1 Opening(s)
8.0 Year(s) To 12.0 Year(s)
10.00 LPA TO 13.00 LPA
For a role that encompasses IT GRC (Governance, Risk, and Compliance) along with IT Security Auditresponsibilities, especially in the context of NIST, ISO 27001, SOC2, ITGC audit, RBI (Reserve Bank of India)regulatory compliance, IT Security Compliance, Business Continuity Management (BCM), Disaster Recovery(DR), and Vulnerability Assessment (VA), the roles and responsibilities ...
1 Opening(s)
2.0 Year(s) To 4.0 Year(s)
1.80 LPA TO 4.20 LPA
Key points to include:
Strategic Planning:
Developed and executed comprehensive IT strategies to support business growth and objectives, including technology roadmaps and infrastructure upgrades.
Budget Management:
Managed IT budget effectively, allocating resources for new projects, maintenance, and vendor contracts.
Technology Implementation:
Led the successful implementation of new software, hardware, and systems, ensuring seamless integration with existing ...
1 Opening(s)
3.0 Year(s) To 4.0 Year(s)
3.60 LPA TO 4.20 LPA
A "liaison officer plant" job description entails acting as the primary point of contact between a plant facility and external stakeholders, such as government agencies, local communities, contractors, and suppliers, by building and maintaining positive relationships, facilitating communication, coordinating activities, and resolving issues to ensure smooth plant operations and compliance with ...
2 Opening(s)
3.0 Year(s) To 12.0 Year(s)
Not Disclosed by Recruiter
About the Role:
As a Devops Engineer you will play a critical role in ensuring the reliability, scalability, and performance of our cloud-based applications. You will work closely with development and operations teams to design, build, and maintain highly available and resilient systems.
Responsibilities:
Infrastructure Management: Manage and maintain AWS infrastructure using tools ...
10 Opening(s)
7.0 Year(s) To 12.0 Year(s)
10.00 LPA TO 18.00 LPA
AppSec (Application Security) Key Terms:
Secure Coding: Writing software with security best practices to prevent vulnerabilities.
Vulnerability: Weaknesses in an application that could be exploited.
SAST (Static Application Security Testing): Code analysis to find vulnerabilities without executing the program.
DAST (Dynamic Application Security Testing): Security testing of running applications to find vulnerabilities.
Penetration Testing: Simulated ...
3 Opening(s)
4.0 Year(s) To 20.0 Year(s)
10.00 LPA TO 20.00 LPA
Key Responsibilities:
· Implement and manage security measures for the protection of systems, networks, and data.
· Collaborate closely with development teams to integrate security into the SDLC.
· Conduct vulnerability assessments and implement remediation plans.
· Monitor security infrastructure for vulnerabilities and intrusions.
· Lead incident response activities and ensure timely resolution of security incidents.
· Evaluate and recommend new security ...
1 Opening(s)
5.0 Year(s) To 9.0 Year(s)
Not Disclosed by Recruiter
Position: Consultant/Asst Manager
Location: Delhi/NCR
Job Type: Full-time
Job Summary: We are looking for a talented and experienced Information Security resources.
Key Responsibilities:
Conduct cybersecurity assessments, including ISO (27001) Audit, CPM, ITGC, NIST, Privacy, etc.,
Develop cybersecurity frameworks, policies, and procedures tailored to clients' specific needs and requirements, in alignment with industry best practices and regulatory standards.
Assist clients in designing ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
Job Description: SOC Lead (Offensive and Defensive Skills)
Location: Bangalore
Working Mode: From Office/Hybrid
Experience: 7-10 Years
Job Type: Full-time
Develop and execute Breach Attack Simulations to test SIEM rule set effectiveness.
Identify gaps and suggest missing rules for enhanced detection.
Regularly assess and improve existing SIEM rules.
Design, deploy, and run exploits in isolated environments.
Ensure safe and controlled testing without affecting ...
1 Opening(s)
7.0 Year(s) To 15.0 Year(s)
15.00 LPA TO 26.00 LPA
Minimum 7 years of experience in conducting hypothesis based threat hunting using SIEM logs (preferably Splunk)
Good knowledge of recent cyber trends/attacks, MITRE framework
Good understanding of network, end point based attacks
Must have experience in developing hypothesis using DNS, Proxy, EDR logs
Must have experience in drafting hunting reports and communicating to senior ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
1.00 LPA TO 1.50 LPA
Responsibilities:
· Conduct comprehensive data privacy assessments to identify and mitigate risks.
· Develop and implement robust privacy frameworks aligned with relevant regulations (e.g., Bahrain Personal Data Protection Law(optional- good to have) , GDPR, CCPA) and industry best practices.
· Draft and maintain clear and concise privacy policies that inform individuals about their data collection and usage.
· Lead GDPR readiness ...