31 Job openings found

1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
Not Disclosed by Recruiter
Job Title: OT Protocol and Device SpecialistJob Summary:We are looking for a talented and driven Industrial Network & Security Engineer to join ourOT SOC development team. In this role, you will be responsible for designing, securing, andmaintaining the IT-OT network infrastructure, configuring detection systems like Zeek andSuricata, and ensuring the ...
1 Opening(s)
13.0 Year(s) To 20.0 Year(s)
0.00 LPA TO 80.00 LPA
Candidates from international Payment gateway fintech product companies. Communication Skills - Excellent Stability index : Number of Job changes : max 2 between 2019 – 2025 Work location : Bangalore only    Job Description: We are seeking an experienced Cyber Security Operations and GRC Manager to join our team at, a leader in blockchain technology and solutions. The ideal ...
1 Opening(s)
12.0 Year(s) To 16.0 Year(s)
Not Disclosed by Recruiter
Job Description Security Architect I  What you will be doing                                                                                     ...
1 Opening(s)
7.0 Year(s) To 12.0 Year(s)
Not Disclosed by Recruiter
The role As Lead Security Operations Engineer, you will provide technical leadership for a growing team of Security Engineers in the management of vulnerabilities from identification through to resolution. You will work closely with IT Operations, Cyber Security and the wider IT teams including line of business teams to ensure vulnerabilities ...
1 Opening(s)
3.0 Year(s) To 7.0 Year(s)
Not Disclosed by Recruiter
The role As Security Operations Engineer, you will work as part of a growing team of Security Engineers in the management of vulnerabilities from identification through to resolution. You will work closely with IT Operations, Cyber Security and the wider IT teams including line of business teams to ensure vulnerabilities are ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
Suzlon is India’s leading renewable energy solutions provider offering a 360-degree total solutions package to its customers that covers the entire spectrum of wind energy projects. For more than two decades, our turnkey solutions and lifetime support combined with the best-in-class products have created value for our customers throughout the ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
20.00 LPA TO 29.00 LPA
A DevOps (Development, Security, and Operations) Engineer combines softwaredevelopment, security, and IT operations expertise. The role is critical for integratingsecurity practices into the DevOps lifecycle, ensuring that applications are both secureand efficient in deployment.1. Technical Skills DevOps Tools and Practices:o Knowledge of tools like Jenkins, Git, Docker, Kubernetes, Terraform,and Ansible ...
1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
6.00 LPA TO 7.00 LPA
Job Title: Cyber Security Analyst (Asst Mgr II) Department: RMD Reports to: CISO Required Qualification: BE in Computer Science/Info security/ Information Technology/relevant stream or MCA/M.Tech – IT/Cyber Security Preferred Qualification: Professional Certification like Security+, CompTIA Network+ , CCNA , CEH, OSCP Skill, Knowledge & Trainings:  Knowledge of technical infrastructure, networks, databases and systems in relation to IT Security and IT Risk. ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
15.00 LPA TO 17.00 LPA
We need candidates with more experience in security operations and less in vendor risk management. While there will be some effort around vendor risk during the onboarding of new vendors as part of the JV, the primary focus of the role will shift to security operations once the vendors are ...
4 Opening(s)
1.0 Year(s) To 4.0 Year(s)
8.00 LPA TO 12.00 LPA
Sr. No.  Job Description  Duty Statements  1  Manual Testing  Perform threat modelling  Perform architectural analysis  Perform logical security assessment  Monitor third party API’s, SDK and libraries are up to date.  Generate assessment report  Report your findings as per severity    2  Automation testing   To use automated scanning tools   Review false positives and true positives  Generate assessment report  Report your findings as per severity  Analyze reports from interactive source code review tool for false positives and include it in the report.  3  Analysis and reporting  Create detailed assessment report as per company standard.  Report issues as per severity  Follow up and review the fixes  4  Ad hoc request  Work on Ad hoc request related to application security  Conduct pen. Test, Design reviews as per the request  5  Trainings and knowledge  transfer  Conduct periodic security awareness training as per the requirement bases on global standards.    Working Relationships:  Team leads  Peers  Developers  Product managers  Other security teams  Support and operations team  Infrastructure teams    Knowledge  Skills  Attributes  Understanding of OWASP Top 10,SANS Top 25 and WASC, NIST.  Black Box, Grey Box security assessment of web application, Mobile application.  Experience of identification and mitigation of vulnerabilities  Good knowledge of TCP/IP and other application and network level protocols.  Security in SDLC (Application Security)  Strong team player  Interpersonal Skills  Good communication  Active listening  Believes in team work over individual contributions  Articulation of thoughts  Able to express view assertively    Ownership and accountability  Passion  Integrity  Team work     Security Analyst :   Shift : Middle Shift 12pm to 9pm Relevant Exp : Minimum 1 year in App Sec Condition: 2 years Bond

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile