Find Your Dream Cyber Security Job

Explore the latest Cyber Security job opening. Discover top companies hiring for Cyber Security roles and take the next step in your career.

search for jobs
google-jobsmeta-jobsamazon-jobsmicrosoft-jobsibm-jobsapple-jobsnvidia-jobssony-jobsfacebook-jobsinstagram-jobslinkedin-jobssnapchat-jobstik-tok-jobsslack-jobspinterest-jobsfigma-jobsmastercard-jobsvisa-jobstesla-jobstencent-jobsstarbucks-jobssamsung-jobsintel-jobsgoogle-jobsmeta-jobsamazon-jobsmicrosoft-jobsibm-jobsapple-jobsnvidia-jobssony-jobsfacebook-jobsinstagram-jobslinkedin-jobssnapchat-jobstik-tok-jobsslack-jobspinterest-jobsfigma-jobsmastercard-jobsvisa-jobstesla-jobstencent-jobsstarbucks-jobssamsung-jobsintel-jobs

Cyber Security Specialist

ABOUT THE TEAM

The RealPage Information Security Operations team monitors and manages risks associated with threats and vulnerabilities faced by our infrastructure, platforms, and systems. We work closely with our teammates from IT, Product Development, and across the business to coordinate and execute our vulnerability management and incident response strategies and capabilities. We work with industry-leading tools and implement creative solutions to complex problems.

SUMMARY

As the CyberArk Security Engineer III, you will be the main point of contact on the InfoSec team for all queries related to Privileged Access Management (PAM). Success in this position will be measured by your ability to perform critical functions within CyberArk such as integrating applications, platform management, version upgrades, and assisting with troubleshooting when there is a problem. The primary focus of this role will be maturing PAM strategy, infrastructure, and knowledge. In addition, you will also be expected to perform a periodic user access reviews to ensure regulatory compliance and provide guidance to other teams on best practices within the PAM space. Experience with CyberArk is essential for this role. Compliance or audit experience is desired, but not required.

PRIMARY RESPONSIBILITIES

  • Be the point of contact for CyberArk related issues or concerns.
  • Perform basic troubleshooting for any PAM managed applications.
  • Mature existing on-prem CyberArk infrastructure by integrating and on-boarding additional technologies and teams.
  • Perform user access reviews for various RealPage applications on a quarterly basis.
  • Creation of custom connectors, platforms, and CPM plugins required to support further integration between CyberArk and proprietary and nonproprietary technologies.
  • Automation of PAM workflows related to reporting, ticketing systems, and the privileged account life cycle.

REQUIRED KNOWLEDGE/SKILLS/ABILITIES

  • Bachelor's degree and minimum 4 years of experience in Information Security, Information Assurance and/or Cyber Security space. Additional relevant experience and professional certifications will be considered in lieu of a degree.
  • 5 years of experience with CyberArk On-Prem Core PAS solution.
  • Expert experience with creation and deployment of PSM Connectors and CPM Plugins.
  • Experience with CyberArk Discovery and Audit (DNA) scanning tool.
  • Knowledge of CyberArk server patching
  • Experience with AutoIT, CyberArk PACLI and JSON.
  • Lead meetings with application owners to enable PSM and CPM.
  • Experience with usage of CyberArk API REST
  • Automate onboarding processes for interactive and non-interactive accounts.
  • Experience with Windows and Linux system administration

PREFERRED KNOWLEDGE/SKILLS/ABILITIES

  • Advanced degree in applicable field.
  • Professional information security certification, such as CompTIA's Sec+, GIAC's GSEC, and Cisco's CBROPS.
  • Knowledge of common security frameworks and regulations including FFIEC, NYDFS and NIST Cybersecurity Framework.
  • Experience automating tasks using scripting languages (Python, Powershell)

company icon

RealPage, Inc.

calendar icon

12 days ago

Cyber Security Consultant

The Information Security Consultant will be responsible for the implementation, assessment, and management of ISO 27001:2022, ISO 27002, and SOC 2 standards for clients. This role involves working independently or alongside senior consultants to help clients achieve and maintain information security compliance and other best practices. The consultant will focus on assessing and ensuring compliance with key security frameworks and will provide vCISO support to various clients.

Key Responsibilities:

ISO 27001/27002 Compliance:

  • Assist clients in achieving ISO 27001 certification by identifying and implementing the appropriate controls within the audit scope.
  • Verify compliance with ISO 27001/27002 controls and provide recommendations for improvement.

SOC 2 Compliance:

  • Assist clients in achieving SOC 2 compliance by identifying and implementing the appropriate Trust Service Criteria (TSCs).
  • Conduct SOC 2 compliance assessments and ensure the proper implementation of required controls.

Risk Assessment and Mitigation:

  • Conduct risk assessments of business activities, collaborating with stakeholders to manage risks until closure or acceptance.
  • Provide actionable recommendations to mitigate identified risks.

Policy and Procedure Development:

  • Define, develop, and review information security policies, procedures, guidelines, forms, and templates in line with best practices.
  • Ensure documentation is up-to-date and aligned with industry standards.

Baseline Standards Review:

  • Create and review baseline standards for operating systems, databases, web servers, and applications.
  • Recommend improvements based on security assessments.

Post-Implementation Audits:

  • Support post-implementation audits for ISO 27001:2022 to ensure ongoing compliance.
  • Monitor and assess adherence to established information security standards.

Information Security Awareness:

  • Create and execute organizational information security awareness programs.
  • Conduct training sessions to ensure employees are knowledgeable about security best practices.

Security Standards Compliance:

  • Assist clients in ensuring compliance with various security standards (ISO 27001, SOC 2, HIPAA, NIST, CIS, PCI DSS, etc.).
  • Recommend strategies to ensure long-term adherence to security best practices.

Incident Response:

  • Develop and implement incident response plans to handle security breaches and cyberattacks.
  • Ensure that clients have clear, actionable plans to address potential security incidents.

Gap Assessment:

  • Conduct gap assessments to identify areas of non-compliance and provide remediation strategies.

vCISO Support:

  • Provide virtual Chief Information Security Officer (vCISO) support to clients, advising on information security strategy and governance.

Skills and Qualifications:

Technical Skills:

  • Strong background in Information Technology and/or Cybersecurity.
  • Proficiency in auditing, policy development, database security, firewall design, risk analysis, identity management, access control, and web security.
  • Knowledge of security frameworks including ISO 27001, SOC 2, HIPAA, NIST, CIS, PCI DSS, and other industry best practices.
  • Hands-on experience with ISO 27001:2022 and SOC 2 implementations and assessments.
  • Strong understanding of risk management and the ability to assess and mitigate security risks.

Presales and Communication Skills:

  • Excellent client-facing communication skills.
  • Strong problem-solving abilities and the capacity to work effectively in a team environment.
  • Ability to communicate complex technical concepts to both technical and non-technical audiences.
  • Demonstrated ability to deliver presentations and conduct training sessions.

company icon

Soffit Infrastructure Services (P) Ltd

calendar icon

12 days ago

Cyber Security Analyst (Offensive Operations)

Position Summary

We are seeking a skilled and highly motivated Cyber Security Analyst (Offensive Operations) to join our team . The selected candidate will be responsible for conducting offensive cyber operations against illicit online platforms, including illegal websites, dark web services, unauthorized Android apps, and digital services engaged in unlawful activities. You will play a key role in data infiltration, extraction, analysis, and reporting, helping enforce national cybersecurity laws and protecting national digital infrastructure.

Key Responsibilities:

  • Conduct penetration testing, exploitation, and vulnerability assessment of illegal websites and mobile apps.

  • Perform ethical offensive operations to identify, infiltrate, and collect actionable intelligence from online targets.

  • Analyze Android apps (APK reverse engineering) to discover malicious or illegal functionalities.

  • Use OSINT (Open Source Intelligence), dark web monitoring, and custom tools for tracking illicit cyber activities.

  • Develop and deploy custom exploits, payloads, and scripts for covert cyber operations.

  • Work with legal teams and law enforcement to ensure compliance with laws during operations.

  • Document operational procedures, create detailed technical reports, and maintain digital evidence.

  • Collaborate with cyber forensic, malware analysis, and incident response teams as needed.

Preferred Skills (Not Mandatory):

Prior work experience with intelligence agencies or law enforcement cyber units.

  • Certifications: OSCP, CEH, GPEN, or equivalent.

  • Familiarity with C2 frameworks like Cobalt Strike or Empire.

  • Experience with mobile malware analysis and custom payload creation
company icon

Malan Softtech Private Limited

calendar icon

12 days ago

Cyber Security System Engineer (vulnerability scanning)

Project description

Security is a global organization within Group Technology Infrastructure and Security Engineering. Our services focus on preventing and detecting cyber threats and securing our IT systems. We provide consolidated and reliable security services that implement secure design principles and create best-fit solutions.

You will be working in the Cyber Technology service team, providing security products and services for the Cyber Hygiene space - specifically for Infrastructure Scanning and vulnerability assessment. We provide consolidated and reliable security hygiene controls to our clients using the latest technology.

As a Cyber Security Engineer, you will play a vital role in creating Infrastructure Scanning and Security Remediation capabilities, determining required IT business solutions, and assisting in implementing them. We offer flexibility in the workplace and equal opportunities to all our team members.

Responsibilities

  • Perform vulnerability scanning to discover and analyze vulnerabilities and characterize risks to networks, OS, application, databases etc. (to meet scan coverage targets)
  • Stakeholder engagement to recommend appropriate remedial actions to mitigate risks and validate remedial actions and ensure compliance with regulatory requirements.
  • Perform vulnerability management system administration functions, as required
  • Maintain proficiency in vulnerability management best practices
  • Onboarding new attack surface to vulnerability scanning process
  • Documentation management and continuous service improvement

Mandatory Skills

  • 5-10 years relevant experience
  • Degree in related discipline or qualified by experience
  • Well-developed oral and written English communication skills
  • Team player with ability to work collaboratively with others and aptitude for self-development
  • Experience using commercial vulnerability scanning solutions such as Rapid7, Qualys, Tenable etc.
  • Expertise with administration of networks, windows and or Linux operating systems
  • An understanding of IT Security Risk, attack vector
company icon

Luxoft

calendar icon

12 days ago

Cyber Security Engineer

  • Applicable work experience, in performing and running audits, certification programs and control assessments, including but not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, mapping issues to risks and socializing results.
  • Coordinate audit-related tasks to ensure the readiness of managers and their teams for audit testing and facilitate the timely resolution of any audit findings.
  • Strong knowledge of common security legal and regulatory requirements. (e.g., PCI, SOC, CSA STAR, NIST, ISO/IEC 27001, COBIT, etc.)
  • Work on compliance initiatives to ensure operational effectiveness with applicable laws and regulations, as well as internal policies and procedures.
  • Monitor activities of assigned IT areas to ensure compliance with internal policies and standards.
  • Assist Corporate Compliance and the Business with all required compliance/security-related documentation.
  • Facilitate for external audits to ensure compliance with all industry-mandated regulations.
  • Participate in the development and implementation of new business initiatives to ensure functionality required to support compliance.
  • Provide guidance to business functions on compliance/security-related matters.
  • Good understanding of IT concepts, including Cloud hosting, containerization, encryption, networking, operating systems, databases, middleware, and applications.
  • Knowledge of or experience working with, Cloud technologies/environments, AWS or other related cloud experience is required.
  • Ability to effectively communicate to all levels of the organization, including senior management, and other stakeholders that influence the security and compliance posture of Phox Health.
  • Ability to assess the nature of controls and identify automation opportunities for increased monitoring and scaling coverage.

What We re Seeking

  • Bachelor s degree in the field of Information Security, Computer Science or discipline and/or certifications. (e.g., ISO 27001, SOC 2, HIPAA, HITRUST)
  • Demonstrated ability to apply IT-related knowledge and experience in solving compliance issues.
  • Experience implementing cloud security and compliance standards, frameworks, and controls (ISO 27001, SOC 2, HIPAA, HITRUST) for cloud service delivery models (IaaS, PaaS, SaaS).
  • AWS Certifications (added advantage).
  • Experience or understanding of governance, risk and compliance (GRC) processes and solutions.
  • Background in security controls, auditing, network and system security.
  • Ability to express technical concepts in business terms.
  • Able to work well under deadlines in a changing environment and complete multiple projects effectively and concurrently.
  • Evaluate effectiveness of the internal security control framework and recommend adjustments as business needs change.
  • Regularly interact with all levels of management to present and discuss audit results and obtain gap remediation status.

company icon

Neetable

calendar icon

12 days ago

Cyber Security Analyst

STCI Primary Dealer Limited, is one of the largest Primary Dealers accredited by RBI for underwriting and market making in Government securities. We are a leading player in the fixed income market and our operations include trading in Government Securities, Treasury Bills, SDLs, corporate bonds, CDs/CPs and interest rate derivatives. We also trade on proprietary account in equity markets and currency derivatives market.

Role: Cyber Security Analyst

We are looking for a Cyber Security Analyst, with a solid understanding of cybersecurity principles, tools, and threat landscapes, who will assist in monitoring, detecting, and responding to security threats while supporting various cybersecurity solutions.

Location: Mumbai

Previous Work Experience: 1-2 years of experience in cybersecurity or IT security operations.

Key Responsibilities:

  • Manage and monitor security tools such as XDR, WAF, DNS, and PAM solutions
  • Respond to and remediate cybersecurity alerts and incidents
  • Perform threat analysis and vulnerability assessments
  • Participate in Attack Surface Management (ASM) to identify and mitigate vulnerabilities.
  • Assist in Breach & Attack Simulation (BAS) and Red Team exercises under supervision.
  • Conduct phishing simulation campaigns and report on user awareness.
  • Collaborate with IT teams to ensure compliance with security policies and procedures
  • Monitor systems, perform compliance checks, and report findings
  • Implement security policy changes post-approval
  • Interact with internal teams to resolve alerts
  • Stay updated with evolving cybersecurity threats and trends
  • Support security audits (internal/external) and ensure documentation is up to date
  • Coordinate with vendors for support and maintenance of security tools
  • Participate in tabletop exercises and business continuity planning
  • Document incident response processes
  • Review firewall logs and alerts to identify potential threats or misconfigurations

Required Skills:

  • Strong knowledge of networking protocols, operating systems, and web application technologies
  • Experience with cloud architecture and modern security platforms
  • Proficiency in security monitoring, incident response, and threat hunting
  • Familiarity with alert remediation and cyber threat analysis
  • Knowledge of threat detection, vulnerability assessment, and security frameworks.
  • Familiarity with SIEM, EDR, XDR, NAC, and MDM solutions.
  • Understanding of phishing, ransomware, and attack simulations.
  • Basic knowledge of Active Directory and compliance standards.
  • Certifications like Security+, CEH, or CySA+ are a plus.
  • Excellent problem-solving skills and ability to work both independently and in team settings
  • Strong interpersonal and communication skills
  • Familiarity with Zero Trust architecture and Identity & Access Management (IAM) principles
  • Familiarity with regulatory standards

Preferred Skills:

  • Experience in financial or insurance sector security operations is a plus
  • Hands-on with security compliance frameworks and best practices

Interested candidates may mail their resume to or to The Head HR, STCI Primary Dealer Ltd, Marathon Innova, Marathon Nextgen Compound, Lower Parel (W), Mumbai -

Social Media handles:

company icon

STCI Primary Dealer Ltd

calendar icon

12 days ago

Product Sales Specialist(Cyber Security)

Job Role & Requirements:

  • Business Development experience, able to work with Sales teams to generate opportunities for Security Product offerings.
  • Design, Presents, demonstrates the Network Architecture for the Security domain(s) and provide technical consulting to Mid, Enterprise and Government customers.
  • Required to understand customer requirements and provide consultation / design on the architecture and solution.
  • Define security requirements for products and platforms.
  • Work with company leaders to develop long term vision, technology road map, and annual goals for the Cyber Security Practice. Build a distinguished portfolio of advanced cyber security services. Develop intellectual property, including methodologies, solutions, accelerators and tools to enable the practice to be recognized as a leader in the field of cyber security
  • Demonstrated knowledge of information security, computer forensics and data analysis; practices & procedures related to the investigation and response to network/computer intrusions and data theft. Experience in planning and implementing risk mitigation strategies relating to: data loss prevention, security incident and event management, identity and access management, role-based management, strong authentication, encryption, source code analysis, penetration testing, application and system hardening, firewall management and logical network segmentation.
  • Evaluate new technologies and processes that enhance security capabilities.
  • Conduct Thorough Assessment on the Deliveries from Cyber Security Perspectives.
  • Business Development experience, able to work with Sales teams to generate opportunities for Security Business. Able to drive Technical & Sales on various Security Technology offerings.
  • Able to drive new technology solution and need to have market intelligence on Security as a practice
  • Proven experience in managing the complete delivery lifecycle of security engagements, right from the pre-sales stage starting with the identification of opportunities and initial scoping through to the final delivery and signoff. Should have also implemented programs to provide post-cutover maintenance and operations support.
  • Must possess adequate knowledge of industry best practices and tools like: Malware Analysis, Memory Analysis, HBGary Responder, Network Traffic Collection and Analysis and Sandboxing, EnCase, F-Response, FTK, Helix and Paraben.
  • Understand complete discovery of customer environment and able to convert an opportunity by coordinating between Sales, Commercial, Partners etc.
  • Understanding of product portfolio of various OEMs e.g., Cisco, Juniper, Fortinet, Symantec, Mcafee, Bluecoat etc.
  • Able to Work on Funnel review, partner mindshare, drive higher discounts, drive commercial negotiations and closure of opportunity.
  • Responsible for the backend process like P&L, Cost optimization, Marketing etc.
  • Driving the funnel and initiatives with the OEMs and partners

Desired Candidate Profile:

  • Candidate must possess at Bachelor Degree Engineering in any discipline. Masters (MBA/ME) will be added advantage.
  • Individual contributor with 6 to 12 years of working experience in Security Presales/Business Development and/or IT Infrastructure.
  • Should have excellent knowledge in creating High level & Low level Design document, proposal writing skills, Bill of Material Preparation and writing Scope of Document.
  • Excellent Interpersonal & Collaboration Skills
  • Technology Certifications like CISSP, CISM, CISA, Certified Ethical Hacker (CEH) etc. are mandatory
  • Must be able to learn new technologies quickly.
  • Hunger to stretch and outperform.
  • Leadership skills to lead an informal matrix team to accomplish the objective

company icon

Airtel Business

calendar icon

12 days ago

Cyber Security Specialist

About the Role:

We're looking for a highly skilled Cyber Security Specialist to join our team and play a critical role in protecting our digital infrastructure. The ideal candidate will be responsible for implementing security measures, monitoring for threats, and ensuring compliance with security policies and standards.

Key Responsibilities:

  • Design and implement security protocols and best practices
  • Monitor systems and networks for security breaches or intrusions
  • Perform regular security assessments, audits, and penetration testing
  • Investigate and respond to security incidents and threats
  • Collaborate with IT teams to secure software, hardware, and data
  • Develop and maintain incident response plans and recovery strategies
  • Stay updated with the latest cyber threats and technologies

Required Qualifications:

  • Bachelor's degree in Computer Science, Information Security, or related field
  • 3-6 years of experience in cybersecurity or a related domain
  • Strong knowledge of firewalls, VPNs, IDS/IPS, SIEM, and endpoint protection
  • Familiarity with standards like ISO 27001, NIST, and GDPR
  • Hands-on experience with security tools and penetration testing
  • Certifications such as CEH, CISSP, CompTIA Security+, CISM are a strong plus

company icon

CUS Solution

calendar icon

12 days ago

Product Manager/ Strategy (Cyber Security)

Role Overview

The Cybersecurity Product Manager is responsible for the end-to-end ownership, strategy, and lifecycle management of cybersecurity product offerings, including but not limited to network security, end user security, and cloud security. This role drives product vision, roadmap, and execution in alignment with market needs, customer requirements, and organizational objectives, while collaborating extensively across internal and external stakeholders to deliver exceptional digital security solutions.

Key Responsibilities

Product Strategy & Ownership

  • Own the product lifecycle for cybersecurity offerings across network, end user, and cloud security domains, from ideation to end-of-life.
  • Develop and articulate product vision, strategy, and roadmap in collaboration with cross-functional teams.

Cross-Functional Collaboration

  • Engineering & Network Teams:
  • Collaborate closely to define technical requirements and ensure seamless integration of security products into digital journeys and enterprise environments.
  • Oversee the development, testing, and deployment of new features, ensuring readiness for customer onboarding and operational excellence.
  • Lead cross-functional workshops and sprint planning to align product deliverables with engineering and network priorities.
  • OEMs & Technology Partners:
  • Work with Original Equipment Manufacturers (OEMs) and technology partners to co-develop, integrate, and enhance security solutions.
  • Negotiate and manage partnerships to build compelling, differentiated propositions that address current and emerging customer needs.
  • Evaluate and onboard new technology partners to expand product capabilities and maintain a competitive edge.
  • Sales, Marketing & Go-To-Market (GTM):
  • Collaborate with sales, pre-sales, and marketing teams to design and execute effective GTM campaigns and sales enablement programs.
  • Develop product positioning, messaging, and collateral that resonate with target segments.
  • Support sales teams with training, customer presentations, proposal development, and technical deep-dives.
  • Gather feedback from sales and customers to refine offerings and inform future roadmap decisions.
  • Customer Success & Support:
  • Partner with customer success and support teams to ensure seamless onboarding, adoption, and ongoing satisfaction.
  • Drive initiatives to improve customer experience and retention, including the creation of knowledge bases, FAQs, and training materials.

Product Development & Market Analysis

  • Conduct market research, competitive analysis, and customer interviews to identify trends, gaps, and opportunities across all cybersecurity domains.
  • Define and prioritize product features, requirements, and user stories based on customer needs and business goals.
  • Monitor product performance, customer satisfaction, and key metrics; drive continuous improvement initiatives.

Governance & Compliance

  • Ensure compliance with relevant cybersecurity standards, regulations, and best practices.
  • Prepare and deliver executive updates, business cases, and product presentations to stakeholders.

Key Skills and Qualifications

  • Bachelor's degree in Computer Science, Information Security, Engineering, or related field; Master's degree preferred.
  • 8+ years of experience in product management, preferably in cybersecurity or network/cloud security domains.
  • Strong knowledge of cybersecurity technologies and frameworks, including network, end user, and cloud security.
  • Proven track record of launching and managing successful cybersecurity products or services.
  • Demonstrated experience in cross-functional leadership, especially with engineering, network, OEMs, and sales teams.
  • Excellent analytical, problem-solving, and decision-making skills.
  • Strong communication, presentation, and stakeholder management abilities.
  • Experience working in agile product development environments.
  • Relevant certifications (e.g., CISSP, CISM, PMP, or equivalent) are a plus.

Key Performance Indicators (KPIs)

  • Product adoption rates and customer satisfaction scores
  • Revenue growth and profitability of cybersecurity offerings
  • Time-to-market for new features and enhancements
  • Product quality and security metrics
  • Effectiveness of GTM campaigns and sales enablement
  • Stakeholder and customer feedback

company icon

Airtel Digital

calendar icon

12 days ago

Cyber Security PM

Job Title: Cybersecurity Project Manager

Location: Remote

Timings:6.30PM IST to 3.30AM IST

Job Summary: We are seeking a detail-oriented and experienced Cybersecurity Project Manager to oversee the successful execution of cybersecurity projects.

The ideal candidate will have a strong background in cybersecurity and project management, with the ability to coordinate and implement security measures to protect our organization's digital assets.

Key Responsibilities:

Develop and manage project plans for cybersecurity initiatives.

Identify potential security risks and vulnerabilities, and propose mitigation strategies.

Coordinate with IT, engineering, and business teams to ensure successful project execution.

Implement cybersecurity training programs and promote awareness of security protocols.

Evaluate the effectiveness of security measures and recommend improvements.

Manage budgets related to cybersecurity projects.

Ensure compliance with data protection and privacy laws and regulations.

Communicate regularly with senior management and stakeholders about project status and issues.

Prepare reports on security incidents and breaches, and analyze data to identify trends and improve security.

Qualifications:

Proven work experience as a Cybersecurity Project Manager / Cybersecurity Analyst or similar role.

Strong knowledge of cybersecurity threats, vulnerabilities, and risk management.

Experience in managing IT security projects and understanding of IT security concepts and best practices.

Excellent project management skills, including planning, budgeting, and resource management.

Strong communication and interpersonal skills.

Relevant certifications (e.g., PMP, CISSP, CompTIA Security+) are a plus.

Experience with security tools such as firewalls, VPNs, proxies, and SIEMs.

Preferred Skills:

Familiarity with project management tools such as Smartsheets, Asana, Jira.

Experience working in fast-paced environments with short turnarounds.

Ability to manage multiple projects and priorities simultaneously.

company icon

Vriba

calendar icon

12 days ago

Cyber Security Specialist

Designation - Cyber Security Expert

Skill - Cyber security expert

Experience - Above 10 Years

Job Location - New Delhi

Shift - Regular

Working Days - 5 days a week (WFO)

Notice Period: Candidates who are immediate joiners or with maximum 30-45 days' notice period will be considered.

Certification: CISA/CISSP/CISM (Mandatory)

Requirements & Key Skills -

  • Ensure that the Client IT systems are secure, efficient, and compliant with relevant regulations and industry standards.
  • Responsibility & Work Profile will include: Understanding the Project Requirements, Technical Specifications & Scope of work. Designing & Maintaining Security Compliant IT Infra Architecture & Systems.
  • Audits: Conducting thorough audits of IT systems, processes, and controls to identify weaknesses, vulnerabilities, and areas for improvement in Design.
  • Risk Assessment: Assessing the risk associated with IT systems and identifying potential threats to data integrity, confidentiality, and availability.
  • Compliance Management: Ensuring that IT systems and processes comply with relevant laws, regulations, and industry standards & all respective SoPs are security audited and compliant.
  • Support in preparation of ATP document, SoP document etc.
  • Security Management: Implementing and maintaining effective security measures to protect the DC-DR & Remote Site's IT assets from cyber threats, including malware, phishing, and unauthorized access & other types of cyber-attacks. Ensuring Security Controls w.r.t SoPs
  • Controls Evaluation: Evaluating the effectiveness of existing IT controls and recommending enhancements or new controls to mitigate risks and improve security posture.
  • Report Generation: Preparing detailed audit reports documenting findings, recommendations, and remediation plans for management and stakeholders.
  • Training and Awareness: Providing training and awareness programs to educate employees about IT security best practices and compliance requirements.
  • Continuous Monitoring: Monitoring IT systems and processes continuously to detect and respond to security incidents and compliance breaches in a timely manner.
  • Collaboration: Collaborating with other departments, to address IT-related risks and compliance issues effectively. Support in VAPT
  • Facilitate the smooth integration of additional planned security solutions (such as 118 P a g e AntiAPT Solutions, HIDS/HIPS, ZTA etc), suggest the sufficient RU space & inputs for Racking Stacking design and Intelligent cabling for these futuristic requirements.
  • Overall, the position will play a crucial role in helping Client to maintain the integrity, confidentiality, and availability of their information systems while ensuring compliance with regulatory requirements and industry standards & best practices.

Benefits:

We offer a competitive compensation and benefits package, as well as the opportunity to work on challenging and rewarding projects.

Regards,

Kapalins

company icon

Kapalins

calendar icon

12 days ago

Cyber Security Engineer

We are seeking a highly skilled and motivated Cyber Security Engineer to join our dynamic team. In this role, you will be responsible for developing, implementing, and managing security measures to protect our clients' sensitive data and ensure compliance with regulatory requirements, including HIPAA and NIST frameworks.

The ideal candidate will have a strong background in cybersecurity, with deep expertise in HIPAA compliance, NIST standards, and relevant industry best practices.

Key Responsibilities:

  • Security Design & Implementation:
  • Design, implement, and maintain secure network systems, applications, and infrastructure for client environments, ensuring compliance with HIPAA and NIST standards.
  • Risk Assessment & Vulnerability Management:
  • Perform regular risk assessments and vulnerability testing to identify potential threats to systems and data. Develop and implement remediation strategies.
  • Compliance & Documentation:
  • Ensure all security processes and activities are aligned with HIPAA, NIST, and other relevant industry standards. Maintain comprehensive documentation related to security policies, incidents, and procedures.
  • Incident Response & Monitoring:
  • Monitor systems for security breaches and respond to security incidents swiftly, following best practices for remediation. Lead the investigation and analysis of security incidents, including forensic analysis.
  • Policy & Process Development:
  • Develop and implement security policies, procedures, and practices that align with HIPAA and NIST guidelines. Collaborate with other teams to ensure that security is integrated across all operations.
  • Security Audits & Reporting:
  • Perform periodic security audits and assessments to evaluate the effectiveness of security controls. Prepare reports for internal stakeholders and regulatory bodies as needed.
  • Collaboration & Training:
  • Work closely with IT, operations, and management teams to ensure cybersecurity best practices are followed across the organization. Provide training and awareness programs on security protocols and compliance.

Required Skills & Experience:

  • Proven experience in cybersecurity roles with a focus on HIPAA compliance and NIST cybersecurity frameworks.
  • In-depth knowledge of industry regulations, including HIPAA, NIST, PCI DSS, and other security standards.
  • Strong experience with security technologies (firewalls, intrusion detection/prevention systems, VPNs, etc.).
  • Familiarity with cloud security platforms and services (AWS, Azure, Google Cloud).
  • Hands-on experience with security monitoring tools and SIEM solutions (Splunk, Sentinel, etc.).
  • Expertise in encryption technologies, vulnerability management, and identity access management.
  • Proficiency in security best practices and disaster recovery planning.
  • Strong analytical and problem-solving skills with attention to detail.
  • Ability to work under pressure, manage multiple tasks, and meet deadlines.

Preferred Qualifications:

  • Certified Information Systems Security Professional (CISSP)
  • Certified Information Security Manager (CISM)
  • Certified HIPAA Professional (CHP)
  • Experience with incident management and recovery procedures.
  • Familiarity with security automation and orchestration tools.
company icon

BlockTXM Inc

calendar icon

12 days ago

SAP Cyber Security

Greetings from TCS

TCS presents an excellent opportunity for SAP Cyber Security

Experience (Yrs) : 8 Plus years

Location of Requirement - Hyderabad, Bangalore, Kochi, Bhubaneswar, Noida, Pune, Gurgaon

Required Skills:

Information Management & Security, SAP Basis, Application Security Testing, SAP System Hardening, SAP Security Notes, SAP Cloud Application Lifecycle Management (CALM),SAP Solution Manager, Unix Shell Scripting, Python, SAP Code Vulnerability Analyzer(SAP CVA).

Desired Competencies -

  • Implementing security measures, managing system hardening.
  • Applying security notes to protect against vulnerabilities.
  • Focuses on protecting SAP systems and data from cyber threats, ensuring compliance with industry standards, and implementing secure architecture practices.
  • Collaborate with IT and other departments to ensure seamless integration of security measures with business operations.
  • Stay up to date with the latest security trends, technologies, and threats, and recommend improvements to enhance security posture

Note:

  • Candidates with less than 8 years of experience will not be
company icon

Tata Consultancy Services

calendar icon

12 days ago

Cyber Security Tester

Jole Overview

We are seeking a highly skilled and motivated Cyber Security Tester with 5+ years of experience. If you're passionate about coding, problem-solving, and innovation, we'd love to hear from you!

Only candidates with testing experience are eligible to apply for this position.

About Us

CodeVyasa is a mid-sized product engineering company that works with top-tier product/solutions companies such as McKinsey, Walmart, RazorPay, Swiggy, and others. We are about 550+ people strong and we cater to Product & Data Engineering use-cases around Agentic AI, RPA, Full-stack and various other GenAI areas.

Key Responsibilities:

• Lead and manage cybersecurity testing projects for telecom and networking equipment (e.g., Routers, Switches, Firewalls, Access points etc.).

• Drive ITSAR (Indian Telecom Security Assurance Requirements) testing initiatives and capability development.

• Develop testing capability for FIPS 140-3 (Level 1/2) cryptographic module validations and Common Criteria (CC) EAL evaluations.

• Conduct and oversee penetration testing, source code reviews, and vulnerability

assessments for firmware and applications.

• Build and maintain internal labs, tools, and automation frameworks for product security evaluations.

• Interpret and implement national/international security standards and translate them into test cases and validation protocols.

• Interface with OEMs, consultants, and certification bodies to support product compliance and documentation requirements.

• Manage technical teams, plan resource allocation, track project delivery timelines, and mentor junior engineers.

• Stay updated with evolving cybersecurity threats, standards, and industry best practices and contribute to relevant international forums by attending meetings commenting on standards, test specifications and publishing white papers.

Required Qualifications:

• Bachelor's or Master's degree in Electronics and Communication, Computer Science, Cybersecurity, or related fields.

• 5+ years or more of experience in product-level cybersecurity testing, preferably in telecom or networking domains.

• Proven track record in Cybersecurity testing, and experience working with FIPS (NIST CMVP) and/or Common Criteria program.

• Familiarity with test tools such as Wireshark, Nessus, Burp Suite, OpenSSL, JTAG/UART tools, Crypto validation tools.

• Solid knowledge of Linux environments, scripting, and security configuration of embedded systems.

Why Join CodeVyasa?

  • Work on innovative, high-impact projects with a team of top-tier professionals.
  • Continuous learning opportunities and professional growth.
  • Flexible work environment with a supportive company culture.
  • Competitive salary and comprehensive benefits package.
  • Free healthcare coverage.

Here's a glimpse of what life at CodeVyasa looks like Life at CodeVyasa .

company icon

CodeVyasa

calendar icon

12 days ago

Vehicle Cyber Security Engineer

The Role

Cyber Security is a fast paced and dynamic area within the Automotive Industry. You will be an elemental part of the Product Engineering teams delivering JLR products in a secure way always looking at improving the Cyber Security posture and responding to emergent threats.

In your role as a Cyber Security Technical Lead Engineer you will be responsible to guide the delivery engineering teams through the different technical steps to onboard the build processes into the JLR PKI, integrate with the different Cyber security tools in and off the CI/CD pipeline and make sure their operations run uneventfully. You will make sure the Product Engineering teams are set and ready within the right timeframes to ensure Vehicle Programme delivery.

Key Performance indicators

  • Number of subsystems applicable to PKI and CI/CD per domain and per vehicle programme.
  • % completion of ECUs onboarded in PKI QA by programme.
  • % completion of ECUs successfully integrated signing service in the build chain by programme.
  • % completion of Signing SW and Secure Boot assurance by programme.
  • % completion of ECUs onboarded in PKI Production by programme.
  • % completion of Subsystems onboarded into Cyber scanning tool.

Key accountabilities and responsibilities

  • Support and onboard the engineering teams into the JLR PKI to enable signed SW.
  • Support and define with the JLR Crypto Centre of Excellence special JLR HSM use cases.
  • Lead the maintenance of the SW signing tool strategy.
  • Work with the JLR Cyber Centre of Excellence to define, develop and integrate technical roadmap in Production.
  • Support the business in any capacity related to the JLR HSM to guarantee Product Delivery.
  • Support and onboard the SW and ECU engineering teams into the Cyber security scanning tool/s.
  • Support the deployment and integration of SW and ECU teams into the CI/CD pipelines to ensure cyber services are fully integrated in the pipeline.
  • Support the CSMS Compliance teams in topics related to PKIs, Signing service, CI/CD pipelines and Vulnerability analysis.
  • Contribute to the FOSS compliance process.
  • Support discussions around Distributed Interface Agreements with Tier 1s.
  • Build/review Vulnerability reports.
  • Report Risks and define a proper Risk management path for those.
  • Support the Review/sign off subsystem Production Control Plan and Post development Release agreements.
  • Support VSOC to triage and resolve incidents/vulnerabilities.
  • Support type approval activities.

Key interactions

  • Product engineering technology centres.
  • JLR Crypto Centre of Excellence.
  • JLR Security Operations Centre.
  • Digital.
  • Procurement.
  • Industrial Operation and Service.
  • Vehicle Programmes.
  • Product Compliance.
  • Corporate Strategy.

Knowledge, Skills and Experience

Essential

  • Knowledge of Cryptography, specially in the embedded context.
  • Knowledge of safety critical embedded SW, design, coding and build.
  • Knowledge of python.
  • High level knowledge of CI/CD and some level of YAML scripting.
  • Experience working with suppliers.
  • A demonstrable knowledge of high integrity systems, and secure software and / or hardware design principles, in an embedded environment.
  • Knowledge of Cyber Security technologies used to protect embedded systems.
  • Practical experience performing TARA, security concepts and other Cyber security artefacts mentioned in ISO 21434.
  • An academic qualification in cyber security or equivalent experience.The ability to engineer in a way that is demonstrably compliant with standards and technical specifications.
  • Excellent collaborative skills.
  • An enthusiastic can-do attitude.

Desirable

  • Knowledge of SW development around AUTOSAR environment, especially for Crypto services.
  • Automotive experience preferred, but strong candidates from similar industries will also be considered (e.g. defence, aerospace, medical, IoT, rail).
  • Knowledge of automotive architectures, communication protocols, and technologies
  • Experience working and delivering in an agile team.
  • Project management skills.

company icon

Jaguar Land Rover India

calendar icon

12 days ago

Manager - Cyber Security

About the Team

At Navi, the InfoSec team safeguards our digital ecosystem - ensuring the confidentiality, integrity, and availability of critical systems and data. We lead the charge on cyber risk management, regulatory compliance, and data protection, while championing a security-first culture across all teams.

Our mission: Protect what powers Navi - securely, compliantly, and confidently.

About the Role

We are seeking an experienced Cyber Security professional to co-pilot the Cyber Security team. The ideal candidate will be responsible for developing and implementing comprehensive security strategies to protect our organization's information assets. This role involves overseeing security operations, managing security incidents, and ensuring compliance with relevant regulations and standards.

What We Expect From You

Leadership and Strategy:

  • Develop and implement the overall security strategy for the organization.
  • Build, and co-pilot cyber security team, ensuring continuous development and improvement.
  • Provide strategic views and execute on all security-related matters

Security Operations:

  • Oversees the day-to-day operations of the IT security and cloud security, including monitoring, incident response, and vulnerability management.
  • Knowledge of SIEM, XDR, ASM, DMARC, IAM , cloud security, email security, CASB, DLP is mandatory.
  • Experience and knowledge of managing security operations centers (SOC). Proficiency with SIEM tools (e.g., Splunk, ArcSight, QRadar).
  • Ability to configure, monitor, and analyze security events.
  • Knowledge of threat hunting, threat modeling, and incident response.
  • Ability to analyze cyber threats, and implement proactive security measures.
  • Cloud Security: Understanding of cloud security principles and best practices for AWS, Oracle Cloud and Google Cloud. Experience with cloud security tools and services
  • Manage and respond to security incidents and breaches, conducting thorough investigations and implementing corrective actions.

Risk Management:

  • Identify, assess, and prioritize potential security risks and vulnerabilities. Experience with vulnerability assessment tools (e.g., Nessus, Qualys). Knowledge of patch management processes and remediation strategies.
  • Develop and implement risk mitigation strategies and controls.
  • Conduct regular security assessments and review to ensure compliance with policies and standards.

Policy and Compliance:

  • Develop, review, and update security procedures and framework.
  • Ensure compliance with industry standards and regulatory requirements (e.g., ISO 27001, PCI-DSS, RBI, IRDAI and SEBI).
  • Coordinate and lead internal and external audits related to IT security.

Training and Awareness:

  • Promote a culture of security awareness throughout the organization.

Technology and Innovation:

  • Stay current with emerging security threats, technologies, and industry trends.
  • Evaluate and implement new security technologies and solutions to enhance the organization's security posture.

Must Haves

Education:

  • Bachelor's degree or diploma in Technology, or Engineering (Computer Science, Information Technology, Cybersecurity, or a related field).
  • Relevant certifications such as CISSP, CISM, CISA, or equivalent are desirable.

Experience:

  • 7 to 10 years of experience in cyber security, with at least 2 years in a Team lead role (preferred).
  • Proven experience in developing and implementing security strategies and policies.
  • Strong knowledge of security frameworks (e.g. MITTRE, CSF, CIS), standards, and best practices.

Skills:

  • Excellent leadership and team management skills.
  • Strong analytical and problem-solving abilities.
  • Effective communication and interpersonal skills.
  • Proficiency in security tools and technologies (e.g., firewalls, intrusion detection/prevention systems, SIEM).

Personal Attributes:

  • High level of integrity and ethical conduct.
  • Ability to work under pressure and manage multiple priorities.
  • Strong attention to detail and accuracy.

Inside Navi

We are shaping the future of financial services for a billion Indians through products that are simple, accessible, and affordable. From Personal & Home Loans to UPI, Insurance, Mutual Funds, and Gold - we're building tech-first solutions that work at scale, with a strong customer-first approach.

Founded by Sachin Bansal & Ankit Agarwal in 2018, we are one of India's fastest-growing financial services organisations. But we're just getting started!

Our Culture

The Navi DNA

Ambition. Perseverance. Self-awareness. Ownership. Integrity.

We're looking for people who dream big when it comes to innovation. At Navi, you'll be empowered with the right mechanisms to work in a dynamic team that builds and improves innovative solutions. If you're driven to deliver real value to customers, no matter the challenge, this is the place for you.

We chase excellence by uplifting each other-and that starts with every one of us.

Why You'll Thrive at Navi

At Navi, it's about how you think, build, and grow. You'll thrive here if:

  • You're impact-driven : You take ownership, build boldly, and care about making a real difference.
  • You strive for excellence : Good isn't good enough. You bring focus, precision, and a passion for quality.
  • You embrace change : You adapt quickly, move fast, and always put the customer first.

company icon

Navi

calendar icon

12 days ago

Assistant Manager / Manager / Specialist - Cyber Security Service Delivery

Are you ready for the next challenge in Cyber Security Delivery?

We are looking for a Manager / Assistant Manager / Delivery Specialist - Cyber Security Services Operations

Experience: 3-5 Years

Location: Gurgaon - Sohna Road, Sector 49

Department: Cyber Security Services

Role Summary:

We are seeking a proactive and organized Assistant Manager / Manager - Cyber Security Services Operations to lead cross-functional delivery teams supporting SOC monitoring, DLP / CASB monitoring & management services. The role emphasises program governance, operational excellence, and customer engagement, ensuring high-quality service delivery through cross-trained team members. While not a hands-on SOC manager role, a solid understanding of cybersecurity operations is essential. The role will work closely with customer success specialist.

Key Responsibilities:

Program Governance & Delivery Oversight

  • Oversee operational governance for cybersecurity services delivery across SOC, DLP, and CASB domains.
  • Define and track delivery KPIs, SLAs, and quality metrics; ensure adherence to contractual commitments.
  • Establish and manage operational cadence including weekly reviews, monthly service reporting, and continuous improvement plans.
  • Maintain and improve runbooks, knowledge bases, and operational playbooks where required.

Cross-Functional Team Management

  • Lead and coordinate a cross-trained team delivering integrated security services.
  • Promote team flexibility and service continuity through knowledge-sharing and cross-skilling initiatives.
  • Facilitate effective resource allocation and manage shift schedules if required.

Customer Interaction & Service Excellence

  • Serve as a primary operational point of contact for clients for day-to-day delivery and escalations.
  • Collaborate with the Customer Success Lead to identify areas of service improvement, value addition, and strategic alignment.
  • Support onboarding and steady-state transition of new customers, ensuring seamless integration into delivery processes.
  • Participate in client governance calls, QBRs, and feedback loops to enhance service delivery.

Continuous Improvement & Operational Efficiency

  • Identify process gaps and drive automation, optimization, and quality enhancements across services.
  • Collaborate with internal stakeholders including technology SMEs, security architects, and compliance teams for alignment.
  • Contribute to service innovation and transformation initiatives.

Required Skills & Experience:

  • 3-5 years of experience in cybersecurity service operations, program coordination, or delivery management in a managed services/MSSP environment.
  • Hands-on understanding of cybersecurity domains such as:
  • SOC monitoring and incident response workflows
  • DLP tools (e.g., Symantec, Forcepoint, Microsoft Purview)
  • CASB solutions (e.g., Netskope, Zscaler)
  • Strong experience in delivery governance, customer communication, and operational metrics tracking.
  • Excellent interpersonal, coordination, and presentation skills.
  • Proficient with service management and collaboration platforms (e.g., ServiceNow, Jira, Confluence, MS Teams).

Preferred Qualifications:

  • Bachelor's degree in Information Security, Computer Science, IT, or a related field.
  • Experience in stakeholder engagement, account management, or customer success is a plus.

Work Culture & Environment:

  • Customer-first mindset with a strong focus on delivery excellence.
  • Agile, cross-functional security delivery team culture.
  • We operate on a 5 day work week schedule, supporting work-life balance and personal well-being
  • Opportunities for professional growth through upskilling and cross-domain exposure.
  • Employees are encouraged to cross-train across technologies and continuously enhance their skills through formal training, hands-on experience, and certifications.
  • We foster a team-first environment that values open communication, diversity of thought, and mutual respect.

company icon

CyberAssure Services (P) Ltd.

calendar icon

12 days ago

Sales Manager- Cyber Security Solutions

We are seeking a highly motivated and experienced Sales Manager to drive our cybersecurity product and service sales, with a strong preference for candidates who have worked with Fortinet solutions. The ideal candidate will possess a proven track record in cybersecurity sales, an established network in India (especially South India), and the ability to independently manage field sales, cold outreach, and lead generation.

Key Responsibilities:

  • Drive B2B sales of cybersecurity solutions, particularly Fortinet firewalls, SOC as a Service, and managed security services.
  • Execute field sales visits, cold calls, and cold emails to identify and convert leads.
  • Build and maintain relationships with decision-makers (CIOs, IT Managers, CISOs).
  • Use CRM tools to manage sales pipeline, activities, and reporting.
  • Leverage lead generation tools (e.g., LinkedIn Sales Navigator, Apollo, ZoomInfo) to identify and pursue new business opportunities.
  • Collaborate with the technical pre-sales and delivery teams to ensure client requirements are met effectively.
  • Represent the company at industry events, expos, and trade shows.
  • Provide regular updates and forecasts to senior leadership.

Requirements:

  • 5+ years of experience in Cybersecurity sales, preferably with Fortinet or similar security solutions.
  • Proven track record of meeting or exceeding sales targets.
  • Strong understanding of network security, firewall management, SOC, and threat detection solutions.
  • Excellent communication, negotiation, and presentation skills.
  • Experience using CRM software
  • Familiarity with lead generation tools
  • Bachelor's degree in Business, IT, Engineering, or related field. (MBA is a plus).
company icon

Madre Integrated Engineering

calendar icon

12 days ago

Cyber Security Consultant

Functional Expertise

Lead and manage the organization's Information Security Risk and Governance framework, ensuring alignment with business objectives and compliance requirements.

Draft, implement, and continuously improve security policies and procedures in alignment with

regulatory requirements and industry standards. Ensure consistent enforcement of security policies

across all departments.

Develop, implement, and monitor risk management policies, procedures, and controls to safeguard the organization & information assets.

Lead and manage Third-Party Risk Management efforts, assessing and mitigating risks posed by vendors, partners, and other third-party entities.

Collaborate with procurement and legal teams to develop and enforce security requirements in contracts and service agreements with third-party vendors.

Conduct risk assessments and ensure compliance with contractual and regulatory security

requirements.

Lead incident response and investigations, providing subject matter expertise to mitigate security incidents, conducting root cause analysis, and recommending improvements to prevent future incidents.

Conduct comprehensive risk assessments and security audits across IT infrastructure, applications, and third-party systems to identify vulnerabilities and gaps, ensuring compliance with internal policies and external regulations.

Conduct regular risk assessments to identify vulnerabilities and threats and collaborate with

relevant teams to define remediation strategies.

Oversee and manage the organization & information security governance structure, ensuring that security policies and procedures are communicated, adopted, and adhered to across the organization.

Establish and maintain a comprehensive risk register, and provide senior leadership with risk

metrics and risk status updates.

Develop and provide security awareness training to employees, ensuring they are aware of the

latest threats and best practices to follow.

Work with cross-functional teams to ensure compliance with relevant data protection laws, industry standards, and regulations (e.g., GDPR, ISO 27001, NIST, SOC 2, etc.).

Qualification & Experience

6-8 years of hands-on experience in Information security governance with a focus on,

Implementation Security strategies, RBI IT framework, ISO 27001 & Third-Party Risk

Management. Proven track record of implementing and managing security Policies & strategy.

Skills & know-how

Minimum of 6 years of experience in information security, risk management, or

related fields, with a proven track record in risk management governance and third-

party risk management.

Experience working with security frameworks, such as RBI MD IT, ISO 27001, NIST,

and SOC 2, as well as industry regulations and standards (GDPR, DPDPA, etc.).

Strong knowledge of third-party risk assessment methodologies and practices.

Experience with tools and platforms for risk management, vendor management, and

governance reporting.

Behaviors

Extremely high ownership with security mindset.

Self-starter with a bias for action.

Ability to operate in a high ambiguity environment.

Robust Interpersonal Skills for collaborating with various Units for facilitating closures

Effective Team Player.

company icon

Trillionloans

calendar icon

12 days ago

Cyber Security Engineer

Greetings from TCS!

TCS is conducting in-person interview drive for Hyderabad, Bangalore, Chennai, Mumbai, Noida & Kolkata.

Date of in-person interview: 7th June(Saturday)

Reporting Time: 9:00 AM

Joining location: PAN India

In-person interview location: Hyderabad, Bangalore, Chennai, Mumbai, Noida & Kolkata.

Role : Role assigned based on the technical interview round

Desired Skill Set: OKTA

Experience Range: 4-10yrs & 10+yrs

Joining Location: PAN INDIA

JD:

  • Assist with managing Policies, standards and IT Controls for IAM related to SSO/MFA
  • Work with large business programs to provide IAM/SSO/MFA guidance, requirements and help to develop solutions patterns.
  • Expertise with Okta APIs and integrating applications and third party services with Okta Expertise with various OAuth2 Flows supported in Okta, Custom Authorization Servers, SAML2.0 Federations, OpenID Connect, SCIM integrations and legacy based integrations.
  • Design and implement API, external IDP integrations, directory and database integrations and synchronization.
  • Experience in user onboarding, application onboarding and user lifecycle management.
  • Acts independently to establish and implement security and define service integrations with all other IT services such as build teams, asset management, service and incident management
  • Should be skilled in coordinating and communicating with other teams to manage dependencies on other teams and stakeholders.
  • Ability to work under fixed timelines and meet deadlines
  • Work closely with Okta Architects, Okta developers and customer business and application development team to understand current landscape, use cases, gather requirements and plan Okta Setup and Integration activities.
  • Communicating to clients and partners aspects of both the product and the implementation at the technical and/or functional level appropriate for the situation

company icon

Tata Consultancy Services

calendar icon

12 days ago

Cyber Security- Pen Testing (Eng I: 2-4yrs; Eng-II: 4-7 yrs)

The Opportunity

"We are seeking a skilled and proactive Cybersecurity Engineer/Analyst to join our Product Security Testing Team. This team helps ensure that our products and clients are protected and maintain trust in our security processes. We protect the FICO brand and our products by engaging with development teams at every step of the product development lifecycle. We assess and influence product design, analyze applications for flaws that may lead to security issues, and provide security testing to help ensure our products are secure. We seek candidates who are focused on delivery, prioritize data-driven decisions over opinions, are continuous learners, passionate about information security and love their work. This role focuses on validating secure coding practices, conduct and coordinate security testing/pen testing."- Sr Manager, Cyber Security

What We're Seeking

  • Bachelor's degree in computer science, Cybersecurity, or a related field.
  • Relevant cyber security certifications (e.g., CEH, CCSP, CISSP, OSCP etc) are highly desirable.
  • Proven experience of at least 2 years in a similar role within Cybersecurity.
  • Strong understanding of AWS infrastructure and cloud security principles.
  • In-depth knowledge of cybersecurity principles, methodologies, frameworks and best practices. (OSI, NIST, OWASP, SANS, PCI etc)
  • Knowledge of secure coding principles and experience with code review processes and tools.
  • Experience with Pen testing, infrastructure as a code scan reviews and dynamic application security testing (DAST) methodologies and tools.
  • Experience with Invicti, Burpsuite, Traceable API, Checkmarx KICS, Fortify, Checkmarx is preferred
  • Knowledge and experience in CI/CD, shift left security.
  • Strong analytical and problem-solving skills with a keen attention to detail.
  • Strong written and oral communication skills with the ability to convey complex security concepts to non-technical stakeholders.
  • Strong organizational and interpersonal skills.

What You'll Contribute

  • Collaborate with engineers, consultants and leadership to identify security risks and recommend mitigations within the Secure Development Lifecycle (SDLC).
  • Perform activities such as secure code reviews, security testing and vulnerability triage across various applications.
  • Regularly interact with internal and external customers on security-related projects and operational tasks.
  • Develop understanding of business functionality and apply testing methodology as appropriate to technologies and risks.
  • Analyse test results, draw conclusions from results, and develop targeted exploit examples.
  • Clearly and professionally document root cause and risk analysis of findings.
  • Consult with operations and software development teams to help ensure potential weaknesses are tracked and addressed.
  • Collaborate with other teams to improve the overall security posture of applications/infrastructure.
  • Stay current on security best practices, vulnerabilities, and attacker tactics, techniques, and procedures.
  • Develop and test effective functional security testing strategies for new/emerging product security requirements.
  • Suggest improvements to existing processes/tooling; ideate and implement automation where possible.

company icon

FICO

calendar icon

12 days ago

Cyber Security Engineer

Key Responsibilities: Design, implement, and manage Palo Alto Networks solutions, including: Next-Gen Firewall (NGFW) EDR/XDR (Cortex XDR) SIEM/SOAR (Cortex XSIAM) Lead and support migration projects from legacy platforms (e.g., Splunk, Sentinel, QRadar) to Palo Alto Cortex XSIAM Work with clients to understand business requirements and deliver tailored cybersecurity solutions Perform threat hunting, alert tuning, policy configuration, and use case development Collaborate with global teams (onshore/offshore model) for delivery in sectors like Telecom, Finance, Retail, and Public Sector Support security assessments, integrations, and continuous improvement initiatives Required Skills & Qualifications: Strong hands-on experience in Palo Alto technologies (NGFW, Cortex XDR/XSIAM) Proven knowledge of cybersecurity operations, SOC processes, and incident response Experience with SIEM migration and integrations Understanding of threat intelligence, detection engineering, and automation Good knowledge of scripting (Python, PowerShell) and log analysis Excellent communication and client-facing skills Preferred Certifications: Palo Alto Networks Certifications, such as: PCNSE (Network Security Engineer) Cortex XDR/XSIAM certifications (if available) Additional certifications like CEH, CISSP, or relevant SIEM/EDR vendor certifications are a plus Why Join Us? Opportunity to work on cutting-edge XSIAM and XDR deployments Part of a growing global team delivering high-impact security projects Exposure to federal and enterprise-grade environments Flexible work culture with opportunities for on-site (Australia/US) engagements
company icon

Prudent Technologies and Consulting, Inc.

calendar icon

12 days ago

Cyber Security Manager

YOUR ROLE. Responsibilities include but not limited to: Assess technology, cybersecurity, and privacy risks within client environments and the related controls and provide practical remediation plans Conclude on the business impact to the organization as it relates to identified cybersecurity, technology, and/or privacy risks Manage multiple engagements while maintaining company quality standards Work with clients in a broad array of industries including information technology, financial services, retail & consumer products, pharmaceuticals, electronics, manufacturing, media, and government contracting etc. Understand clients' organizations and provide value-added solutions and best practices Proactively manage client issues and expectations. Understand and appreciate the firm's model of balancing client needs with profitability Review and evaluate client IT environment including IT systems, processes, and controls to ensure compliance with prevailing regulatory laws and requirements Work with clients to test for compliance with various prevailing regulatory laws, requirements, and standards including but not limited to Sarbanes-Oxley Act of 2002, NYDFS, GDPR, CCPA, PCI DSS, ISO 27001, HIPAA, CMMC, etc. Ensure engagement reporting observations and recommendations are based on a complete understanding of the process, circumstances, and risk Prepare formal written reports providing recommendations for management to strengthen and improve operations in addition to identifying cost or efficiency savings Identify areas for risk transformation and automation to assist clients with reducing the cost of compliance Act as a professional mentor and coach to junior team members, participating in the performance management cycle Participate in business development activities such as professional networking, proposal development, etc. YOUR EXPERIENCE. The successful candidate will have: A minimum of seven (7) years of experience with the following: Working knowledge of Cloud Security Framework, General Data Protection Requirement (GDPR), COBIT 5, PCI DSS, ISO 27001/2, HIPAA, California Consumer Protection Act (CCPA), NIST 800-171/800-53/NIST 800-37 required Background and understanding of the risks and controls in technologies such as web, cloud, client/server, open systems architecture, data warehousing, and imaging Proficient understanding of Cloud security, Identity and Access Management, ERP, Operating Systems, Databases, and Network Infrastructure components Knowledge of risks and controls in emerging technologies based on Blockchain, Internet of Things (IoT), and Artificial Intelligence is a plus Experience managing simple and complex information technology internal audits Experience managing team of various sizes across geographical boundaries Exceptional oral and written communication skills Demonstrated ability to manage client engagements and supervise staff Bachelor's Degree required, Master's Degree preferred CISA, CISSP, CCSK, CIPP, or CRISC required
company icon

CohnReznick

calendar icon

12 days ago

CYBER SECURITY TRAINER

Roles & Responsibility: Familiarity with cybersecurity tools and frameworks (CЕН, CISSP, SOC, SIEM). Hands-on experience in security operations or ethical hacking Bachelor's degree in IT or related field Locations - Pune, Maharashtra Sonipat, Haryana Min Qualification - Graduate Experience - Minimum 6 months to 1 yr. of Training/ Teaching experience Reimbursement of travel expenses on actual cost incurred Project Duration - Long Term Project Can be extended on the basis of project requirement For More Information Visit:
company icon

NIIT Foundation

calendar icon

12 days ago

Cyber Security Engineer (EDR)

Skill: Endpoint Detection and Response (EDR) Exp : 3- 8 Yrs NP : 30-60 days Location : Pune & Hyderabad Responsibilities Good working knowledge of EDR solutions such as MDATP, FireEye, CrowdStrike Falcon, Carbon Black. Must be well-versed with Operating System concepts i.e. Windows/Linux/MacOS Ability to distinguish between False Positives and False Negatives detections with respect to logs available. Good Exposure to OSINT tools, sandboxing, encoding-decoding techniques for independent investigation. Must be able to Investigate and Triage EDR related alerts with an ability to share detailed investigation reports to clients within SLA. Knowledge of Cyber kill chain and MITRE ATT&CK techniques and tactics used by adversary to evade detection. Awareness of various stages of Incident Response which involves in-depth analysis and RCA submission on security incidents. Good understanding of Malware Analysis i.e. static and dynamic and its variants. Exposure to adversary simulation and red teaming tools such as Caldera, PowerShell Empire, Cactus Torch Understanding of Database language i.e. KQL is a Plus. Understanding of Network Security concepts and popular encryption standards. Excellent communication skills for cross-group and interpersonal skills with ability to articulate business need for detection improvements. Exposure to reverse engineering of malware samples is a plus. Certification in OSCP, OSCE, GREM, GCIH, GCFA will be highly preferred. Willing to work in rotational shift timings.
company icon

LTIMindtree

calendar icon

12 days ago

Cyber Security Trainer

Job Purpose

The candidate will be responsible for delivering Cybersecurity trainings. Trainer also have the advantage of working on various consulting projects as well.

Duties and Responsibilities

Candidate will be part of the Institute of Information Security - our Training Division and will report into the Training Lead / Director / Academics Head. He / She will deliver various trainings such as below but not limited to:

  1. Application Security Testing
  2. Vulnerability Assessment and Penetration Testing
  3. Secure Coding Practices - .NET, Java, PHP etc
  4. Digital Forensics
  5. Cybersecurity
  6. Threat Modeling
  7. SIEM
  8. ISO 27001
  9. PCI DSS

Candidate will be also responsible for developing new course material.

Demonstrated ability to learn and adapt to new concepts in the following areas will be a significant advantage:

  • Devops
  • IoT
  • Blockchain

Academic / University Qualifications

Graduate / Post Graduate in Computer Science

Experience

1-4 Years

Professional Certifications

Candidates with any of the certifications will be preferred.

  • OSCP / OSCE
  • CEH
  • CCNA
  • CCNP
  • CISSP
  • CISA
  • CISM
  • ISO 27001 LA

Knowledge on Tools

  • Candidates should know any / or all the below tools. This will be an added advantage.
  • Kali Linux
  • Burp Suite
  • Fiddler
  • Netsparker
  • Wireshark
  • Nikto,
  • Acunetix
  • WAFW00f
  • Backtrack
  • Metasploit

company icon

Network Intelligence

calendar icon

12 days ago

Cyber Security Analyst

Job Title - Sr. Security Analyst

Job Location - Baner, Pune, Maharashtra

Position Overview

As a Sr. Security Analyst, you will play a crucial role in conducting meticulous assessments, orchestrating proactive monitoring, and spearheading strategic enhancements to fortify and advance our identity security offerings. You will be helping our customers strengthen their identity security posture and maintain compliance with industry regulations by analyzing, detecting, and responding to identity-related threats, as well as providing strategic guidance and recommendations to defend against evolving threats and safeguard customers' critical assets.

Responsibilities

  • Leverage our clients Identity SecOps platform to monitor and analyze identity-related threats and incidents, including account compromise, identity theft, and unauthorized access attempts.
  • Lead incident response efforts for identity-related security incidents, coordinating with cross-functional teams - both internal and external - to contain, mitigate, and remediate security breaches on time.
  • Maintain accurate and detailed documentation of security incidents, investigations, and remediation activities, and prepare comprehensive reports for management and stakeholders.
  • Facilitate regular monthly calls with customers to ensure alignment with their security objectives and address any concerns or inquiries. Provide weekly reports on security posture, incident trends, and mitigation efforts. Promptly communicate critical alerts to customers as they occur to maintain transparency and trust in our services.
  • Conduct proactive monitoring of identity-related security events and anomalies.
  • Conduct risk assessments and impact analyses of identity-related security risks, prioritize remediation efforts, and implement controls and safeguards to mitigate identified risks effectively.
  • Promote security awareness and best practices related to identity security among employees, partners, and customers through training sessions, educational materials, and outreach initiatives.
  • Stay abreast of emerging threats and vulnerabilities in the identity security landscape, leveraging threat intelligence sources to enhance detection capabilities and help develop proactive security measures in our product.
  • Collaborate closely with product management, engineering team, and other stakeholders throughout the product development lifecycle.
  • Thrive in a dynamic startup environment, contributing to a culture of innovation and excellence.

Requirements

  • At least 8 years of hands-on experience in cybersecurity, with a focus on identity security, authentication, and access management.
  • Strong understanding of identity protocols and standards, such as SAML, OAuth, OpenID Connect, and LDAP.
  • Proficiency in security analysis tools and technologies, including SIEM, SOC, and SOAR solutions, XDR/EDR, intrusion detection/prevention systems, and identity and access management (IAM) platforms.
  • Proficiency in scripting and programming languages (e.g., Python, PowerShell) for automation, data analysis, and scripting purposes, enabling the creation of efficient analysis scripts and automation workflows to enhance security operations and streamline processes.
  • Familiarity with security frameworks and compliance requirements, such as SOC 2, GDPR, HIPAA, and PCI DSS.
  • Excellent attention to detail, analytical and problem-solving skills, with the ability to analyze complex security incidents and recommend effective mitigation strategies.
  • A solid understanding of cybersecurity concepts, principles, and best practices, with experience in security testing methodologies and tools, is a significant advantage.
  • Relevant certifications such as CISSP, CISM, CompTIA Security+, or GIAC certifications (e.g., GCIH, GCIA) are preferred.
  • Strong communication and collaboration skills.
  • Ability to thrive in a fast-paced, dynamic work environment.
  • Master's or Bachelor's degree in Computer Science, Engineering, or a related field.
company icon

NorthStar HR Consultants

calendar icon

12 days ago

Cyber Security Architect

Job Description:-

Product Cybersecurity Architect

  • Global Product Security
  • The purpose of the Global Product Security group is the enhancement of KGS products and services, and assurance of cyber competitive advantage by driving:
  • Brand reputation and advancement within the product cyber domain.
  • Secure development, continuous improvement and security maturity of products and services.
  • Assurance of secure operations, response, support, and channel engagement for all offerings.
  • Product innovation and differentiation leveraging cybersecurity capabilities and expertise.
  • Responsibilities
  • Supports all phases of secure engineering, support, and development lifecycles in collaboration with multifunctional leaders, stakeholders, contributors, and businesses.
  • Drives secure development principles, practices and activities within engineering and production to help quantify cybersecurity risk, issues, and defects within KGS offerings, such that teams may appropriately characterize, manage, and remediate to standard.
  • Coordinates with engineering to help scope projects, define cybersecurity requirements, perform gap analysis, refine functional requirements, and road map residual cyber risk.
  • Architects' solutions and designs security controls to meet secure design requirements, support cyber related feature and function development, implement security related modules and solutions, and foster new product development and innovation.
  • Provides subject matter expert guidance on cybersecurity and product development topics.
  • Supports Product Security activities such as threat modeling, security assurance testing, cyber risk assessment, security reviews and threat vulnerability assessment for all offerings.
  • Provides technical leadership, mentorship, and training.
  • Leads business units and projects through security certification and accreditation.
  • Supports ad hoc initiatives within the cybersecurity-engineering domain, as needed.

Qualifications

  • Bachelor's degree or above in Cybersecurity, computer science, software engineering, or equivalent
  • 2 to 5 years SW development exp w/5 years developing secure systems or controls.
  • OR
  • 3 or more years product cybersecurity experience
  • Preferred Qualifications
  • Exceptional cross-functional and multi-domain technical aptitude
  • Diverse technical domain experience (ex., Embedded, Enterprise, Mobile, Cloud, etc.)
  • Excellent cybersecurity depth and breadth knowledge and SW engineering skills
  • Subject matter expertise of secure SW development lifecycle, practices, and activities
  • Strong exp with secure by design principles and architecture level security concepts
  • Working knowledge of common and industry standard cloud-native/cloud-friendly authentication mechanisms (OAuth, OpenID, etc.), deployment orchestration, automation, and security configuration management (CircleCI, Jenkins, Puppet, Chef, Ansible, etc.)
  • Working knowledge on implementing SSL/TLS, PKI, AES, Key management protocols etc. over HTTP/TCP and UDP.
  • Strong understanding of cloud technologies including SaaS, PaaS, and IaaS
  • Experience in security certifications or accreditations such as SOC2, ISO 27001, FedRAMP, etc.
  • Familiarity with cybersecurity standards such as IEC 62443
  • Certifications proving deep practical knowledge such as CSSLP, CISSP, CCSP, CCSK, AWS Solutions Architect Professional
  • ELIGIBILITY REQUIREMENTS
  • Must be 18 years or older.
  • Must be willing to take a drug test as part of the selection process.
  • Must be willing to submit to a background investigation as part of the selection process.
  • Must be willing to work out of an office in Hyderabad, INDIA
  • Ability and availability to travel occasionally.
  • The candidate must be proficient in spoken and written English.
  • Added IEC 62443 as a nice to have.
  • Additional Job Description
  • Additional Job Description

Summary

  • Experienced Cybersecurity professional. Collects data from a variety of Computer Network Defense (CND) tools, including intrusion detection system alerts, firewall and network traffic logs, and host system logs to analyze events that occur within their environment.

Minimum Requirements

  • Requires advanced knowledge obtained through a University degree, combined with experience
  • Practical to substantial knowledge of Carrier organization, programs or systems with the ability to make enhancements and leverage in daily work
  • University Degree or equivalent
  • A minimum of 5 years prior relevant experience OR
  • An advanced degree in a related field and a minimum of 3 years experience

Kidde Global Solutions (KGS) is one of the world's largest manufacturers of residential and commercial fire and life safety products. Each day, we work to expand upon our legacy of innovation, providing advanced solutions to protect people and property from fire and related hazards. Today, KGS products are found in homes and businesses around the globe. We bring together the most trusted and iconic brands in safety and security. By building upon our combined experience and expertise, we provide residential and commercial customers with advanced solutions and services to protect people and property in a wide range of applications, all around the globe.

company icon

Kidde Global Solutions

calendar icon

12 days ago

Cyber Security Engineer

Key Responsibilities:

  • Design and maintain secure network communication solutions that meet compliance and cybersecurity requirements.
  • Ensure network security devices are configured with a least-privileged access approach.
  • Collaborate with product owners, operations managers, risk managers, MSPs, and vendors to maintain compliance and resolve security issues.
  • Implement and support secure network architectures across on-prem and cloud environments.
  • Analyze and design network security solutions that are scalable, efficient, and cost-effective.
  • Create and maintain technical documentation, implementation plans, and test procedures.
  • Provide Tier-3 support and coordinate with global teams to resolve escalated issues.
  • Participate in BCP/DRP exercises and maintain disaster recovery readiness.
  • Contribute to lifecycle management and continuous improvement of network security infrastructure.
  • Follow change management processes and share best practices across teams.

Required Qualifications:

  • Strong understanding of network security principles, protocols, and compliance standards (e.g., NIST).
  • Experience with secure network design in both business and industrial environments.
  • Familiarity with cybersecurity governance, risk management, and risk management.
  • Excellent troubleshooting, documentation, and stakeholder communication skills.
  • Ability to work in a global, cross-functional team environment.

company icon

Kresta Softech Private Limited

calendar icon

12 days ago

Cyber Security Engineer - IOT

eInfochips (An Arrow Company):

eInfochips, an Arrow company (A $27.9 B, NASDAQ listed (ARW); Ranked on the Fortune List), is a leading global provider of product engineering and semiconductor design services. 25+ years of proven track record, with a team of over 2500+ engineers, the team has been instrumental in developing over 500+ products and 40M deployments in 140 countries. Company's service offerings include Silicon Engineering, Embedded Engineering, Hardware Engineering & Digital Engineering services. eInfochips services 7 of the top 10 semiconductor companies and is recognized by NASSCOM, Zinnov and Gartner as a leading Semiconductor service provider.

Job Description:

Experience:

4-9 years of relevant experience in system security, embedded systems, and vulnerability assessments.

Key Skills:

Firmware Analysis Tools:

  • Expertise in using firmware analysis tools such as Ghidra, Binwalk, and Radare2 for static and dynamic analysis of firmware images.

Embedded Linux Platforms:

  • In-depth knowledge of embedded Linux, Yocto, and OpenWRT platforms for secure firmware and OS testing.

Secure Boot & Firmware Update Mechanisms:

  • Proficiency in testing secure boot processes and firmware update mechanisms, ensuring integrity and authenticity.

OS Hardening & Security Configurations:

  • Strong understanding of OS hardening techniques and security configurations to mitigate threats and enhance system integrity.

Vulnerability Assessment & CVE Analysis:

  • Extensive experience with vulnerability assessment frameworks and CVE analysis, identifying and addressing security vulnerabilities in embedded systems.

Debugging & Emulation Tools:

  • Proficient in using debugging tools and emulators such as QEMU to analyze embedded system behavior.

SBOM & Secure Update Protocols:

  • Familiarity with SBOM (Software Bill of Materials), patch management, and secure update to ensure safe software deployments.
  • Firmware Reverse Engineering:
  • Expertise in performing reverse engineering of firmware images to detect vulnerabilities and potential exploits.
  • Penetration Testing Frameworks:
  • Experience using penetration testing frameworks like Metasploit, using distributions like Kali Linux, and custom tools for system vulnerability testing.
  • Custom Test Case Development:
  • Ability to develop and execute custom test cases to simulate real-world attack scenarios and identify potential risks in embedded systems.
  • Leadership & Mentoring:
  • Strong leadership skills with a proven track record of mentoring junior engineers and guiding teams in advanced security testing methodologies.
  • Technical Writing & Reporting:
  • Excellent technical writing skills, including the ability to produce clear, concise, and detailed reports on security findings and risk assessments.
  • Proactive Security Risk Mitigation:
  • Proactive in identifying and mitigating security risks within embedded systems, ensuring the implementation of security best practices.

Responsibilities:

  • System-level Vulnerability Assessment and Penetration Testing (VAPT) for firmware, operating systems, and embedded software, ensuring thorough security evaluations.

Test Plan Development & Execution:

  • Develop and implement comprehensive test plans for secure update and patch validation, ensuring security fixes are applied correctly and without introducing new risks.

Firmware Static & Dynamic Analysis:

  • Conduct detailed static and dynamic analysis of firmware images using tools like Ghidra, Binwalk, and Radare2 to identify potential vulnerabilities.

Secure Boot & Root of Trust Validation:

  • Validate secure boot implementations and hardware root of trust to ensure system integrity and protection from malicious code injection.

OS Hardening & Access Control Testing:

  • Test OS hardening configurations and secure access control mechanisms to strengthen system defenses against unauthorized access and exploitation.

Vulnerability Identification & Classification:

  • Identify and classify vulnerabilities and misconfigurations in embedded systems, following industry standards such as CVSS for risk assessment and remediation prioritization.

Collaboration with Compliance & Engineering:

  • Work closely with compliance and engineering teams to prioritize remediation efforts, ensuring that vulnerabilities are addressed effectively.

Custom Attack Simulations:

  • Develop and execute custom test cases to simulate real-world attack scenarios and evaluate the system's resilience against cyber threats.

Rollback & Patch Management Testing:

  • Oversee testing of rollback and patch management procedures, ensuring that system updates do not compromise security or functionality.

Mentoring & Knowledge Sharing:

  • Mentor junior engineers in security testing methodologies, sharing knowledge on advanced techniques and tools for improving system security testing processes.

CVE Monitoring & Testing Updates:

  • Monitor relevant CVE feeds, integrating new vulnerabilities and security patches into testing procedures to ensure up-to-date protection.

Reporting & Risk Assessments:

  • Provide detailed technical reports and risk assessments to stakeholders, outlining identified vulnerabilities, potential impact, and recommended mitigations.

Regulatory Compliance:

  • Ensure that all testing activities align with industry standards, including RED 18031 compliance, and adhere to relevant regulatory frameworks.

Secure Lab Environment Maintenance:

  • Maintain a secure lab environment for all system testing activities, ensuring that testing procedures are conducted in a controlled and isolated setting.

Qualifications & Certifications:

Education:

  • Bachelor's or Master's degree in Cybersecurity, Embedded Systems, Computer Engineering, or a related field.

Certifications (Preferred):

  • OSCP (Offensive Security Certified Professional)
  • OSCE (Offensive Security Certified Expert)

Why Join Us?

Opportunity to work on cutting-edge technologies.

Lead a high-performing team in a fast-paced, dynamic environment.

Location: Ahmedabad

Interested candidates can share resume on

company icon

eInfochips (An Arrow Company)

calendar icon

12 days ago

Cyber Security Specialist

Skills:

Strong hands-on experience in setting up and configuring vulnerability management scans for internal and external networks.

Expertise in identifying, prioritizing, and remediating security vulnerabilities across IT assets.

Proficiency in recommending and implementing security patches, configuration changes, and risk mitigation strategies.

Experience working with security tools for Data Loss Prevention (DLP), Threat Intelligence, Endpoint Protection, and Security Information & Event Management (SIEM), Zscaler.

Ability to support and build new security capabilities across various domains, including cloud security, network security, and identity & access management.

Cloud security design, configurations, and initial triage of cloud security alerts. GCP must. OCI is desirable.

Zscaler Rollout for Remote Access Contractors: Manage and oversee the implementation of Zscaler to provide secure remote access for contractors and ensure compliance with security standards.

Password Complexity Rollouts: Implement and enforce password complexity policies across the organization to enhance security posture.

Security Awareness: Design and support security awareness programs to educate employees about cybersecurity best practices, phishing, and other social engineering risks.

Short JD:

The Cybersecurity Engineer will configure and manage vulnerability scans, prioritize security defects, and provide remediation strategies. You will also support cloud security, triage alerts, and implement Zscaler for secure remote access, enforce password complexity policies, and lead security awareness initiatives across the organization

company icon

TechProjects

calendar icon

12 days ago

Cyber Security Engineer II(4-6 Years of Exp)-AWS, KMS, AD/Entra ID

Job Description

The Opportunity

"Join our Cyber Security Engineering team where you'll play a critical role in managing and securing our infrastructure. In this hands-on position, you'll work on IAM, database security, and cloud environments, ensuring our systems remain secure and compliant. This role provides the opportunity to collaborate with experts across multiple domains, helping you build a deep understanding of security architectures in hybrid environments." - Director, Cyber Security.

What You'll Contribute

  • Manage, maintain, and optimize security and audit infrastructure, including application and database servers.
  • Oversee security, reporting, and auditing of Active Directory (AD) and Entra ID to ensure proper access controls and identity management.
  • Administer AWS Key Management Services (KMS) for encryption key lifecycle management to protect critical data within AWS environments.
  • Implement and manage database security controls, audits, and encryption to safeguard sensitive data.
  • Support security operations by responding to incidents, investigating threats, and remediating risks.
  • Collaborate on security audits, compliance initiatives, and risk assessments to meet regulatory standards.
  • Maintain thorough documentation of security configurations, incidents, and remediation actions, and provide regular reports on security metrics.

What We're Seeking

  • Bachelor's degree in Computer Science, Cyber Security, Information Technology, or a related field.
  • Relevant security certifications like CEH or AWS Certified Security are a plus.
  • 4+ years of experience in a Cyber Security Engineering role.
  • Working knowledge of networks, protocols, Linux/Windows OS internals, and system configuration.
  • Hands-on experience with Active Directory/Entra ID auditing and reporting.
  • Knowledge of AWS Key Management Services (KMS), CloudWatch, CloudTrail, and Guard Duty.
  • Experience with AWS CLI and Infrastructure as Code (Terraform is a plus)
  • Knowledge of database security best practices, encryption technologies, and cryptographic key management.

Our Offer to You

  • An inclusive culture strongly reflecting our core values: Act Like an Owner, Delight Our Customers and Earn the Respect of Others.
  • The opportunity to make an impact and develop professionally by leveraging your unique strengths and participating in valuable learning experiences.
  • Highly competitive compensation, benefits and rewards programs that encourage you to bring your best every day and be recognized for doing so.
  • An engaging, people-first work environment offering work/life balance, employee resource groups, and social events to promote interaction and camaraderie.

company icon

FICO

calendar icon

12 days ago

Product Sales Specialist (Cyber Security)

Job Role & Requirements:

  • Business Development experience, able to work with Sales teams to generate opportunities for Security Product offerings.
  • Design, Presents, demonstrates the Network Architecture for the Security domain(s) and provide technical consulting to Mid, Enterprise and Government customers.
  • Required to understand customer requirements and provide consultation / design on the architecture and solution.
  • Define security requirements for products and platforms.
  • Work with company leaders to develop long term vision, technology road map, and annual goals for the Cyber Security Practice. Build a distinguished portfolio of advanced cyber security services. Develop intellectual property, including methodologies, solutions, accelerators and tools to enable the practice to be recognized as a leader in the field of cyber security
  • Demonstrated knowledge of information security, computer forensics and data analysis; practices & procedures related to the investigation and response to network/computer intrusions and data theft. Experience in planning and implementing risk mitigation strategies relating to: data loss prevention, security incident and event management, identity and access management, role-based management, strong authentication, encryption, source code analysis, penetration testing, application and system hardening, firewall management and logical network segmentation.
  • Evaluate new technologies and processes that enhance security capabilities.
  • Conduct Thorough Assessment on the Deliveries from Cyber Security Perspectives.
  • Business Development experience, able to work with Sales teams to generate opportunities for Security Business. Able to drive Technical & Sales on various Security Technology offerings.
  • Able to drive new technology solution and need to have market intelligence on Security as a practice
  • Proven experience in managing the complete delivery lifecycle of security engagements, right from the pre-sales stage starting with the identification of opportunities and initial scoping through to the final delivery and signoff. Should have also implemented programs to provide post-cutover maintenance and operations support.
  • Must possess adequate knowledge of industry best practices and tools like: Malware Analysis, Memory Analysis, HBGary Responder, Network Traffic Collection and Analysis and Sandboxing, EnCase, F-Response, FTK, Helix and Paraben.
  • Understand complete discovery of customer environment and able to convert an opportunity by coordinating between Sales, Commercial, Partners etc.
  • Understanding of product portfolio of various OEMs e.g., Cisco, Juniper, Fortinet, Symantec, Mcafee, Bluecoat etc.
  • Able to Work on Funnel review, partner mindshare, drive higher discounts, drive commercial negotiations and closure of opportunity.
  • Responsible for the backend process like P&L, Cost optimization, Marketing etc.
  • Driving the funnel and initiatives with the OEMs and partners

Desired Candidate Profile:

  • Candidate must possess at Bachelor Degree Engineering in any discipline. Masters (MBA/ME) will be added advantage.
  • Individual contributor with 6 to 12 years of working experience in Security Presales/Business Development and/or IT Infrastructure.
  • Should have excellent knowledge in creating High level & Low level Design document, proposal writing skills, Bill of Material Preparation and writing Scope of Document.
  • Excellent Interpersonal & Collaboration Skills
  • Technology Certifications like CISSP, CISM, CISA, Certified Ethical Hacker (CEH) etc. are mandatory
  • Must be able to learn new technologies quickly.
  • Hunger to stretch and outperform.
  • Leadership skills to lead an informal matrix team to accomplish the objective

company icon

airtel

calendar icon

12 days ago

Cyber Security Engineer (Qualys, Vulnerability Management, AWS security)

The Opportunity

"This is an opportunity to define, build, and shape the future of FICO's Cybersecurity and Risk Posture. As part of the Threat & Vulnerability Management team, you will collaborate across the business, IT, and client environments to secure our cloud and data center infrastructure. Your contributions will be key to strengthening FICO's defense mechanisms and enhancing our compliance posture. We're looking for a cybersecurity expert passionate about continuous improvement, cloud security, and vulnerability risk reduction. If you're someone who thrives in a fast-paced environment and wants to work on high-impact global security initiatives, this role is for you" - VP, Software Engineering.

What You'll Contribute

  • Detect, identify, and analyze vulnerabilities across FICO environment.
  • 3.6 + years of overall experience.
  • Assess the risk of vulnerabilities detected to determine true impact.
  • Support stakeholders as a SME to understand technical details of vulnerabilities and steps to carry out remediation.
  • Coordinate with stakeholders to track issues remediation until closure.
  • Act as a SME for new projects in terms of vulnerability management lifecycle.
  • Manage, maintain, and tune tools used to support the VM process.
  • Update yourself with the latest security and technology developments.

What We're Seeking

  • Experience in a similar role such as vulnerability management specialist.
  • Experience with Qualys or other security vulnerability detection technology required.
  • Demonstrates subject-matter expert level understanding in multiple IT, Security and Software disciplines.
  • Ability to understand the cause and effect of application vulnerabilities with Operating System Vulnerabilities.
  • Must be able to multi-task and keep track of large amounts of information across disparate systems.
  • Ability to keep making progress and define future strategy/policy with regards to Enterprise.
  • Adherent to 'continuous monitoring' and 'continuous improvement' thought process.
  • Demonstrated technical IT skills, ability to understand and manage different OS flavors, network technologies and topologies.
  • Demonstrated technical security expertise in a variety of cloud platforms (AWS is preferred).
  • Comfortable interfacing with other internal or external organizations regarding problems that must be addressed to enhance security posture.
  • Ability to effectively translate and present solutions in business or management terms.
  • Ability to work effectively in a team environment.
  • Knowledge of Python scripting or other languages is nice to have.
  • Moderate documentation and analytical skills; documenting processes, policies, and standards.
  • Moderate ability to provide end-to-end support to enterprise counterparts, identifying root- cause of complex enterprise initiatives.
  • Moderate trouble shooting skills across complex enterprise applications, server, and endpoint environments.
  • Moderate ability to learn onboard and adapt to new technologies.
  • Basic privileged access management/right management experience, designing solutions based on least privilege.
  • Basic knowledge of malware operation, indicators or threat.
  • Moderate knowledge of current threat landscape
  • Entry Cybersecurity certifications, such as CompTIA Security +, GIAC Security Fundamentals, GIAC Security Essentials, ISC2 Associate, ISACA Cybersecurity Fundamentals are nice to have.

Our Offer to You

  • An inclusive culture strongly reflecting our core values: Act Like an Owner, Delight Our Customers and Earn the Respect of Others.
  • The opportunity to make an impact and develop professionally by leveraging your unique strengths and participating in valuable learning experiences.
  • Highly competitive compensation, benefits and rewards programs that encourage you to bring your best every day and be recognized for doing so.
  • An engaging, people-first work environment offering work/life balance, employee resource groups, and social events to promote interaction and camaraderie.

company icon

FICO

calendar icon

12 days ago

Cyber Security Senior Analyst - GRC

Security Policies and Procedures:

  • Assist in the development and implementation of information security policies, standards, and procedures.
  • Educate employees on information security best practices and enforce compliance with policies.

Security Awareness and Training:

  • Collaborate in developing and delivering security awareness programs and training sessions.
  • Educate customers on security best practices, policies, and procedures to foster a security-conscious culture.

Security Governance and Compliance:

  • Support clients in establishing effective security governance frameworks, including roles, responsibilities, and accountability.
  • Assist in implementing and managing compliance programs, ensuring adherence to relevant regulations, standards, and frameworks (e.g., PCI DSS, ISO 27001).
  • Help clients prepare for and respond to external audits and compliance assessments.

Information Security Audits:

  • Conduct information security assessments for clients, including risk assessments and Cybersecurity maturity assessments, compliance audits, Third-party audits, etc.
  • Identify security gaps, vulnerabilities, and risks in client's IT infrastructure and processes.
  • Write good quality reports of security audits / assessments.
  • Understanding of technical concepts relevant to the position.

company icon

Network Intelligence

calendar icon

12 days ago

Cyber Security Architect

Role: Cybersecurity Presales

Location: India

Black Box provides comprehensive, innovative, and full-lifecycle cybersecurity services such as Consulting, Professional Services, and 24/7 Managed Security Services. We believe 'one size does NOT fit all', so we provide tailored solutions to address clients' specific needs. With multiple Security Operation Centers (SOC) and a global team of certified and trained security experts, Cybalt provides solutions & services at the speed of innovation to enable its clients to grow their businesses securely.

Its offering portfolio includes Advisory, Governance, Risk, and Compliance; Managed Extended Detection and Response (XDR) and SOC-as-a-Service; Infrastructure and Data Security; Cloud Security; Identity and Access Management; Application Security; and OT & IoT Security. Besides partnering with leading security technologies, Cybalt also leverages a network of next-generation cybersecurity start-ups that are solving some emerging challenges in the industry.

We seek a highly skilled and experienced Cybersecurity Pre Sales candidate to join our global team.

Key Responsibilities:

  • Serve as the cybersecurity domain expert, engaging with prospects and existing clients to uncover their cybersecurity challenges and designing tailored solutions that effectively address and mitigate them.
  • Assist the sales teams and engage with clients in deep-dive discussions to identify gaps and risk areas from the cybersecurity standpoint. Leading the requirements gathering from prospects, suitable use case creation, and conceptualizing the suitable solution to address clients' cybersecurity challenges
  • Demonstrate a deep understanding of the competitive landscapes surrounding various cybersecurity technologies and their relevance to the emerging cybersecurity threat landscape.
  • Analyze and respond to RFPs by crafting tailored, comprehensive security strategies that align with client needs and specifications, leveraging a deep understanding of various security technologies and industry best practices.
  • Collaborate closely with security technology providers to co-develop innovative, integrated solutions, addressing clients' unique security challenges through a synergy of expert knowledge and cutting-edge technology.
  • Plan and design multi-vendor security solutions to create a cohesive, scalable system that enhances clients' organizational security without compromising operational efficiency or interoperability.
  • Coordinate with technology and service partners to seamlessly integrate various components into a cohesive final solution, ensuring technical proficiency and commercial viability align with the client's specific needs.
  • Conduct effort sizing and pricing of security solutions, carefully balancing various fixed and variable commercial models to provide cost-effective and efficient solutions tailored to specific client needs.
  • Play a pivotal role in the sales closing cycle by presenting the final technical and commercial aspects of the security solutions to clients, effectively communicating the value and alignment of the solution with the client's specific requirements and constraints.
  • Articulate and present the company's value propositions in industry events, showcasing expertise and innovative solutions in security to a broader professional audience.
  • Provide thought leadership by continuously updating their knowledge of innovative technologies, ensuring they remain at the forefront of industry trends and can apply the latest insights to enhance security solutions.

Preferred Skills & Experience Requirements:

  • Bachelor's degree in Computer Science, Information Security, or a related field. Advanced degrees or certifications (e.g., CISSP, CISM, CISA) are highly desirable.
  • Proven experience of at least 8-10 years in cybersecurity solution architecting, with a demonstrated ability to design complex solutions and provide strategic guidance to clients.
  • In-depth knowledge of XDR Technology, SOC Architecture, Infrastructure and Data Security, Advisory and GRC Processes.
  • Exceptional communication and presentation skills, enabling you to articulate complex cybersecurity concepts to both technical and non-technical stakeholders.
  • Extensive experience in risk assessment, vulnerability management, incident response, security architecture, and developing comprehensive security strategies.
  • Proficiency in utilizing industry-standard security tools, technologies, and methodologies.
  • Exceptional business acumen, to understand clients' unique business objectives and align cybersecurity strategies accordingly.
  • Proven ability to cultivate and maintain strong client relationships, consistently delivering superior solutions and surpassing client expectations.
  • Outstanding problem-solving skills and a strategic, analytical mindset, and be able to decipher the complex cybersecurity landscapes.
  • Professionalism, integrity, and a commitment to maintaining the highest ethical standards in conducting professional responsibilities.

company icon

Black Box

calendar icon

12 days ago

Cyber Security Specialist

IAM Solution Architect(PingOne Advanced Identity Cloud)

  • 15+ years of hands-on experience using at least three Access Management tools, including Okta, PingFederate, Entra ID, ForgeRock, ISAM, NETIQ, SiteMinder, and OAM, etc.
  • Must have experience in designing, deploying, and supporting a high-performance, high-availability ForgeRock environment with a large number of applications and multi-million identities.
  • Minimum of 7 years of experience in the design, development, and implementation of ForgeRock Identity and Access Management solutions using both on-premises and ForgeRock's Identity Cloud Suite.
  • Should have experience integrating PingOne Advanced Identity Cloud with existing applications and infrastructure.
  • Strong experience with the Ping Identity Platform and its products, including in-depth knowledge of PingOne AIC (ForgeRock Identity Cloud) and Ping Gateway (ForgeRock IG).
  • Analyze customer business needs to develop and implement effective solutions.
  • Provide technical leadership and guidance to development teams throughout the implementation process, ensuring compliance with architectural principles and best practices.
  • Must have completed multiple implementation and integration/migration projects involving any of the following access management products: Okta, PingFederate, Entra ID, ForgeRock, ISAM, NETIQ, SiteMinder, OAM, etc., including ForgeRock AM tools.
  • Experience in designing, developing, and architecting Asset Management (AM) solutions, along with effective communication with product vendors.
  • Experience in translating business requirements into technical specifications and exceptional design skills.
  • Very good Knowledge and strong understanding and extensive knowledge of modern authentication protocols, including OAuth 2.0, OpenID, SAML, and Kerberos.
  • Very good knowledge of software engineering methodologies and agile software development, particularly Scrum.
  • DevOps knowledge and experience, including continuous integration/continuous deployment (CI/CD) and configuration management.
  • Knowledge of web development using JavaScript, TypeScript, React, Angular, and CSS frameworks.
  • Proven experience as an IAM architect with a focus on ForgeRock/PING technologies.
  • In-depth understanding of identity and access management concepts, principles, and industry best practices.
  • A solid understanding of Business Continuity Planning (BCP) and Disaster Recovery (DR) activities related to Asset Management (AM) products is essential.

I

company icon

LTIMindtree

calendar icon

12 days ago

Cyber Security Developer

Job Title: Cyber Security Developer

Location: Hyderabad, India

Experience: 4-7 Years

Positions Open: 2-3

Notice Period: Immediate to 30 Days

Qualification: B.E./M.E. in Embedded Systems, Mechatronics, or Electronics

About the Role:

We are looking for experienced Cyber Security Developers with a strong background in the automotive domain to join our dynamic team in Hyderabad. The ideal candidate will be responsible for developing and integrating cybersecurity software features, working on AUTOSAR Crypto stacks, and handling secure bootloaders and HSMs.

Key Responsibilities:

  • Develop and integrate cybersecurity software features throughout the SDLC: requirement analysis, proposal creation, planning, and execution.
  • Work on AUTOSAR Crypto stack and bootloader development (including HSM integration).
  • Configure, integrate, and debug HSMs (vHSM/Escrypt HSM).
  • Analyze and interpret customer and software requirements.
  • Debug hardware using tools like T32, iSystem, and UDE.
  • Collaborate with teams to ensure robust implementation of cybersecurity protocols in automotive ECUs.

Required Skills & Experience:

  • Strong experience in the automotive domain.
  • Hands-on development experience with AUTOSAR Crypto Stack, bootloaders, and cybersecurity applications.
  • Expertise in HSM configuration, debugging, and integration (vHSM / Escrypt).
  • Proficiency in CAN (FD), FlexRay, and Ethernet communication protocols.
  • In-depth knowledge of Infineon Tricore MCUs.
  • Solid experience with AUTOSAR configuration tools like Vector DaVinci Configurator.
  • Excellent debugging skills using Trace32, iSystem, or UDE.
  • Strong analytical and problem-solving abilities.

Tools & Technologies:

  • Version Control: GIT, Integrity, ClearCase, MKS
  • AUTOSAR Tools: DaVinci Config Pro, DaVinci Developer, EB Tresos
  • Debuggers: Trace32, iSystem, UDE
  • Testing & Validation: Canoe, Canape, Canalyzer, Controller setups
  • Static Analysis: QAC, Polyspace
  • Requirement & Architecture Tools: DOORS, IBM Rhapsody

company icon

gbit

calendar icon

12 days ago

Cyber Security Specialist

We are looking for a Senior Cyber Security Engineer to drive end-to-end security architecture, operations, and culture across DeHaat's tech landscape. You will work closely with engineering, DevOps, data, and compliance teams to lead security initiatives and strengthen our defenses across cloud, applications, and infrastructure.

Key Responsibilities

  • Conduct Web and Android Application Vulnerability Assessments and Penetration Testing (VAPT) following OWASP and industry standards.
  • Conduct Network Pentesting on Cloud Infrastructure
  • Perform Secure Source Code Reviews using tools such as SonarQube and Semgrep, and recommend remediations.
  • Develop and integrate DevSecOps pipelines, embedding security into the CI/CD lifecycle.
  • Implement and manage SIEM solutions such as Wazuh and other threat detection/logging platforms.
  • Design and enforce Cloud Security configurations, including AWS WAF and Cloudflare for DDoS mitigation and application protection.
  • Work with development teams to integrate security best practices and review threat models and secure architecture designs.
  • Ensure compliance with industry standards such as PCI-DSS and ISO 27001, and help support audit readiness.
  • Provide detailed security findings, risk analysis, and actionable recommendations to stakeholders and developers.
  • Stay updated with the latest threats, vulnerabilities, and technologies.

Requirements

  • Junior 2-4, or Senior 5-6 years of experience in cybersecurity, with hands-on expertise in cloud and application security.
  • Deep understanding of AWS security services (IAM, VPC, KMS, GuardDuty, etc.).
  • Experience with SIEMs, WAFs, endpoint protection, and vulnerability management tools.
  • Proficiency in secure SDLC, DevSecOps, and scripting (Python, Bash).
  • Familiarity with industry frameworks (OWASP, NIST, MITRE) and regulatory standards.
  • Certifications like CISSP, OSCP, or AWS Security Specialty are a plus.
  • Strong communication, leadership, and cross-functional collaboration skills.

company icon

DeHaat

calendar icon

12 days ago

Cyber Security Specialist - Medical Device

eInfochips (An Arrow Company):

eInfochips, an Arrow company (A $27.9 B, NASDAQ listed (ARW); Ranked on the Fortune List), is a leading global provider of product engineering and semiconductor design services. 25+ years of proven track record, with a team of over 2500+ engineers, the team has been instrumental in developing over 500+ products and 40M deployments in 140 countries. Company's service offerings include Silicon Engineering, Embedded Engineering, Hardware Engineering & Digital Engineering services. eInfochips services 7 of the top 10 semiconductor companies and is recognized by NASSCOM, Zinnov and Gartner as a leading Semiconductor service provider.

Job Descriptions :

Experience Level: 5+ years

Key Responsibilities:

  • Drive end-to-end cybersecurity integration across the medical device product development life cycle, ensuring security is embedded from concept to release.
  • Develop and maintain cybersecurity for medical products, including security requirements specifications, risk assessments, threat models, and product security architecture documentation.
  • Conduct thorough gap assessments to evaluate compliance with IEC 81001-5-1, IEC 60601-4-5, AAMI TIR 57, and AAMI TIR 97 standards, and implement remediation measures.
  • Perform hands-on vulnerability assessments, penetration testing, and secure code reviews of embedded devices, IoMT (Internet of Medical Things) components, and connected systems.
  • Collaborate closely with development, compliance, and regulatory teams to ensure product security measures meet both internal security policies and external regulatory expectations.
  • Support SBOM management, software supply chain risk evaluations, and third-party component analysis to maintain software transparency and mitigate risks.
  • Provide expert input on secure communication protocols, encryption standards, data protection for both at-rest and in-transit data, and cloud-based connectivity of medical systems.
  • Assist in developing incident response strategies and bring working knowledge of HIPAA, GDPR, and HL7 to address data privacy and healthcare-specific regulatory concerns.
  • Contribute to the continuous enhancement of internal secure development processes, tools, and methodologies, while championing security best practices within product teams.

Required Skills and Qualifications:

  • Minimum of 6 years of experience in cybersecurity, including at least 3 years focused on medical devices, embedded systems, or IoT security.
  • Proven track record in authoring security design, defining technical requirements, and documenting security architectures aligned with regulatory needs.
  • Hands-on experience in embedded system security including secure boot, firmware security, threat modeling techniques (e.g., STRIDE, DREAD), and product-level risk assessments.
  • Strong understanding of IEC 81001-5-1, IEC 60601-4-5, AAMI TIR 57, and AAMI TIR 97, along with working knowledge of the medical device product development lifecycle and quality standards like ISO 14971.
  • Demonstrated expertise in vulnerability management and penetration testing of connected products across device and cloud ecosystems.
  • Familiarity with data privacy and interoperability standards such as HIPAA, GDPR, and HL7 is highly desirable.
  • Excellent problem-solving skills, critical thinking, and ability to lead gap analysis and remediation activities in regulated environments.
  • Strong collaboration skills with the ability to influence cross-functional teams including R&D, compliance, and product management.

Why Join Us?

Opportunity to work on cutting-edge technologies.

Lead a high-performing team in a fast-paced, dynamic environment.

Location: Ahmedabad/Pune/Noida/Bangalore/Hyderabad/Indore

We are looking Immediate to 30 days joiner.

Interested candidates can share resume on

company icon

eInfochips (An Arrow Company)

calendar icon

12 days ago

Cyber Security Senior Analyst - Penetration Testing

Responsibilities:

  • Moderate functional knowledge of cyber security or information security processes and expert domain knowledge
  • Assist functional manager in performing day to day security activities/operations by working independently;
  • handle larger projects or assignments Analyze the problem statements, define and execute the desired solutions;
  • mentor team members Work inline with defined processes, framework and provide regular functional updates to manager
  • Ability to prioritize deliverables and work in consultation with manager and other seniors in the team Contribute to various functional initiatives with larger responsibilities

Profile Required:

• 3 to 6 years of related work experience in threat modeling, penetration testing and/or secure application testing

• Thorough understanding of application architectures, understanding of security standards, frameworks and methodologies, HTTP, TCP/IP

• Knowledge of web application attacks and defense strategies including those found in the OWASP Top 10, Mobile Top 10 and SANS top 25

• Knowledge using leading testing tools such as Accunatix, Burp suite, NMAP, Kali OS , Nessus, Metasploit etc.

• Experience with various operating systems, network security technologies, web application development technologies, languages and frameworks such as .Net, Java, PHP, Angular JS, NodeJS etc.

• Development and scripting languages such as Python, C/C++, Java/JavaScript

• Experience with Configuration and Deployment Management Testing, Identity Management Testing, Cookie/Session Management, Authentication/ Authorization Testing, Input Validation Testing, Privilege escalation testing, Enumeration testing

• Good communication, presentation and interaction skills

• OSCP certification (preferred), CEH, SANS or Certified Penetration Tester, Certified Expert Penetration Tester or GIAC Certified Penetration Tester

• Bugbounty hunters, CVE finders and other bugcrowd rank holders are preferred

Specific Context

Within Societe Generale Global Solution Center (SGGSC), you will join Global Cybersec Capability Centre (G3C) team based out of Bengaluru, working in Pentest team to contribute to Global Pentest practice.

Environment

At Société Générale, we are convinced that people are drivers of change, and that the world of tomorrow will be shaped by all their initiatives, from the smallest to the most ambitious.

Whether you're joining us for a period of months, years or your entire career, together we can have a positive impact on the future. Creating, daring, innovating and taking action are part of our DNA.

If you too want to be directly involved, grow in a stimulating and caring environment, feel useful on a daily basis and develop or strengthen your expertise, you will feel right at home with us!

Still hesitating?

You should know that our employees can dedicate several days per year to solidarity actions during their working hours, including sponsoring people struggling with their orientation or professional integration, participating in the financial education of young apprentices and sharing their skills with charities. There are many ways to get involved.

We are committed to support accelerating our Group's ESG strategy by implementing ESG principles in all our activities and policies. They are translated in our business activity (ESG assessment, reporting, project management or IT activities), our work environment and in our responsible practices for environment protection.

company icon

Societe Generale Global Solution Centre

calendar icon

12 days ago

Cyber Security Lead

To own accountability and be the custodian of Cyber Risk & Security Strategy for the business in line with the Group Enterprise Architecture and Risk framework, including Operations Technology and infrastructure. The role involves developing, crafting, and delivering a cyber security strategy, defining and driving robust operations and governance processes, and overseeing the ideation, delivery, and closure of critical cyber security projects. The Cyber Head will lead and collaborate with the team responsible for designing and building security technologies for the business unit based on specific technology needs and risks while factoring in global best practices.

Key Accountabilities :

  • Accountable for establishing effective leadership and direction to deliver enterprise technology risk profiling through identification, evaluation, measurement, and risk mitigation planning in partnership with the Group CISO, Cyber and Risk SMEs
  • Drive an understanding of policy, standards management, and compliance management, and foster a culture of regular risk assessment from a cyber security perspective within the Adani Group
  • Plan and comply with application and infrastructure vulnerability assessments at the business level, including the Operational Technology landscape
  • Develop and implement a comprehensive cyber security strategy that aligns with the Defence Specific business objectives (including SMLDI requirements, ISO requirements, DRDO SOC integrations) and other regulatory requirements
  • Lead the team in conducting regular vulnerability assessments and penetration testing, and ensure remedial actions are taken based on the assessment outcomes
  • Build a strong cyber security posture at the business level by aligning with group-level cyber strategies
  • Oversee the ideation, delivery, and closure of critical cyber security projects
  • Ensure a robust DR/BCP roadmap is implemented to handle and mitigate impact of cyber attacks on business if any
  • Have a strong relationship with NSCS and other Defence specific Cyber Directorates (incl. SAG, ACG, DCYA among others) so that emerging threats and trends are addressed proactively by Adani Defence as a licensed Defence Manufacturer
  • Support build out of cybersecurity offerings for Defense customers where needed, by providing Subject matter inputs and expertise.
company icon

Adani Defence and Aerospace

calendar icon

12 days ago

Cyber Security Instructor

About the job

We're looking for a passionate Cybersecurity Trainer to deliver engaging and practical training for cybersecurity certification aspirants (like CEH, CompTIA Security+ etc.). Ideal for candidates with real-world security experience and a passion for teaching.

Location: Pan-India (Must be open to travelling in India)

Type: Contract / Full-time (based on performance)

Requirements:

  • Minimum 1 cybersecurity certification (like CEH, CompTIA Security+ etc.)
  • 2.5-3 years of experience in cybersecurity or IT security roles
  • Prior experience teaching or mentoring (formal or informal)
  • Strong grasp of cybersecurity topics: threats, encryption, network security, risk management, penetration testing
  • Ability to simplify technical concepts for beginners
  • Comfortable with online training tools (Zoom, Google Meet, etc.)

Nice To Have:

  • Experience creating quizzes or mock tests
  • Strong communication skills
  • Familiarity with virtual labs or basic demo tools

Role Highlights:

  • Deliver cybersecurity courses online or offline
  • Help students understand core concepts and exam prep strategies
  • Provide guidance, answer doubts, and support learners toward certification

Apply now if you're ready to help others launch their cybersecurity careers - while growing your own!

company icon

VCF Cyber Solutions

calendar icon

12 days ago

Cyber Security Specialist

Role: Cyber Security Specialist

Experience: 8-12 Year

Location: Greater Noida & Hyderabad

Working Mode: Hybrid

Skills Required: EDR, DLP, SIEM, Incident Response

Notice Period: Immediate to 30 days preferably

" We at Coforge are hiring Cyber Security Specialist with the following skillset: "

  • Endpoint security posture EDR, Container runtime security
  • Data Loss prevention, File classification
  • Log analysis and anomaly detection (SIEM)
  • Respond to cyber incidents using Incident Response Playbooks and MITRE ATT&CK framework
  • Perform Threat Hunting and Behavioral Analytics to detect Advanced Persistent Threats (APTs)
  • Vulnerability assessment & Penetration Testing

If you meet the above skill set, please share your CV with , with the below details -

Total Experience :

Relevant Experience :

Current CTC :

Expected CTC :

Current Location :

Preferred location :

Last Working Day / Notice Period :

  • Immediate Joiners would be preferable

company icon

Coforge

calendar icon

12 days ago

Senior Officer / Assistant Manager - Cyber Security

Job Title - Senior Officer / Assistant Manager - Cyber Security

Roles and Responsibilities -

Threat Intelligence and Research:

  1. Stay informed about the latest cyber threats, attack techniques, and security technologies.
  2. Analyze threat intelligence feeds to identify potential risks to the organization.
  3. Proactively recommend security enhancements and adjustments based on threat intelligence.

Security Monitoring and Incident Response:

  1. Monitor security alerts and events in real-time to identify potential threats or vulnerabilities.
  2. Investigate and analyze security incidents and breaches to determine the extent and impact.
  3. Develop and execute incident response plans to mitigate threats and minimize damage.
  4. Maintain incident logs and produce incident reports for management and regulatory purposes.

Documentation and Reporting:

  1. Maintain accurate records of security incidents, investigations, and remediation efforts.
  2. Prepare and present reports to management on the state of cybersecurity within the organization.
  3. Collaborate with external auditors and regulatory bodies during compliance assessments.

Support in or knowledge of:

  1. Cyber Defence tools
  2. Cyber Incident Response and Remediation
  3. VA tools and Technical Vulnerability Assessment
  4. Security Tools like EDR(Crowdstrike), SOC(SIEM & SOAR), WAF, Darkweb Monitoring, DLP and firewall
  5. Support technical risk assessment teams

Experience

  • 2+ Years of Experience in Cyber Defence
  • Open to work for extensive hours and support current team as and whatever is required for work completion
  • Good technical Skills over Cyber Defence tools - L2 & L3 level

Benifits

As per company policy

Regards

DDeen

company icon

Max Healthcare

calendar icon

12 days ago

Cyber Security Analyst

Security Response Coordinator Role Overview

Experience- 3 to 5 years

Location - Hyderabad & Pune

willing to work in a 24X7 rotational shift model, including night shift.

Key-skills: Endpoint Security, SOC, Basics of Malware, Incident Management, EDR, and Antivirus.

As a Security Response Coordinator, you will play a critical role in ensuring the effective management and response to security incidents within our organization. You will collaborate with cross-functional teams and stakeholders to develop and implement incident response plans, coordinate incident investigations, and drive the resolution of security incidents in a timely manner.

The ideal candidate will possess excellent communication skills, strong problem-solving abilities, and a deep understanding of security incident management.

Responsibilities:

Collaborate with key stakeholders to identify potential security threats and vulnerabilities.

Regularly review and refine incident response procedures based on industry best practices and lessons learned.

Coordinate incident response efforts:

Serve as the primary point of contact for all security incidents, ensuring timely response and resolution.

Establish and maintain communication channels with internal teams and external partners to facilitate incident response activities.

Coordinate and lead cross-functional incident response teams, providing clear guidance and direction.

Investigate security incidents:

Conduct thorough investigations into security incidents, including data breaches, system intrusions, and policy violations.

Collect and analyze evidence, identify the root cause of incidents, and provide recommendations to prevent future occurrences.

Document incident details, actions taken, and lessons learned for post-incident analysis and reporting.

Incident escalation and reporting:

Assess the severity and impact of security incidents and escalate as necessary to senior management or executive leadership.

Prepare comprehensive incident reports and communicate findings to relevant stakeholders.

Provide regular updates on incident response activities, metrics, and key performance indicators (KPIs) to management.

Continuous improvement:

Stay abreast of the latest security trends, emerging threats, and industry best practices.

Contribute to the enhancement of security policies, procedures, and guidelines.

Participate in tabletop exercises, drills, and simulations to test and improve incident response capabilities.

Requirements:

Bachelor's degree in computer science, Information Security, or a related field. Relevant certifications (e.g., CISSP, CISM, GIAC) are a plus.

Proven experience in security incident management, preferably in a fast-paced and complex environment.

Strong understanding of security frameworks, standards, and regulations (e.g., NIST, ISO 27001, GDPR).

Familiarity with incident response tools, technologies, and forensic techniques.

Excellent communication skills, both written and verbal, with the ability to convey complex technical concepts to non-technical stakeholders.

Strong analytical and problem-solving abilities, with a keen attention to detail.

Ability to work effectively under pressure and meet tight deadlines.

Demonstrated ability to lead and coordinate cross-functional teams.

Ethical mindset and commitment to maintaining the confidentiality, integrity, and availability of sensitive information.

company icon

LTIMindtree

calendar icon

12 days ago

Cyber Security Lead

Over the past 15 years, Medanta has created an unrivalled impact in delivering world class multi-specialty care for patients in India. We have hospitals in Gurgaon, Lucknow, Patna, Indore and Ranchi. In addition, we have clinics in Defence Colony (South Delhi), Cybercity & Subhash Chowk (Gurgaon), and at the Delhi Airport. Medanta is constantly growing and has also ventured in Retail vertical through Diagnostics (Laboratory Services) and Pharmacies. We also have also launched homecare services. We further plan to scale up existing facilities and expand into a few more geographical areas and also identify new avenues (Academics - Medical College) within the Healthcare eco-system. As we continue to scale and grow into new geographies, explore innovative methods of healthcare delivery, we are looking to hire exceptional talent to help us achieve our vision and grow in the process to achieve their professional aspiration.

Roles & Responsibilities

  • Leverage the existing cybersecurity tools and capable to identify open-source tools to discover threat agent actions.
  • Identify potential threats and mitigation strategies to enable a proactive defense mechanism before an actual security incident.
  • Design and implement a security incident response process.
  • Act as the primary control point during significant information security incidents, manage the development of incident response plans and generate detailed reports.
  • Identify and propose the implementation of the key information security initiatives, plans, practices and tools to the management.
  • Proactive support on the approved information security projects, internal/external security audits, internal audits, application security assessment and reviews and compliance.
  • Identify and understand potential and emerging information security threats and vulnerabilities and implement an effective communication channel across the appropriate teams.
  • Detect and respond to cyber security threats and implement remediation controls.
  • Perform Network vulnerability assessment and penetration testing (automated and manual) of infrastructure and hardening reviews of endpoints, networks and servers.
  • Manage security compliance for end points, networks, servers, databases, etc.
  • Proficient in operating cyber security solutions to protect IT Infrastructure and data it hold

What we are looking for

  • Bachelor's degree specializing in Information Security, Computer Science, Information Management Systems, or relevant work experience.
  • Minimum 10 years of experience in Cyber Security.
  • Individual Contributor and capable of working independently.
  • Strong technical skills relevant to Information Security such as secure coding standards, ethical hacking techniques, security operations, cloud security architecture, SEIM, operating system security, network access security, end point protection, vulnerability and threat management.
  • An excellent knowledge and deep understanding of the complex network security principles and concepts such as (Anti-malware/Virus/Ransomware, web secure gateways, email protection gateway, http proxy, VLANs, ACL, DMZ, VPN, firewalls, IDS/IPS etc).
  • Hands-on experience with analysing high volumes of logs, network data (e.g., NetFlow, FPC), and other security breach attacks.
  • Practical knowledge of operating systems (such as: Windows, Linux, Hypervisors).
  • Detailed experience with vulnerability scanning solutions.
  • Ability to identify and mitigate network vulnerabilities and an understanding of their remediation.
  • Required to assist with root cause identification for incident management.
  • Should be acquainted with Information Security Industry standards/best practices and relevant regulations (such as: SSAE16, SOC 2, PCI DSS, HIPAA, GLBA, FISMA, NIST, ISO27000, CobiT, ISF, OWASP, SANS).
  • Must have proficient analytical, technical research and detail-oriented skills

Work days: 6 days

Location: Gurgaon

company icon

Medanta

calendar icon

12 days ago

Presales Head - Cyber Security

Company Description

L.A Technologies is a specialized group of Cyber Security professionals in Mumbai Metropolitan Region that offers top-of-the-line services in Networking, Securities, Wireless, and Server platforms. The company focuses on reliability and functionality for internet and business applications, with certified professionals in CISCO, Microsoft, and Linux. In-house training is provided to ensure employees can competently manage their networks.

Role Description

This is a full-time on-site role for a Practise Head - Cyber Security at L.A Technologies. The role involves designing , providing solutions , solution selling to the corporate CXO's and overseeing cybersecurity, application security, vulnerability management, network security, and information security projects . The position is based in Mumbai Metropolitan Region.

Qualifications

  • Cybersecurity skills
  • Application Security expertise
  • Proficiency in Vulnerability Management
  • Strong knowledge of Network Security
  • Experience in managing and implementing security solutions
  • Relevant certifications
  • Bachelor's or Master's degree in Computer Science or related field
company icon

L A Technologies Pvt Ltd

calendar icon

12 days ago

Cyber Security Analyst

Open Roles: Cyber Security Operations

Location Pune:

Working Model : Hybrid

Experience 3-5 Years

Job Description:

1. Assists with responding to computer security incidents according to the Information Security Policies and Industry Best Practices.

2. Assists with coordinating the efforts of and provide timely updates to multiple business units during response.

3. Contributes to a team of cyber security professionals working with threat data, writing non-complex reports, briefing event details to leadership, and coordinating remediation with personnel.

4. Monitor information security related web sites (SANS Internet Storm Center, etc.) and mailing lists (BugTraq, etc.) to stay up to date on current attacks and trends.

5. Perform basic analysis in support of Intrusion detection operations . Documents and escalates incidents, including event's history, status, and potential impact for further action, that may cause ongoing and immediate impact to the environment.

6. Assists with incident triage, to include determining scope, urgency, and potential impact; identifying the specific vulnerability; and making recommendations that enable expeditious remediation.

7. Provides timely detection, identification, and alerts of possible attacks/intrusions, anomalous activities, and misuse activities, and distinguish these incidents and events from benign activities.

8. Conducts research, analysis, and correlation across a wide variety of all source data sets (e.g., indications and warnings).

9. Recognizes a possible security violation or deficiencies and take appropriate action to report the incident, as required

10. Working on Application Security, Logs maintenance, access review and DR plan preparations.

Open Roles: Cybersecurity Risk Analyst

Location Pune:

Working Model : Hybrid

Experience 4-6 Years

Job Description:

1. Builds an understanding of Manufacturing cybersecurity policies and industry data privacy principles.

2. Participates in cybersecurity risk identification utilizing identified risk management frameworks while working with the team to evaluate severity and mitigation plans.

3. Knowledge of India acts (e.g CERT-In,ITGC, IT Act etc.) in a manner specific to Cummins processes and controls.

4. Assists in promotion of cybersecurity awareness.

5. Assists with responding to computer security alerts, events and incidents if any & coordinating the efforts of and provide timely updates to respective business units during the response.

6. Contributes to a team of cyber security professionals working with threat data, writing non-complex reports

7. Recognizes a possible security violation or deficiencies and report to the cyber governance team.

8.Understanding a variety of security and compliance policies and incident response processes; working with respective business units to determine sensitive data that needs to be protected with the DLP technology.

9.Knowledge of core Information Security concepts related to Governance, Risk & Compliance

10. Familiarity with networks and enterprise architecture

11. Excellent interpersonal, verbal, and written communication skills with the ability to communicate security risk and compliance related concepts to a broad range of technical and non-technical staff

12. Ability to maintain incident and process documentation

13. Ability to identify and translate data loss risks and planning mitigation into DLP policy rules

14. Understand and apply security knowledge to concepts of Data at Rest, Data in Motion, and Data in Use

15. Conduct analysis and complete reporting on DLP metrics, trends, and anomalies

16. Assisting Business IT teams in creating the asset inventories, updating the drawings.

17. Assisting Business IT teams in creating the architecture review documents for new and upgradation projects

Open Roles: Vulnerability Management Analyst

Location Pune:

Working Model : Hybrid

Experience 3-4 Years

Job Description:

1. Skilled and detail-oriented Vulnerability Management Analyst to support our cybersecurity team in identifying, tracking, and remediating software vulnerabilities and end-of-life (EOL) operating systems.

2. The successful candidate will work closely with application teams, site BISOs, and other stakeholders to ensure compliance and risk mitigation.

Vulnerability Remediation:

1.Conduct regular meetings with the Organization's Corporate, Manufacturing, and Site Application Teams to discuss vulnerabilities.

2.Track and report vulnerability remediation efforts across various teams.

3.Provide regular tracking metrics and updates to application teams and the cybersecurity team.

4. End-of-Life (EOL) Operating System Management:

5. Develop and maintain reporting dashboards using Tenable to track EOL OS efforts.

6. Monitor priorities, including BCC1, DMZ, End of Support systems, and assets still on the network.

7. Track exceptions and short-term extension requests related to EOL OS.

8. Collaborate with Site CISOs to ensure compliance with security policies and mitigate risks.

9. Tenable Security Platform Utilization:

10. Complete formal Tenable training and certification within the first year.

11. Utilize Tenable for producing vulnerability reports for different audiences.

12. Review vulnerability status and initiate scans as needed.

company icon

Cummins India

calendar icon

12 days ago

Splunk Engineer with Cyber Security

Position: Cyber Security Engineer

Location: Remote

Experience Level: 5+ Years

Job Type: Full-time

Job Summary:

We are looking for a highly skilled Cyber Security Engineer with strong expertise in Splunk and a solid understanding of data engineering principles. The ideal candidate will have experience in designing and implementing Splunk dashboards, managing large-scale data ingestion, performing data integrity checks, and transforming raw data into actionable insights to support cyber defense initiatives.

Key Responsibilities:

  • Design, implement, and maintain Splunk dashboards, alerts, and reports for monitoring and incident response.
  • Develop and optimize Splunk SPL (Search Processing Language) queries to support detection use cases.
  • Lead and manage data ingestion pipelines, ensuring reliable and secure data flow from multiple sources into Splunk.
  • Perform data transformation, normalization, and enrichment to enable efficient security analytics.
  • Conduct regular data integrity and quality checks, and troubleshoot ingestion issues.
  • Collaborate with security analysts, incident responders, and threat intelligence teams to improve detection and response capabilities.
  • Implement and maintain security monitoring tools and integrations across hybrid cloud environments.
  • Ensure data governance and compliance with internal policies and regulatory requirements.

Required Skills & Experience:

  • Strong hands-on experience with Splunk Core and Splunk Enterprise Security.
  • Proficiency in SPL (Search Processing Language) for developing complex queries and use cases.
  • Experience with dashboard creation, reporting, and visualization in Splunk.
  • Background in data engineering - understanding of data pipelines, ETL processes, and big data frameworks is preferred.
  • Expertise in data ingestion methodologies, including onboarding logs and event data from various systems.
  • Knowledge of data transformation techniques, such as field extractions, lookups, and macros.
  • Familiarity with security concepts such as SIEM, threat detection, incident response, and compliance.
  • Working knowledge of scripting languages like Python or Shell for automation and integration.

company icon

IntraEdge

calendar icon

12 days ago