Average salary: Rs1,662,589 /yearly
More stats ...rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive... ...coordination & audit assistance
# Liaise with stakeholders in relation to cyber security issues and provide future recommendations
# Maintain...
...AXA XL has as an objective to enhance its security posture across all domains of information security to increase not only its technical capabilities in defending against cyber-attacks, but also to increase its brand value by becoming a leader in information security in relation...
...Introduction
Job Title: Cyber Security Analyst (Security Awareness focus)
The Economist Group is the leading source of analysis on international business and world affairs. We deliver our information through a range of formats, from newspapers and magazines to conferences...
...Contact Person Divya : (***) ***-****
keep up to date with the latest security and technology developments
research/evaluate emerging cyber security threats and ways to manage them
plan for disaster recovery in the event of any security breaches
monitor for attacks...
...SEC department, which corresponds to the GTS Security, is responsible for development, operations, delivery & management of various cyber security and compliance aspects across the... ...Profile Required
The Cyber security analyst is responsible for conducting cyber security...
...Ø Responsible for detecting, identifying, and troubleshooting security events from ServiceNow & Security Tools.
Ø Responsible for performing... ..., classification, and incident escalation, to the next level Analyst.
Ø Investigate, document, and report on any security threat...
...Strong understanding of security architecture is necessary.
Minimum 7 years of Cybersecurity Experience required with a preference for diverse expertise in domains like application security cloud security data security and security architecture.
Technical proficiency...
...Security Analyst L2 Location: Mumbai
Job Responsibilities
Experience with SIEM tool like IBM Qradar, PaloAlto XDR
Experience with SOAR tool like IBM Resilient, PaloAlto XSOAR
Experience with EDR tool like Crowdstrike
Proficiency with Splunk queries
Good experience...
...Cloud Security Posture Management (CSPM) Engineer Role
Lloyds Banking Group is the UK’s largest Digital, Retail and Commercial Bank with a focus on Helping Britain Prosper.
We are on the mission to build the bank of the future, and we need your help do it! We are...
...Job Description:
We are seeking an experienced and highly skilled Cloud Architect with a specialized focus on container security to join our dynamic team. As a Cloud Architect, you will play a crucial role in designing, implementing, and maintaining secure cloud-based containerized...
...Security Specialist - Cyber Security Operations Center
Role Overview:
Cyber Security Operations Analyst will play a significant role in our Cyber Security Operations Center team (CSOC), reviewing and handling oversight to a number of security controls, and providing...
Job Description : - 5 - 8 years of experience (relevant experience min 4 years in cyber security)-Will be performing application vulnerability assessments, API assessments and mobile application penetration tests.- Will perform secure source code reviews of software applications...
JD for Active Directory L3:
Requirement : Active Directory / Entra ID Admin L3
Location – Chennai, Coimbatore, Bangalore & Hyderabad.
Experience : 9 to 16 years
Candidate Requirement:
~ Expert in Troubleshooting, configuring & managing Active Directory...
Job Title : Cyber Security Analyst - BISO
Location: Chennai
About Barclays
Barclays is a British universal bank. We are diversified by business, by different types of customers and clients, and by geography. Our businesses include consumer banking and payments operations...
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Must Have
# Data Engineer with 2-4 years of experience in...
...Job Description • Identify, analyse and prioritize cyber security incidents across all locations worldwide
• Handle of suspected malware... ...incident response measures, escalate critical incidents to 2nd level analysts
• Screen the threat landscape for critical vulnerabilities...
...clouds, Openshift infra, dockers/container infra etc
3. Thorough experience in configurations reviews against CIS benchmarks and security standards
5. Penetration testing skills including the use of security assessment and hacker tools; eg BURP, AppScan, Fortify, Wireshark...
...:We are seeking a highly skilled and experienced Cybersecurity Analyst with expertise in Rapid7 products to join our team. The ideal candidate... ..., and managing Rapid7 products to enhance our organization's security posture.Responsibilities : - Implement and configure Rapid7...
...prospects both manually and via the ClearOPS Answer Management System
Participation in customer or prospect discussions on information security related topics
Development of artifacts in support of ISO 27001 and SOC2 audit fieldwork
Regular monitoring of the MCO Rapid7...
...culture where talent is valued. We're a place where everyone can discover and be their best version.
Job Description
Analyst - Information & Cyber Security
Job Description (JD):
The Information and Cyber Security Analyst will play a crucial role in managing and...
...response capabilities.
~ Develop and implement security automation scripts and playbooks in... ...emerging trends
~ Enabling a world-class cyber defense program by working closely with... ...management, incident management, intelligence analyst, and forensic personnel to develop a...
About the Role :We are seeking a highly motivated and experienced Business Analyst 3 to join our Cyber Security team. You will play a critical role in bridging the gap between business needs and technical solutions in the ever-evolving cybersecurity landscape. You will work...
This is a remote position.
Title: Cyber Security Analyst Trainer
Location: Remote - EST/PST time Zone
Job Description:
We are seeking a skilled and experienced Cyber Security Analyst Trainer to join our team. The ideal candidate will possess a strong background in...
...Description
Company:
Qualcomm India Private Limited
Job Area:
Information Technology Group, Information Technology Group Cyber Security Engineering
General Summary:
This role will be responsible for supporting 24x7 operations thus requires working night /...
...ensure FedEx's compliance with all laws and regulations and increase security posture.
Provide information security metrics visibility to... ...risk-based decision-making guidance to stakeholders on both cyber security and regulatory issues.
Reduce risk to FedEx business...
...Perform complex service analysis as it relates to the information security function or capabilities.
Resolve issues and incidents by... ...solutions.
Responsible for operations and maintenance of key cyber security capabilities and services.
Provide guidance to assigned...
...testing, deployment, and application support.
You will be successful in this role if you have:
Requires a Bachelor’s Degree in Security, Networking, or Technology and a minimum of 7 years of experience or the equivalent in the IAM domain (OKTA, Azure AD, ping one,...
...About the Role:
Position Title: Senior Analyst - Cyber Security
Location: Bengaluru
Job Profile:
Position details:
To ensure effective management and control of Cyber Security, IT and information risk for MUFG EMEA entities by ensuring all appropriate...
...context of PCI DSS assesses an organization's compliance with the security standards. They conduct assessments, control testing, and... ...Qualification
Experience Range: 4 to 6 Years
Role: Cyber Security Analyst – final role will depend on candidate’s experience and...
...discover and be their best version.
Job Description for VAPT Senior Analyst
We are seeking a skilled and experienced Vulnerability... ...applications, and infrastructure components.
# Identify and exploit security vulnerabilities to assess the effectiveness of existing security...