10 Opening(s)
7.0 Year(s) To 12.0 Year(s)
10.00 LPA TO 18.00 LPA
AppSec (Application Security) Key Terms:
Secure Coding: Writing software with security best practices to prevent vulnerabilities.
Vulnerability: Weaknesses in an application that could be exploited.
SAST (Static Application Security Testing): Code analysis to find vulnerabilities without executing the program.
DAST (Dynamic Application Security Testing): Security testing of running applications to find vulnerabilities.
Penetration Testing: Simulated ...
1 Opening(s)
8.0 Year(s) To 12.0 Year(s)
10.00 LPA TO 13.00 LPA
For a role that encompasses IT GRC (Governance, Risk, and Compliance) along with IT Security Auditresponsibilities, especially in the context of NIST, ISO 27001, SOC2, ITGC audit, RBI (Reserve Bank of India)regulatory compliance, IT Security Compliance, Business Continuity Management (BCM), Disaster Recovery(DR), and Vulnerability Assessment (VA), the roles and responsibilities ...
1 Opening(s)
7.0 Year(s) To 12.0 Year(s)
Not Disclosed by Recruiter
The role
As Lead Security Operations Engineer, you will provide technical leadership for a growing team of Security Engineers in the management of vulnerabilities from identification through to resolution. You will work closely with IT Operations, Cyber Security and the wider IT teams including line of business teams to ensure vulnerabilities ...
1 Opening(s)
8.0 Year(s) To 15.0 Year(s)
Not Disclosed by Recruiter
We are seeking a seasoned Information Security professional who has expertise in GRC with over 8+ years of progressive experience across data security, access management, IT security, network security, IT risk management, and compliance with standards such as ISO 27001, HIPAA, GDPR, NIST. This individual will lead GRC efforts, ensuring ...
1 Opening(s)
11.0 Year(s) To 14.0 Year(s)
Not Disclosed by Recruiter
Profile summary:The Manager (Information Systems and Security) is responsible for overall ‘InformationTechnology Services (ITS) function and in defining, implementing and documenting relevantprocesses, procedures and standards. This role will be in charge of establishing and maintainingan organisation wide information systems, infrastructure, and security, management program toensure that information assets are well ...
1 Opening(s)
3.0 Year(s) To 7.0 Year(s)
Not Disclosed by Recruiter
The role
As Security Operations Engineer, you will work as part of a growing team of Security Engineers in the management of vulnerabilities from identification through to resolution. You will work closely with IT Operations, Cyber Security and the wider IT teams including line of business teams to ensure vulnerabilities are ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
15.00 LPA TO 16.00 LPA
Job Role:
Leading a team that performs Application Security Testing, Server Configuration Audits and Vulnerability Assessments
Ensuring that VAPT for existing applications/systems are performed as per policy, track the compliance status, following up with application/system owners for closures of the security findings.
Releasing VAPT dashboards and reports periodically to management and relevant stake ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
12.00 LPA TO 20.00 LPA
Handle Escalated incident tickets from L1 Team.
Analyse and investigate security events from various sources; Triage security events and incidents, detect anomalies, and report remediation actions.
Manage security incidents through all phases of the incident response process through to
Closure
Using SIEM, Full Packet Capture, Intrusion Detection, Vulnerability Scanning and Malware analysis technologies for ...
1 Opening(s)
4.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
Job Description:
- Cloud operations team supports and configures Windows OS, Linux OS and manages all data protection services
Functions:
- Support of OS and systems infrastructure for all new builds in AWS
- OS release management - certification of new OS versions
- ASG AMI security patching
- Patch management
- Coordination with EOC for ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
HOW YOU WOULD CONTRIBUTE:
Build, run and maintain technical Cybersecurity tools and solutions • Provide technical support for Cybersecurity solutions and projects implementation • Collaborate with Global Technology Services to perform review and update hardening standards • Perform periodic vulnerability status reviews and remediation activities • Offer guidance on understanding security ...