29 Job openings found

1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
6.00 LPA TO 7.00 LPA
Pre-Screening Questions for Cybersecurity Expert: 1. Have you directly handled any regulatory cybersecurity audits or inspections by SEBI or NSE/BSE? If yes, briefly mention the scope and outcome. 2. List the key cybersecurity controls you have implemented to comply with SEBI’s Cybersecurity & Cyber Resilience Framework (CSCRF) for stockbrokers. 3. Have you led ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
25.00 LPA TO 32.00 LPA
Advanced Technical Skills DevOps & CI/CD Tools Mastery:o Expertise in Jenkins, GitLab CI, CircleCI, Travis CI, or similar tools forautomating build and deployment pipelines.o Advanced knowledge of Docker, Kubernetes, Helm, and ECS forcontainerization, orchestration, and managing microservices.o Proficiency in Infrastructure as Code (IaC) tools like Terraform,CloudFormation, Pulumi, and Ansible for ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
20.00 LPA TO 29.00 LPA
A DevOps (Development, Security, and Operations) Engineer combines softwaredevelopment, security, and IT operations expertise. The role is critical for integratingsecurity practices into the DevOps lifecycle, ensuring that applications are both secureand efficient in deployment.1. Technical Skills DevOps Tools and Practices:o Knowledge of tools like Jenkins, Git, Docker, Kubernetes, Terraform,and Ansible ...
1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
6.00 LPA TO 7.00 LPA
Job Title: Cyber Security Analyst (Asst Mgr II) Department: RMD Reports to: CISO Required Qualification: BE in Computer Science/Info security/ Information Technology/relevant stream or MCA/M.Tech – IT/Cyber Security Preferred Qualification: Professional Certification like Security+, CompTIA Network+ , CCNA , CEH, OSCP Skill, Knowledge & Trainings:  Knowledge of technical infrastructure, networks, databases and systems in relation to IT Security and IT Risk. ...
1 Opening(s)
4.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
ob Title: SOC (Security Analyst) Job Overview: We are seeking a highly skilled SOC Expert to join our dynamic cybersecurity team. The ideal candidate will play a crucial role in monitoring, detecting, analysing, and responding to security incidents. Candidate requires a deep understanding of security operations and a proactive approach to threat management ...
1 Opening(s)
7.0 Year(s) To 8.0 Year(s)
12.00 LPA TO 15.00 LPA
Profile Summary:   with 7+ years of experience working in information security. Post-Graduate /Diploma/Degree in IT Wide experience in OT/IoT security risk assessment and continuous monitoring, audit Assessment of OT Security frameworks and standards, configuration and management of firewalls, network and infrastructure security. Certifications )( any of the below preferred): PG-DITISS, CEH, RHCE, RHCSA   Knowledge Expertise and Prior ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 12.00 LPA
Threat intelligence is evidence-based information, including context, mechanisms, and indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Positions in this function are involved in the body of technologies, processes, and practices designed ...
4 Opening(s)
1.0 Year(s) To 4.0 Year(s)
8.00 LPA TO 12.00 LPA
Sr. No.  Job Description  Duty Statements  1  Manual Testing  Perform threat modelling  Perform architectural analysis  Perform logical security assessment  Monitor third party API’s, SDK and libraries are up to date.  Generate assessment report  Report your findings as per severity    2  Automation testing   To use automated scanning tools   Review false positives and true positives  Generate assessment report  Report your findings as per severity  Analyze reports from interactive source code review tool for false positives and include it in the report.  3  Analysis and reporting  Create detailed assessment report as per company standard.  Report issues as per severity  Follow up and review the fixes  4  Ad hoc request  Work on Ad hoc request related to application security  Conduct pen. Test, Design reviews as per the request  5  Trainings and knowledge  transfer  Conduct periodic security awareness training as per the requirement bases on global standards.    Working Relationships:  Team leads  Peers  Developers  Product managers  Other security teams  Support and operations team  Infrastructure teams    Knowledge  Skills  Attributes  Understanding of OWASP Top 10,SANS Top 25 and WASC, NIST.  Black Box, Grey Box security assessment of web application, Mobile application.  Experience of identification and mitigation of vulnerabilities  Good knowledge of TCP/IP and other application and network level protocols.  Security in SDLC (Application Security)  Strong team player  Interpersonal Skills  Good communication  Active listening  Believes in team work over individual contributions  Articulation of thoughts  Able to express view assertively    Ownership and accountability  Passion  Integrity  Team work     Security Analyst :   Shift : Middle Shift 12pm to 9pm Relevant Exp : Minimum 1 year in App Sec Condition: 2 years Bond
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
3.00 LPA TO 5.00 LPA
Job Responsibilities: ?  Conducting different types of security audits at different client places. (ITGC, VAPT, WAPT,Mobile App security or different IT compliance audit)?  Audit Report submission within timeline by coordinating with team members.?  Project handling capacity of different prestigious clients.?  Willingness to travel as per audit requirement.?  Should be presentable during external meetings.?  Proficiency of English in ...

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile