38 Job openings found

1 Opening(s)
8.0 Year(s) To 15.0 Year(s)
Not Disclosed by Recruiter
We are seeking a seasoned Information Security professional who has expertise in GRC with over 8+ years of progressive experience across data security, access management, IT security, network security, IT risk management, and compliance with standards such as ISO 27001, HIPAA, GDPR, NIST. This individual will lead GRC efforts, ensuring ...
1 Opening(s)
12.0 Year(s) To 16.0 Year(s)
Not Disclosed by Recruiter
Job Description Security Architect I  What you will be doing                                                                                     ...
1 Opening(s)
12.0 Year(s) To 20.0 Year(s)
Not Disclosed by Recruiter
Key ResponsibilitiesSecurity Strategy Development:• The CISO takes a strategic approach to security identifying emerging threats and implementingproactive measures to protect the organization. They work closely with other stakeholders to alignsecurity initiatives with business goals.Risk Assessment and Management:• The CISO assesses the organization's security risks including potential vulnerabilities and potentialimpact. They ...
5 Opening(s)
2.0 Year(s) To 5.0 Year(s)
3.00 LPA TO 8.00 LPA
Security Monitoring & Alert Triage: Continuously monitor security alerts generated by various security tools (SIEM, EDR, IDS/IPS, firewalls, etc.) for suspicious activities, anomalies, and potential security breaches. Perform initial triage and analysis of security events, correlating data from multiple sources to determine the severity and legitimacy of alerts. Prioritize alerts based on risk ...
1 Opening(s)
4.0 Year(s) To 15.0 Year(s)
10.00 LPA TO 22.00 LPA
  Provide hands-on technical security engineering and security expertise in the analysis, assessment, development, and evaluation of security solutions and architectures to secure systems in the cloud (AWS, Azure or GCP). Implement security controls and fine tune / baseline based on the risk criteria and continuously evaluate cloud infrastructure for new services ...
1 Opening(s)
11.0 Year(s) To 14.0 Year(s)
Not Disclosed by Recruiter
Profile summary:The Manager (Information Systems and Security) is responsible for overall ‘InformationTechnology Services (ITS) function and in defining, implementing and documenting relevantprocesses, procedures and standards. This role will be in charge of establishing and maintainingan organisation wide information systems, infrastructure, and security, management program toensure that information assets are well ...
1 Opening(s)
4.0 Year(s) To 10.0 Year(s)
10.00 LPA TO 15.00 LPA
Lead company to SOC2/ISO 27001 certification; Develop and maintain information security policies; Design and implement information security policy education, training, and awareness programs; Establish security risk matrix and framework; select security solutions to address security controls for enterprise landscape; Partner with key business and IT leaders to develop security policies, standards, guidelines, and procedures ...
5 Opening(s)
5.0 Year(s) To 8.0 Year(s)
20.00 LPA TO 30.00 LPA
Tasks/Duties: Communicate with stakeholders at all stages of the project cycle to understand requirements and explain limitations The Splunk Specialist is responsible for the design, development, and implementation of the Splunk infrastructure as well as support operations activities. The candidate should be proficient with recognizing and onboarding new data sources into Splunk, analyzing ...
1 Opening(s)
6.0 Year(s) To 8.0 Year(s)
28.00 LPA TO 30.00 LPA
* Develop and maintain a comprehensive security architecture roadmap aligned withbusiness objectives and regulatory requirements.* Conduct thorough security risk assessments for business applications (on-premises, cloudhosted) to identify potential threats and weaknesses and recommend mitigation measures.* Conduct thorough security risk assessments for APIs to identify potential threats andweaknesses.*Conduct threat modelling for ...
1 Opening(s)
3.0 Year(s) To 7.0 Year(s)
Not Disclosed by Recruiter
Description:We are seeking a technically strong and curious Cyber Security Researcher to joinour Security Operations Center (SOC) team. This role involves researchingevolving cybersecurity techniques, tools, and standards, and translating thoseinsights into technical solutions, PoCs, and operational enhancements.You will collaborate with Product Managers, SOC Analysts, and Developmentteams to support the design ...

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile