize tasks and work accurately under pressure to meet deadlines. Should understand and follow workplace policies and procedures. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. To qualify for the role, you must have Bachelor's or Master’s degree in Computer Science, Information Systems, Engineering or a related field. At least 4-6 years of experience in supporting Data Security Technology. At least 4-6 years of experience in two or more of the following: Information Security concepts related to Governance, Risk & Compliance Data Loss Prevention, CASB Technology support and Event Handling Experience of Administration of the DLP, CASB tools which includes configuring policies, upgrading and patching for leading vendors. (MS Purview, Digital Guardian, McAfee, Forcepoint, Netskope, Symantec CloudSOC, MDCA etc.) Must have skillset: hands-on working experience with MS Purview DLP, Information Protection, CASB and relevant compliance modules Good to have skillset: MS Defender for Cloud Apps, MS Priva, MS Purview Governance Technical/Vendor certification will be added advantage. Experience in utilizing and good knowledge of other data protection technology like Endpoint Security Suite, EDR, ATP will be added advantage. Maintain current data protection and privacy expertise, skills and competences. Ability to independently research and solve technical issues. Demonstrated integrity in a professional environment. Knowledge of core Information Security concepts related to Governance, Risk & Compliance. Ability to work in and adapt to a changing environment. Extend required support for any reported data protection and privacy incidents such as information breaches and leakages. Ability to communicate in a clear and concise manner. Ideally, you’ll also have Professional certificate or be actively pursuing related professional certifications such as the CompTia Security+, CEH, CISSP or Vendor/Technical certification. If not, certified candidates are expected to complete one of the business required certifications within 12 months of hire. To expect some weekend work and 20%-30% travel based on job requirement. What We Look For A Team of people with commercial acumen, technical experience and enthusiasm to learn new things in this fast-moving environment with consulting skills. An opportunity to be a part of market-leading, multi-disciplinary team of 1400 + professionals, in the only integrated global transaction business worldwide. Opportunities to work with EY Consulting practices globally with leading businesses across a range of industries What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies