1 Opening(s)
4.0 Year(s) To 10.0 Year(s)
6.00 LPA TO 8.00 LPA
As a Threat Analyst you will play a pivotal role in safeguarding our organization against cyber threats. Collaborating with enterprise systems, log analysis platforms, and endpoint collection systems, you will lead investigations, identify potential threats, and execute strategies to neutralize them effectively.
This position will require the candidate to be aligned ...
1 Opening(s)
12.0 Year(s) To 20.0 Year(s)
Not Disclosed by Recruiter
Key ResponsibilitiesSecurity Strategy Development:• The CISO takes a strategic approach to security identifying emerging threats and implementingproactive measures to protect the organization. They work closely with other stakeholders to alignsecurity initiatives with business goals.Risk Assessment and Management:• The CISO assesses the organization's security risks including potential vulnerabilities and potentialimpact. They ...
1 Opening(s)
10.0 Year(s) To 15.0 Year(s)
Not Disclosed by Recruiter
Overview: As a Cyber Security Director, you will serve as a trusted advisor and technical expert in all aspects of cybersecurity. You will play a critical role in developing, implementing, and maintaining the organization's cybersecurity strategy, policies, and procedures to safeguard against cyber threats and ensure compliance with industry standards and ...
1 Opening(s)
13.0 Year(s) To 20.0 Year(s)
0.00 LPA TO 80.00 LPA
Candidates from international Payment gateway fintech product companies.
Communication Skills - Excellent
Stability index : Number of Job changes : max 2 between 2019 – 2025
Work location : Bangalore only
Job Description:
We are seeking an experienced Cyber Security Operations and GRC Manager to join our team at, a leader in blockchain technology and solutions. The ideal ...
1 Opening(s)
6.0 Year(s) To 8.0 Year(s)
28.00 LPA TO 30.00 LPA
* Develop and maintain a comprehensive security architecture roadmap aligned withbusiness objectives and regulatory requirements.* Conduct thorough security risk assessments for business applications (on-premises, cloudhosted) to identify potential threats and weaknesses and recommend mitigation measures.* Conduct thorough security risk assessments for APIs to identify potential threats andweaknesses.*Conduct threat modelling for ...
1 Opening(s)
11.0 Year(s) To 14.0 Year(s)
Not Disclosed by Recruiter
Profile summary:The Manager (Information Systems and Security) is responsible for overall ‘InformationTechnology Services (ITS) function and in defining, implementing and documenting relevantprocesses, procedures and standards. This role will be in charge of establishing and maintainingan organisation wide information systems, infrastructure, and security, management program toensure that information assets are well ...
3 Opening(s)
8.0 Year(s) To 13.0 Year(s)
25.00 LPA TO 30.00 LPA
Role : Application Developer Role Description : Design, build and configure applications to meet business process and application requirements. ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
4.80 LPA TO 5.40 LPA
A security officer job description involves protecting people and property by patrolling premises, monitoring surveillance systems, and enforcing rules to deter criminal activity and ensure safety. Key duties include responding to emergencies, controlling access to buildings, investigating incidents, and writing incident reports. Some roles may also involve customer service, crowd control, or providing ...
1 Opening(s)
3.0 Year(s) To 8.0 Year(s)
2.16 LPA TO 3.60 LPA
A Network & IT Security Executive/Manager job description involves developing and implementing security strategies, managing security operations and teams, and ensuring compliance with regulations. Key responsibilities include conducting risk assessments, responding to security incidents, overseeing security technologies like firewalls and intrusion detection systems, and staying current with emerging threats and trends.
Key ...
4 Opening(s)
1.0 Year(s) To 5.0 Year(s)
1.80 LPA TO 2.40 LPA
System Monitoring:
Oversee and monitor surveillance systems and equipment to detect potential threats.
Activity Analysis:
Review footage and data for suspicious behavior, security breaches, or violations of rules.
Incident Reporting:
Promptly report any detected threats, incidents, or unusual activities to security personnel and management.
Record Keeping:
Maintain detailed and accurate logs and records of security activities, incidents, ...