1 Opening(s)
8.0 Year(s) To 13.0 Year(s)
13.00 LPA TO 15.00 LPA
-----JOB DESCRIPTION---
Act as the main point of contact for the design and deployment of the IT Security GRCframework and work with Very Senior IT leadership (CTO, IT Head)* Partner with all team members in the IT head's function to build/govern/sustain /improve anintegrated end-to-end security GRC framework to provide a "one-stop ...
1 Opening(s)
10.0 Year(s) To 15.0 Year(s)
Not Disclosed by Recruiter
Overview: As a Cyber Security Director, you will serve as a trusted advisor and technical expert in all aspects of cybersecurity. You will play a critical role in developing, implementing, and maintaining the organization's cybersecurity strategy, policies, and procedures to safeguard against cyber threats and ensure compliance with industry standards and ...
1 Opening(s)
8.0 Year(s) To 12.0 Year(s)
Not Disclosed by Recruiter
Job Title: DevSecOps Lead Engineer
Location: Pune, Maharashtra (Hybrid/Work from Office)
Experience Required: 8+ years
Position Overview:
We are seeking an experienced DevSecOps Lead Engineer to join our dynamic team. The ideal candidate will have extensive experience in DevSecOps practices, with a strong focus on application security OR API security. This role requires hands-on ...
1 Opening(s)
6.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
We have an urgent opening for the position of Cyber Security Trainer For a reputed Company for the New Delhi location.
Job Description:
Conduct pre-scheduled seminars and trainings for college students and corporate employees.
Conduct Training sessions on Cyber Security, Web Application Security and concepts of VAPT.
Enhancing Course plans, Assignments and Presentations to suit the training needs.
Designing ...
3 Opening(s)
8.0 Year(s) To 13.0 Year(s)
25.00 LPA TO 30.00 LPA
Role : Application Developer Role Description : Design, build and configure applications to meet business process and application requirements. ...
1 Opening(s)
6.0 Year(s) To 8.0 Year(s)
28.00 LPA TO 30.00 LPA
* Develop and maintain a comprehensive security architecture roadmap aligned withbusiness objectives and regulatory requirements.* Conduct thorough security risk assessments for business applications (on-premises, cloudhosted) to identify potential threats and weaknesses and recommend mitigation measures.* Conduct thorough security risk assessments for APIs to identify potential threats andweaknesses.*Conduct threat modelling for ...
1 Opening(s)
3.0 Year(s) To 4.0 Year(s)
Not Disclosed by Recruiter
Job Description:
We are seeking a skilled and motivated Information Security Analyst 1 with 3 to 4 years of experience to join our team. The ideal candidate will have hands-on experience with Active Directory (AD) and Privileged Access Management (PAM) systems. This role involves ensuring the security and integrity of our ...
1 Opening(s)
3.0 Year(s) To 10.0 Year(s)
10.00 LPA TO 18.00 LPA
Perform assessment of IT and cybersecurity policies, standards and otherdocumentation Identify gaps in policy, process and standard implementation Conduct discussions, take leadership and drive closure of identified open issuesin assessments Liaise with IT, Infra and business teams as required to drive Information andcybersecurity projects Release periodic dashboards\reports
Experience required for ...
1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
3.00 LPA TO 5.00 LPA
Supervise daily security team operations, ensuring efficient task completion.
Devise and enforce security policies and procedures to safeguard the organization and its assets.
Perform routine security assessments to identify and address potential risks and vulnerabilities, crafting strategies for risk reduction.
Monitor surveillance and alarm systems, swiftly responding to security breaches or incidents.
Liaise with ...
1 Opening(s)
3.0 Year(s) To 12.0 Year(s)
7.00 LPA TO 15.00 LPA
Leading a team that performs Security Control Validation, Red Team, Breached & AttackSimulation, Penetration Testing and VAPT assessments. Ensuring that Security Assessments for existing applications/systems are performed as perpolicy, track the compliance status, following up with application/system owners for closures ofthe security findings. Releasing dashboards and reports periodically to management ...