134 Job openings found

1 Opening(s)
4.0 Year(s) To 10.0 Year(s)
6.00 LPA TO 8.00 LPA
As a Threat Analyst you will play a pivotal role in safeguarding our organization against cyber threats. Collaborating with enterprise systems, log analysis platforms, and endpoint collection systems, you will lead investigations, identify potential threats, and execute strategies to neutralize them effectively. This position will require the candidate to be aligned ...
1 Opening(s)
10.0 Year(s) To 15.0 Year(s)
Not Disclosed by Recruiter
Overview: As a Cyber Security Director, you will serve as a trusted advisor and technical expert in all aspects of cybersecurity. You will play a critical role in developing, implementing, and maintaining the organization's cybersecurity strategy, policies, and procedures to safeguard against cyber threats and ensure compliance with industry standards and ...
1 Opening(s)
6.0 Year(s) To 8.0 Year(s)
28.00 LPA TO 30.00 LPA
* Develop and maintain a comprehensive security architecture roadmap aligned withbusiness objectives and regulatory requirements.* Conduct thorough security risk assessments for business applications (on-premises, cloudhosted) to identify potential threats and weaknesses and recommend mitigation measures.* Conduct thorough security risk assessments for APIs to identify potential threats andweaknesses.*Conduct threat modelling for ...
1 Opening(s)
11.0 Year(s) To 14.0 Year(s)
Not Disclosed by Recruiter
Profile summary:The Manager (Information Systems and Security) is responsible for overall ‘InformationTechnology Services (ITS) function and in defining, implementing and documenting relevantprocesses, procedures and standards. This role will be in charge of establishing and maintainingan organisation wide information systems, infrastructure, and security, management program toensure that information assets are well ...
3 Opening(s)
8.0 Year(s) To 13.0 Year(s)
25.00 LPA TO 30.00 LPA
Role : Application Developer  Role Description : Design, build and configure applications to meet business process and application requirements.                                                                ...
1 Opening(s)
6.0 Year(s) To 10.0 Year(s)
15.00 LPA TO 16.00 LPA
Responsible for overseeing the design and development of the overall information security architecture for Company • Design and develop the overall information security architecture for Company. This includes creating a securityframework that aligns with business goals, industry best practices, and regulatory requirements.• Conduct risk assessments to identify potential security risks and ...
1 Opening(s)
10.0 Year(s) To 12.0 Year(s)
25.00 LPA TO 26.00 LPA
Design and develop the network security architecture for Company. This includes implementing firewalls, intrusiondetection/prevention systems, VPNs, and other security technologies to protect the network. • Design and develop the network security architecture for Company. This includes implementing firewalls, intrusiondetection/prevention systems, VPNs, and other security technologies to protect the network.• Conduct regular ...
1 Opening(s)
3.0 Year(s) To 4.0 Year(s)
5.00 LPA TO 7.00 LPA
We are seeking a skilled Research Analyst to join our team. The Research Analyst will gather, analyze, and interpret data to provide actionable insights and support decision-making processes. The ideal candidate will possess strong analytical skills, a keen eye for detail, and the ability to communicate findings effectively. Market and Industry ...
1 Opening(s)
8.0 Year(s) To 11.0 Year(s)
10.00 LPA TO 13.00 LPA
Job Overview: A highly qualified and certified Senior Network Engineer is what we are looking for to lead and assist the management and improvement of our network and security infrastructure. The preferred candidate will possess vast experience in network engineering, cloud networks, and security systems, together with comprehension of compliance ...
1 Opening(s)
4.0 Year(s) To 8.0 Year(s)
12.00 LPA TO 15.00 LPA
Job Responsibilities Monitor and analyze security alerts and incidents to identify potential threats. Conduct regular security audits and assessments to ensure compliance with standards such as ISO 27001, GDPR, and NIST. SOC2, HIPAA Develop, implement, and maintain security policies, procedures, and guidelines. Conduct vulnerability assessments and penetration testing to evaluate the security ...

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile