Get new jobs by email
- We are seeking a Security Engineer with 5 years experience in enterprise application and cloud security. You will define and enforce security standards manage compliance and implement safeguards for AI/telephony data flows. Responsibilities: Define enterprise security...SuggestedFull timeRemote job
- ..., NIST, ISO 27001, or other relevant standards. Participate in incident response, troubleshooting, and post-incident analysis. Develop, iterate and report relevant network security coverage metrics Maintain documentation and provide training or guidance to junior engineers...SuggestedFull timeHybrid workWorldwide
- Position : Cyber Security EngineerExperience : 3 5 YearsLocation : BangaloreAbout the Role :We are looking for a dynamic and results-driven... ...with audit protocols.Threat Modeling & Penetration Testing :- Develop and refine threat models to proactively identify potential attack...SuggestedHybrid work
- ...Alstom Cyber security Engineer NETWORK & LINKS: The Selected candidate report to Program Cybersecurity Manager and will work with a highly motivated Cybersecurity team involved in vulnerability monitoring, vulnerability assessment, scanning and penetration testing of...Suggested
- ...implement security automation frameworks for threat detection, remediation and compliance validation across cloud and application layers. Develop tools and scripts to enhance security visibility in AI model pipelines, APIs and data integrations. Integrate security controls...SuggestedFull time
- ...team delivers next-generation application enhancements and new products for a changing world. Working at the cutting edge we design and develop software for platforms peripherals applications and diagnostics all with the most advanced technologies tools software engineering...SuggestedFull time
$ 70000 - $ 86000 p.a.
Resource Management Concepts, Inc. (RMC) provides high-quality, professional services to government and commercial sectors. Our mission is to deliver exceptional management and technology solutions supporting the protection and preservation of the people and environment of ...SuggestedFull timeContract workInterim roleRelocation packageWorking Monday to FridayShift workDay shift- We are seeking to hire a Security Engineer II in our InfoSec team at Mumbai. This role will be instrumental in coordinating and managing penetration tests to ensure the security and integrity of our systems. This role involves close collaboration with penetration testing vendors...SuggestedHybrid workShift work
- Job Description :This profile shall be responsible for to audit the security and compliance of infrastructure. The technical role which provides an opportunity to work on IT Security Process Audit, IT Systems Audit, and ISMS implementation.Experience In :- Minimum 2+ years of...Suggested
- ...Identify, analyze, and remediate security vulnerabilities in applications and authentication systems.- Security Policy Enforcement : Develop and enforce security policies and procedures related to end-user application access and authentication.- Incident Response : Participate...Suggested
- Career Area: Technology Digital and Data Job Description: Your Work Shapes the World at Caterpillar Inc. When you join Caterpillar yourejoining a global team who cares not just about the work we do but also about each other. We are the makers problem solvers and...SuggestedFull time
- Description : About the Role :We are seeking a Senior Cybersecurity Engineer to design, implement, and govern enterprise-grade security architectures across cloud-based healthcare platforms. The role involves working closely with Data, Software, ML, and Cloud Architects to secure...Suggested
- Description : - 5+ years of experience in AWS app and infra security, Vulnerability Assessment and Penetration testing.- Should have participated in at least 2 IT Security Audits, preferably one of which should be in the last 12 months.- Experience in working heterogeneous work...Suggested
- ...direction to infrastructure, operations, data, and application developments groups throughout the transitioning phase, implementation in production... ...and vulnerability analyses and risk assessments, analyzes cyber technologies, metrics models and performance indicators, to recommend...Suggested
- ...monitoring systems.- Work with cross-teams and peers to improve detection coverage, logging capabilities, detection, and response systems.- Develop and improve operational processes and procedures for event analysis and incident response activities.- Provide timely feedback to...SuggestedShift work
- ...employees. We benefit from our collective success and actively shape our companys strategy and direction. Your work creates value. Youll develop innovative solutions and build relationships with teammates and clients while accessing global capabilities to scale your ideas...Full time
- ...networks, and infrastructure. Perform manual and automated vulnerability assessments across different platforms and environments. Develop detailed reports on findings and provide actionable recommendations for remediation. Red Team Engagement Plan, execute, and...
- ...believe security should move as fast as our code. Code Review: Review source code for security flaws (like SQLi XSS IDOR) and help developers write secure code from day one. Bug Triage: Analyze incoming bug reports from our Bug Bounty programs validate them and...Full timeInternshipWeekend work
- ...other relevant certifications Education Qualification : BCA / B.Tech / B.Sc – Computer Science / B.Sc - Information Security / Cyber Forensics / M.Sc – Information Security/ Cyber Forensics. Experience: - Minimum 5 years of relevant security testing experience...
- ...objectives are met across both application and infrastructure domains. Core Responsibilities Application Security • Guide developers and engineers on secure coding standards and practices. • Perform code reviews and static/dynamic analysis to identify...Remote jobFull timeHybrid work
- ...Lifecycle, including sprint security inputs and code reviews.- Provide security inputs during sprint planning and threat modeling sessions.- Develop and maintain security scripts for automation and monitoring.- Stay updated on emerging security threats and best practices.Skills : -...Shift work
- ...primary point of contact for key stakeholders to resolve queries and issues related to Telco risk management and GRC tool.- Assist in developing training material for key stakeholders.Core Responsibilities :- Recommends and ensures implementation of security safeguards to the...Night shiftWeekend work
- ...track record in Bangalore India and be a part of our AppTrana Suite of Products Unit.Primary focus will be to threat detection research, develop scanner & WAF signature, develop security features, and drive integration with the product and QA teams for our Web Application...
- ...experience for yourself and a better working world for all. EY- Cyber Security (AEET) Consulting Senior As part of our EY-Cyber... ...culture coach and counsel junior team members and help them to develop. Your key responsibilities Design implement and...Full timeWorldwide
- ...We is seeking a talented Cyber Security Analyst based in Bengaluru. As a Cyber Security Analyst, you will play a key role in ensuring the... ...testing to identify potential weaknesses in our systems, Develop and implement security measures and best practices to protect against...Full timeFlexible hours
- ...candidate will be building digital security protocols operating a cyber security system and maintaining an IT security infrastructure... ...critical check and balance that reviews changes in the environment developed by other cybersecurity teams and thereby ensures changes are...Full time
- ...Security Fundamentals AWS Certified Security Specialty GIAC CISSP CEH are highly desirable). Experience working directly with software developers and data scientists to improve code/model security. Competencies and Behaviors Establishes credibility among Engineering and...Full time
- ...analysts Support in continuous improvement processes our SOC/Cyber Detection & Response Center (e.g. handling false positives, automation... ...We offer an inclusive work environment where all individuals can develop their skills and talents regardless of gender, nationality,...Shift work
- ...endpoints across Windows macOS and Linux remain up to date with the latest security patches agent versions and configuration baselines. Develop and enforce endpoint security policies OS-hardening standards and configuration baselines. Create and maintain Agent Installation...Full timeRemote jobFlexible hours
- ...efforts. Key Responsibilities Implement security controls for embedded software in STERIS products and related applications. Develop and maintain Software Bill of Materials (SBOM) track vulnerabilities and coordinate remediation with product teams. Assist in...Full timeHybrid workWork at officeRemote jobWorking Monday to FridayMonday to Wednesday