31 Job openings found

5 Opening(s)
10.0 Year(s) To 15.0 Year(s)
Not Disclosed by Recruiter
Candidate has 10+ years of relevant experience, including leadership roles in Security Operations or Cyber Incident Response Candidate has post-secondary degree in Business Administration, Information Technology, or a related field. Candidate has proven experience managing a Security Operations Center (SOC) or equivalent team. Candidate has strong background in cyber security operations, including threat ...
1 Opening(s)
2.0 Year(s) To 4.0 Year(s)
1.80 LPA TO 4.20 LPA
Key points to include: Strategic Planning: Developed and executed comprehensive IT strategies to support business growth and objectives, including technology roadmaps and infrastructure upgrades.    Budget Management: Managed IT budget effectively, allocating resources for new projects, maintenance, and vendor contracts.    Technology Implementation: Led the successful implementation of new software, hardware, and systems, ensuring seamless integration with existing ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
We have an urgent opening for the position of Datacentre Sr. Network Engineer for a reputed IT Company for the Navi Mumbai(Juinagar) location.   Job Description: Responsible for implementation and support of organization's networks (e.g., LAN, WAN, wireless and VoIP). Manages highly complex network and server environments (including virtualization). Designs and installs internal and external networks Tests and evaluates ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
15.00 LPA TO 25.00 LPA
Monitoring and detection:  SOCs continuously monitor various systems like networks, servers, databases, and endpoints for any signs of a cyberattack. They analyze security data to spot unusual activities, patterns, and anomalies.    Threat analysis:  SOC analysts investigate alerts and data feeds to determine if a threat is real, assess its potential impact, and differentiate between ...
1 Opening(s)
3.0 Year(s) To 10.0 Year(s)
10.00 LPA TO 18.00 LPA
Perform assessment of IT and cybersecurity policies, standards and otherdocumentation Identify gaps in policy, process and standard implementation Conduct discussions, take leadership and drive closure of identified open issuesin assessments Liaise with IT, Infra and business teams as required to drive Information andcybersecurity projects Release periodic dashboards\reports  Experience required for ...
1 Opening(s)
4.0 Year(s) To 10.0 Year(s)
10.00 LPA TO 15.00 LPA
Lead company to SOC2/ISO 27001 certification; Develop and maintain information security policies; Design and implement information security policy education, training, and awareness programs; Establish security risk matrix and framework; select security solutions to address security controls for enterprise landscape; Partner with key business and IT leaders to develop security policies, standards, guidelines, and procedures ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
25.00 LPA TO 32.00 LPA
Advanced Technical Skills DevOps & CI/CD Tools Mastery:o Expertise in Jenkins, GitLab CI, CircleCI, Travis CI, or similar tools forautomating build and deployment pipelines.o Advanced knowledge of Docker, Kubernetes, Helm, and ECS forcontainerization, orchestration, and managing microservices.o Proficiency in Infrastructure as Code (IaC) tools like Terraform,CloudFormation, Pulumi, and Ansible for ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
20.00 LPA TO 29.00 LPA
A DevOps (Development, Security, and Operations) Engineer combines softwaredevelopment, security, and IT operations expertise. The role is critical for integratingsecurity practices into the DevOps lifecycle, ensuring that applications are both secureand efficient in deployment.1. Technical Skills DevOps Tools and Practices:o Knowledge of tools like Jenkins, Git, Docker, Kubernetes, Terraform,and Ansible ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 12.00 LPA
Threat intelligence is evidence-based information, including context, mechanisms, and indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Positions in this function are involved in the body of technologies, processes, and practices designed ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
7.20 LPA TO 8.00 LPA
Job Summary:We are seeking a highly skilled IT professional with proven experience in ITcompliance, enterprise systems, and cyber security. The ideal candidate will beresponsible for ensuring that IT infrastructure, policies, and practices meet regulatorystandards while implementing and overseeing robust cyber security measures toprotect the organization from internal and external threats. Key ...

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile