1 Opening(s)
8.0 Year(s) To 15.0 Year(s)
Not Disclosed by Recruiter
We are seeking a seasoned Information Security professional who has expertise in GRC with over 8+ years of progressive experience across data security, access management, IT security, network security, IT risk management, and compliance with standards such as ISO 27001, HIPAA, GDPR, NIST. This individual will lead GRC efforts, ensuring ...
1 Opening(s)
12.0 Year(s) To 20.0 Year(s)
Not Disclosed by Recruiter
Key ResponsibilitiesSecurity Strategy Development:• The CISO takes a strategic approach to security identifying emerging threats and implementingproactive measures to protect the organization. They work closely with other stakeholders to alignsecurity initiatives with business goals.Risk Assessment and Management:• The CISO assesses the organization's security risks including potential vulnerabilities and potentialimpact. They ...
5 Opening(s)
2.0 Year(s) To 5.0 Year(s)
3.00 LPA TO 8.00 LPA
Security Monitoring & Alert Triage:
Continuously monitor security alerts generated by various security tools (SIEM, EDR, IDS/IPS, firewalls, etc.) for suspicious activities, anomalies, and potential security breaches.
Perform initial triage and analysis of security events, correlating data from multiple sources to determine the severity and legitimacy of alerts.
Prioritize alerts based on risk ...
1 Opening(s)
4.0 Year(s) To 15.0 Year(s)
10.00 LPA TO 22.00 LPA
Provide hands-on technical security engineering and security expertise in the analysis, assessment, development, and evaluation of security solutions and architectures to secure systems in the cloud (AWS, Azure or GCP).
Implement security controls and fine tune / baseline based on the risk criteria and continuously evaluate cloud infrastructure for new services ...
1 Opening(s)
11.0 Year(s) To 14.0 Year(s)
Not Disclosed by Recruiter
Profile summary:The Manager (Information Systems and Security) is responsible for overall ‘InformationTechnology Services (ITS) function and in defining, implementing and documenting relevantprocesses, procedures and standards. This role will be in charge of establishing and maintainingan organisation wide information systems, infrastructure, and security, management program toensure that information assets are well ...
1 Opening(s)
4.0 Year(s) To 10.0 Year(s)
10.00 LPA TO 15.00 LPA
Lead company to SOC2/ISO 27001 certification;
Develop and maintain information security policies;
Design and implement information security policy education, training, and awareness programs;
Establish security risk matrix and framework; select security solutions to address security controls for enterprise landscape;
Partner with key business and IT leaders to develop security policies, standards, guidelines, and procedures ...
1 Opening(s)
10.0 Year(s) To 16.0 Year(s)
14.00 LPA TO 22.00 LPA
Designation: Security ArchitectLocation: Turbhe Office, Navi MumbaiCTC: as per company norms
Job Description:
A Security Architect is a specialized role focused on designing, building, and maintaining the security posture of software systems and applications.
This position requires a deep understanding of software development principles, security best practices, and threat landscapes.
Responsibilities:
Design and develop secure architectural ...
5 Opening(s)
5.0 Year(s) To 8.0 Year(s)
20.00 LPA TO 30.00 LPA
Tasks/Duties:
Communicate with stakeholders at all stages of the project cycle to understand requirements and explain limitations
The Splunk Specialist is responsible for the design, development, and implementation of the Splunk infrastructure as well as support operations activities.
The candidate should be proficient with recognizing and onboarding new data sources into Splunk, analyzing ...
1 Opening(s)
6.0 Year(s) To 8.0 Year(s)
28.00 LPA TO 30.00 LPA
* Develop and maintain a comprehensive security architecture roadmap aligned withbusiness objectives and regulatory requirements.* Conduct thorough security risk assessments for business applications (on-premises, cloudhosted) to identify potential threats and weaknesses and recommend mitigation measures.* Conduct thorough security risk assessments for APIs to identify potential threats andweaknesses.*Conduct threat modelling for ...