132 Job openings found

1 Opening(s)
4.0 Year(s) To 10.0 Year(s)
6.00 LPA TO 8.00 LPA
As a Threat Analyst you will play a pivotal role in safeguarding our organization against cyber threats. Collaborating with enterprise systems, log analysis platforms, and endpoint collection systems, you will lead investigations, identify potential threats, and execute strategies to neutralize them effectively. This position will require the candidate to be aligned ...
1 Opening(s)
10.0 Year(s) To 15.0 Year(s)
Not Disclosed by Recruiter
Overview: As a Cyber Security Director, you will serve as a trusted advisor and technical expert in all aspects of cybersecurity. You will play a critical role in developing, implementing, and maintaining the organization's cybersecurity strategy, policies, and procedures to safeguard against cyber threats and ensure compliance with industry standards and ...
1 Opening(s)
6.0 Year(s) To 8.0 Year(s)
28.00 LPA TO 30.00 LPA
* Develop and maintain a comprehensive security architecture roadmap aligned withbusiness objectives and regulatory requirements.* Conduct thorough security risk assessments for business applications (on-premises, cloudhosted) to identify potential threats and weaknesses and recommend mitigation measures.* Conduct thorough security risk assessments for APIs to identify potential threats andweaknesses.*Conduct threat modelling for ...
1 Opening(s)
11.0 Year(s) To 14.0 Year(s)
Not Disclosed by Recruiter
Profile summary:The Manager (Information Systems and Security) is responsible for overall ‘InformationTechnology Services (ITS) function and in defining, implementing and documenting relevantprocesses, procedures and standards. This role will be in charge of establishing and maintainingan organisation wide information systems, infrastructure, and security, management program toensure that information assets are well ...
3 Opening(s)
8.0 Year(s) To 13.0 Year(s)
25.00 LPA TO 30.00 LPA
Role : Application Developer  Role Description : Design, build and configure applications to meet business process and application requirements.                                                                ...
1 Opening(s)
3.0 Year(s) To 4.0 Year(s)
5.00 LPA TO 7.00 LPA
We are seeking a skilled Research Analyst to join our team. The Research Analyst will gather, analyze, and interpret data to provide actionable insights and support decision-making processes. The ideal candidate will possess strong analytical skills, a keen eye for detail, and the ability to communicate findings effectively. Market and Industry ...
1 Opening(s)
8.0 Year(s) To 11.0 Year(s)
10.00 LPA TO 13.00 LPA
Job Overview: A highly qualified and certified Senior Network Engineer is what we are looking for to lead and assist the management and improvement of our network and security infrastructure. The preferred candidate will possess vast experience in network engineering, cloud networks, and security systems, together with comprehension of compliance ...
1 Opening(s)
8.0 Year(s) To 20.0 Year(s)
22.00 LPA TO 40.00 LPA
To manage and oversee the information security of TCHFL, inclusion its systems and data. Assure that information created, acquired or maintained by TCHFL and its authorized users, is in accordance with its intended purpose and complies with statutory and regulatory requirements regarding information access, security and privacy in order to ...
1 Opening(s)
4.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
ob Title: SOC (Security Analyst) Job Overview: We are seeking a highly skilled SOC Expert to join our dynamic cybersecurity team. The ideal candidate will play a crucial role in monitoring, detecting, analysing, and responding to security incidents. Candidate requires a deep understanding of security operations and a proactive approach to threat management ...
1 Opening(s)
6.0 Year(s) To 8.0 Year(s)
1.00 LPA TO 14.00 LPA
Designation: End Point Security Job Location: Bangalore(Hybrid) Experience: 6-8Years     Job Description   Key Responsibilities: Solution Architecture: Serve as the solution architect for SIEM, SOAR and Log Management Solutions, understanding client requirements and proposing appropriate technical solutions. Articulate use cases and suggest solutions for client-specific needs. Implementation and Deployment: Lead the design, architecting, and implementation of SIEM, SOAR and Log ...

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile