22 Job openings found

1 Opening(s)
8.0 Year(s) To 13.0 Year(s)
13.00 LPA TO 15.00 LPA
-----JOB DESCRIPTION--- Act as the main point of contact for the design and deployment of the IT Security GRCframework and work with Very Senior IT leadership (CTO, IT Head)* Partner with all team members in the IT head's function to build/govern/sustain /improve anintegrated end-to-end security GRC framework to provide a "one-stop ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
4.00 LPA TO 5.00 LPA
Position:        Sr. Executive - IT Security Location:        Piplod - Surat Experience:     3 - 5 Years  Industries:      Chemical    Responsibilities: Engineering, implementing, and monitoring security measures for the protection of computer systems, networks, and information. Identifying and defining system security requirements. Designing computer security architecture and developing detailed cyber security designs. Vendor Management. Prepare ...
1 Opening(s)
7.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
We are having an urgent opening for the position of Manager/Dy Manager–Cyber Security & IT Compliance for a reputed company in the Kolkata location.   Education : BE/B.Tech/MCA or Master Degree inrelated fieldRelevant Cyber security certificationsReporting structure :Reports to Head of the departmentBackground & Experience: 7-10 years of work experience in implementation and managing Cyber Security in ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 8.00 LPA
Responsibilities: Continuously monitor security alerts and events using various security information and event management (SIEM) tools. Analyze network traffic, system logs, and other data sources to identify potential security incidents. Investigate alerts to determine the root cause and severity of incidents.  Incident Response: Respond promptly to security incidents, following established procedures and protocols. Coordinate with other ...
3 Opening(s)
8.0 Year(s) To 13.0 Year(s)
25.00 LPA TO 30.00 LPA
Role : Application Developer  Role Description : Design, build and configure applications to meet business process and application requirements.                                                                ...
1 Opening(s)
4.0 Year(s) To 10.0 Year(s)
6.00 LPA TO 8.00 LPA
As a Threat Analyst you will play a pivotal role in safeguarding our organization against cyber threats. Collaborating with enterprise systems, log analysis platforms, and endpoint collection systems, you will lead investigations, identify potential threats, and execute strategies to neutralize them effectively. This position will require the candidate to be aligned ...
1 Opening(s)
3.0 Year(s) To 4.0 Year(s)
Not Disclosed by Recruiter
Job Description: We are seeking a skilled and motivated Information Security Analyst 1 with 3 to 4 years of experience to join our team. The ideal candidate will have hands-on experience with Active Directory (AD) and Privileged Access Management (PAM) systems. This role involves ensuring the security and integrity of our ...
1 Opening(s)
4.0 Year(s) To 8.0 Year(s)
12.00 LPA TO 15.00 LPA
Job Responsibilities Monitor and analyze security alerts and incidents to identify potential threats. Conduct regular security audits and assessments to ensure compliance with standards such as ISO 27001, GDPR, and NIST. SOC2, HIPAA Develop, implement, and maintain security policies, procedures, and guidelines. Conduct vulnerability assessments and penetration testing to evaluate the security ...
3 Opening(s)
4.0 Year(s) To 20.0 Year(s)
10.00 LPA TO 20.00 LPA
Key Responsibilities: ·  Implement and manage security measures for the protection of systems, networks, and data. ·  Collaborate closely with development teams to integrate security into the SDLC. ·  Conduct vulnerability assessments and implement remediation plans. ·  Monitor security infrastructure for vulnerabilities and intrusions. ·  Lead incident response activities and ensure timely resolution of security incidents. ·  Evaluate and recommend new security ...
1 Opening(s)
3.0 Year(s) To 4.0 Year(s)
3.00 LPA TO 4.00 LPA
Detect, analyze and defend against network penetration: execute intrusion detectionprevention system.  Install firewalls: applications gateways and access control list based packet filters.  Configure and handle routers and virtual private Networks.  Propose, plan, experiment and implement robust authentication mechanisms both network andhost based.  Gather, interpret, and analyze ...

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile