1 Opening(s)
3.0 Year(s) To 10.0 Year(s)
10.00 LPA TO 18.00 LPA
Perform assessment of IT and cybersecurity policies, standards and otherdocumentation Identify gaps in policy, process and standard implementation Conduct discussions, take leadership and drive closure of identified open issuesin assessments Liaise with IT, Infra and business teams as required to drive Information andcybersecurity projects Release periodic dashboards\reports
Experience required for ...
1 Opening(s)
4.0 Year(s) To 10.0 Year(s)
10.00 LPA TO 15.00 LPA
Lead company to SOC2/ISO 27001 certification;
Develop and maintain information security policies;
Design and implement information security policy education, training, and awareness programs;
Establish security risk matrix and framework; select security solutions to address security controls for enterprise landscape;
Partner with key business and IT leaders to develop security policies, standards, guidelines, and procedures ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
25.00 LPA TO 32.00 LPA
Advanced Technical Skills DevOps & CI/CD Tools Mastery:o Expertise in Jenkins, GitLab CI, CircleCI, Travis CI, or similar tools forautomating build and deployment pipelines.o Advanced knowledge of Docker, Kubernetes, Helm, and ECS forcontainerization, orchestration, and managing microservices.o Proficiency in Infrastructure as Code (IaC) tools like Terraform,CloudFormation, Pulumi, and Ansible for ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
20.00 LPA TO 29.00 LPA
A DevOps (Development, Security, and Operations) Engineer combines softwaredevelopment, security, and IT operations expertise. The role is critical for integratingsecurity practices into the DevOps lifecycle, ensuring that applications are both secureand efficient in deployment.1. Technical Skills DevOps Tools and Practices:o Knowledge of tools like Jenkins, Git, Docker, Kubernetes, Terraform,and Ansible ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 12.00 LPA
Threat intelligence is evidence-based information, including context, mechanisms, and indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Positions in this function are involved in the body of technologies, processes, and practices designed ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
7.20 LPA TO 8.00 LPA
Job Summary:We are seeking a highly skilled IT professional with proven experience in ITcompliance, enterprise systems, and cyber security. The ideal candidate will beresponsible for ensuring that IT infrastructure, policies, and practices meet regulatorystandards while implementing and overseeing robust cyber security measures toprotect the organization from internal and external threats.
Key ...
1 Opening(s)
10.0 Year(s) To 12.0 Year(s)
25.00 LPA TO 25.00 LPA
Job Title: Infosec Lead
Department: IT
Level/Designation Manager/Sr. Manager
Position Type: Full Time
Job Overview
This role is responsible for implementing processes such as GRC to automate and continuously monitor the information security controls, risks, etc. Evaluates the firm to ensure compliance with security standards andrelevance with industry security norms.
ROLE AND RESPONSIBILITIES
Provide a bullet point list ...