1 Opening(s)
4.0 Year(s) To 10.0 Year(s)
6.00 LPA TO 8.00 LPA
As a Threat Analyst you will play a pivotal role in safeguarding our organization against cyber threats. Collaborating with enterprise systems, log analysis platforms, and endpoint collection systems, you will lead investigations, identify potential threats, and execute strategies to neutralize them effectively.
This position will require the candidate to be aligned ...
1 Opening(s)
12.0 Year(s) To 20.0 Year(s)
Not Disclosed by Recruiter
Key ResponsibilitiesSecurity Strategy Development:• The CISO takes a strategic approach to security identifying emerging threats and implementingproactive measures to protect the organization. They work closely with other stakeholders to alignsecurity initiatives with business goals.Risk Assessment and Management:• The CISO assesses the organization's security risks including potential vulnerabilities and potentialimpact. They ...
1 Opening(s)
10.0 Year(s) To 15.0 Year(s)
Not Disclosed by Recruiter
Overview: As a Cyber Security Director, you will serve as a trusted advisor and technical expert in all aspects of cybersecurity. You will play a critical role in developing, implementing, and maintaining the organization's cybersecurity strategy, policies, and procedures to safeguard against cyber threats and ensure compliance with industry standards and ...
1 Opening(s)
13.0 Year(s) To 20.0 Year(s)
0.00 LPA TO 80.00 LPA
Candidates from international Payment gateway fintech product companies.
Communication Skills - Excellent
Stability index : Number of Job changes : max 2 between 2019 – 2025
Work location : Bangalore only
Job Description:
We are seeking an experienced Cyber Security Operations and GRC Manager to join our team at, a leader in blockchain technology and solutions. The ideal ...
1 Opening(s)
6.0 Year(s) To 8.0 Year(s)
28.00 LPA TO 30.00 LPA
* Develop and maintain a comprehensive security architecture roadmap aligned withbusiness objectives and regulatory requirements.* Conduct thorough security risk assessments for business applications (on-premises, cloudhosted) to identify potential threats and weaknesses and recommend mitigation measures.* Conduct thorough security risk assessments for APIs to identify potential threats andweaknesses.*Conduct threat modelling for ...
1 Opening(s)
11.0 Year(s) To 14.0 Year(s)
Not Disclosed by Recruiter
Profile summary:The Manager (Information Systems and Security) is responsible for overall ‘InformationTechnology Services (ITS) function and in defining, implementing and documenting relevantprocesses, procedures and standards. This role will be in charge of establishing and maintainingan organisation wide information systems, infrastructure, and security, management program toensure that information assets are well ...
3 Opening(s)
8.0 Year(s) To 13.0 Year(s)
25.00 LPA TO 30.00 LPA
Role : Application Developer Role Description : Design, build and configure applications to meet business process and application requirements. ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
7.20 LPA TO 8.00 LPA
Job Summary:We are seeking a highly skilled IT professional with proven experience in ITcompliance, enterprise systems, and cyber security. The ideal candidate will beresponsible for ensuring that IT infrastructure, policies, and practices meet regulatorystandards while implementing and overseeing robust cyber security measures toprotect the organization from internal and external threats.
Key ...
1 Opening(s)
4.0 Year(s) To 10.0 Year(s)
4.80 LPA TO 5.40 LPA
A CCTV Operator / IT Officer combines surveillance monitoring with IT support responsibilities. This role involves operating and maintaining CCTV systems, monitoring footage for security breaches, and providing technical support for IT-related issues within the organization. Key responsibilities include monitoring camera feeds, responding to alarms, maintaining equipment, managing video footage, and troubleshooting IT ...
5 Opening(s)
2.0 Year(s) To 5.0 Year(s)
3.00 LPA TO 8.00 LPA
Security Monitoring & Alert Triage:
Continuously monitor security alerts generated by various security tools (SIEM, EDR, IDS/IPS, firewalls, etc.) for suspicious activities, anomalies, and potential security breaches.
Perform initial triage and analysis of security events, correlating data from multiple sources to determine the severity and legitimacy of alerts.
Prioritize alerts based on risk ...