153 Job openings found

1 Opening(s)
4.0 Year(s) To 12.0 Year(s)
10.00 LPA TO 23.00 LPA
● Independently run the Key Risk Indicator program for IT & Cyber Security● Review the bank’s Risk Assessment & Risk Treatment plan/register and update same withrelevant risks● Periodically test the design strength of the controls and track changing risk patterns acrossmultiple IT & Cyber areas of the bank● Conduct thematic ...
10 Opening(s)
10.0 Year(s) To 12.0 Year(s)
15.00 LPA TO 24.00 LPA
 Discuss with Business & IT on new process / system / activity before Onboarding/ Go-Live Conduct risk assessments to identify information security risks Propose controls to business / IT and / or work with business to plan riskmitigation Prepare Risk Assessment & Recommended Control Report Follow-ups for mitigation of ...
1 Opening(s)
6.0 Year(s) To 10.0 Year(s)
10.00 LPA TO 12.00 LPA
Overview: We are looking for a motivated and experienced SI (System Integrator) SMB SalesSpecialist to join our dynamic sales team. As an SMB Sales Specialist, you will be responsiblefor identifying, prospecting, and acquiring new SMB customers for our range ofproducts/services. The ideal candidate should have a strong sales background, excellentcommunication ...
1 Opening(s)
14.0 Year(s) To 25.0 Year(s)
35.00 LPA TO 50.00 LPA
Will be responsible for managing and leading the day-to-day operations of the security operations center (SOC) of the Bank, ensuring timely detection, analysis, and response to security incidents Lead incident response efforts, coordinating with internal teams, external stakeholders including regulators to mitigate and remediate security incidents Develop and maintain Incident response plan ...
1 Opening(s)
7.0 Year(s) To 15.0 Year(s)
15.00 LPA TO 26.00 LPA
Minimum 7 years of experience in conducting hypothesis based threat hunting using SIEM logs (preferably Splunk) Good knowledge of recent cyber trends/attacks, MITRE framework Good understanding of network, end point based attacks Must have experience in developing hypothesis using DNS, Proxy, EDR logs Must have experience in drafting hunting reports and communicating to senior ...
1 Opening(s)
7.0 Year(s) To 12.0 Year(s)
Not Disclosed by Recruiter
The role As Lead Security Operations Engineer, you will provide technical leadership for a growing team of Security Engineers in the management of vulnerabilities from identification through to resolution. You will work closely with IT Operations, Cyber Security and the wider IT teams including line of business teams to ensure vulnerabilities ...
4 Opening(s)
5.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
Vertical - Information Security Management   Job Purpose-  Ability to learn, understand and work with team to gain insight into SOC and cyber forensic functions   Functional Responsibility    1.Perform Level1 SOC monitoring2. Timely escalation of incident if the same is not remediated within TAT3. Improve adherence to TAT over a period of time   Competencies Required-  1. Good understanding of network, ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
12.00 LPA TO 14.00 LPA
ISMS ,BCMS,Cyber Maturity _ Gurgaon A Business Continuity Management System (BCMS) is a comprehensive approach utilised by organisations to identify and manage risks that could disrupt regular operations. It’s an essential framework that equips companies with the necessary tools and processes to navigate potentially disruptive A youll-designed BCMS comprises several components that ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
4.00 LPA TO 5.00 LPA
Some of their job duties and responsibilities are to install and maintain systems for organizations and maintain as well as upgrade data cloud infrastructure. They may also be involved in identifying network issues, fixing them, identifying cyber security threats, and devising ways to prevent intrusions.   Some of their job duties and responsibilities ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
25.00 LPA TO 26.00 LPA
Roles & Responsibilities:   Monitor SIEM Alerts on 24 x 7 x 365 basis including Night Shifts on a rotational roster. Investigate Alerts Detected and carryout Incident Response.  Document & report appropriate Incidents to the concerned Resolver Groups using Ticketing Tools. Monitor Network Traffic, perform Threat Hunting to identify compromised systems, negate ...

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile