Get new jobs by email
- ...be doing... You'll be part of the "Verizon Global Infrastructure (VGI), Network & Information Security” group working on security and automation tools to protect against cyber threats within the VGS Technology organization. You will work with a team of cybersecurity...SuggestedWork at officeWork from homeHybrid work
- ...Job Title: Security Supervisor Location: Pan India Department: Security Reports To: Security Manager / Facility Manager Job Summary: The Security Supervisor is responsible for overseeing daily operations of the security team, ensuring safety protocols are...Suggested
- ...achieving the operating budget. CANDIDATE PROFILE Education and Experience High school diploma or GED; 3 years experience in the security/loss prevention or related professional area. OR 2-year degree from an accredited university in Criminal Justice or related...SuggestedLocal area
- ...Security Risk and Compliance Expert will be instrumental in shaping the global Information Security Management System (ISMS) within our Group Security team. This role involves engaging with various Business Groups and Corporate Functions to identify and manage information security...Suggested
- ...Job summary: Cognizant is seeking a Workday Consultant certified/experienced in Workday Security. In this role you will work with customers during all phases of deployment as well as post-production to assist with defining requirements, complete development, and deploy solutions...SuggestedTemporary workWork at officeImmediate startRemote jobHome office
- ...Summary: Protects endpoint devices (laptops, servers, mobile) from cyber threats. Key Responsibilities: Design and implement... ...emerging threats Skills Required: Knowledge of Windows/Linux OS security. Experience with endpoint protection platforms (CrowdStrike, Sentinel...Suggested
- ...Job Description: We are looking for an experienced Security Senior Specialist Advisor to join our security team. The ideal candidate... ...extensive experience in Data Security Posture Management , Cyber Security Posture Management , and Securiti.AI , with a proven...Suggested
- ...Our workplace embraces diversity and inclusion – it's a place where you can grow, belong and thrive. Your day at NTT DATA The Security Managed Services Engineer (L2) is a developing engineering role, responsible for providing a managed service to clients to ensure that...SuggestedLong term contract
- ...the "Verizon Global Infrastructure (VGI), Network & Information Security” group working to ensure that the network infrastructure devices... ...licenses) Leverage industry proven tools to identify and reduce Cyber Risks Assist in Crisis Management, Ransomware Recovery and Business...SuggestedWork at officeWork from homeHybrid work
- What This Job Involves: Putting Safety First—Always Project Safety Oversight: Provide comprehensive safety support to all projects, ensuring compliance with established company standards and local safety regulations. Early Project Engagement: Conduct thorough safety...SuggestedLocal area
- ...Job description : Experience in SAP Security and with at list one end to end implementation in security and knowledge on Rulesets, Violations, automation, Excellent knowledge of SOX, Audit issues and segregation of duties SoD issues Experience in SAP Fiori and SAC...Suggested
- ...Key Deliverables: Supervise end-to-end security operations at a corporate site Ensure strict compliance with safety protocols and access control Maintain incident records, reports, and daily logs Respond to emergencies and coordinate with internal and client teams...Suggested
- Contract role The Client has migrated from base SAS to SAS VIYA. Must have: 2-3 years of experience in SAS. Knowledge on UAT, UVT. Risk Reporting of Retail products (credit card, debit cards, Equity, Transfer etc.).SuggestedContract work
- ...strategically and independently with internal and external groups on multiple simultaneous projects. You will apply compliance and security control knowledge within cloud environments such as AWS and GCP. You will identify opportunities to leverage AI and other...Suggested
- ...What Your Responsibilities Will Be Support the build-out of technical SOX controls, working with Security, engineering, finance and IT to document and test controls across key systems. Assist in technology risk assessments to identify gaps against IPO-readiness benchmarks...Suggested
- ...cybersecurity solutions, offering a comprehensive suite of products to protect online transactions and communications. Our mission is to secure the digital landscape for enterprises worldwide. “When people think Online trust management, they think Sectigo because we offer our...Full timeWork at officeWorldwideLive outSleeping nights
- ...Identify, diagnose, and solve malware related issues as they arise, troubleshoot, and address them by implementing required adjustments to security solutions. Windows OS administration knowledge. Basic knowledge in configuring and troubleshooting various routers, switches,...
- ...Key Responsibilities: Monitor security alerts, events, and logs within Microsoft Sentinel... .... Stay current with the latest cyber threats, vulnerabilities, and best practices... ...Microsoft Certified: Azure Security Engineer Associate , Certified SOC Analyst (CSA) , GIAC...
- ...demonstrate and communicate control posture to stakeholders. Implement and Maintain Controls: Implement, maintain, and monitor security controls within AWS environments, including access controls, encryption, and other security configurations. Incident Response:...
- ...Job Summary Photon Infotech P Ltd is looking for Security Analyst to join our dynamic team and embark on a rewarding career journey 1. Conducting security assessments: You will be responsible for conducting security assessments of systems, networks, and applications to identify...
- ...We are hiring a Security Analyst to work on our growing IT Security team This position will primarily monitor our computer networks and IT assets for security issues; install, operate, and maintain security software; and resolve, report, and document any security issues...
- ~ Work within the Cybersecurity domain focusing on automated security testing to improve the security posture of products and systems. ~ Support engineering community in building and maintaining secure cloud infrastructure. ~ Conduct threat modeling, security architecture...
- ...In security risk management we're looking to harness the power of industry best practice combined... ...Ubuntu customers and users subject to cyber attacks. Additionally, the team... ...annually (and more often for graduates and associates) to ensure we recognise outstanding performance...Local areaWorldwide
- ...Incident Documentation : Review security incidents and vulnerabilities, documenting all findings clearly and accurately. Ensure that findings are categorized, prioritized, and assigned appropriate severity levels. Security Reporting : Prepare detailed reports on security...
- ...Monitor all the endpoint , Network , Cloud and application security incidents. As SOC team member , perform the basic investigation and... ...analysis, phishing email analysis, and IOC gathering. Trending Cyber Attacks : update knowledge about the trending cyber-attacks & its...Shift work
- ...Qualifications and Skills: Essential: ~ Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent experience. ~5+ years of experience in cybersecurity, with at least 2 years in a SOC environment. ~ Proficiency with SIEM tools (CrowdStrike...
- ~ Perform Dynamic Application Security Testing (DAST)on web applications and APIs (manual and tool-based). ~ Analyze DAST scan results, identify and prioritize vulnerabilities based on risk. ~ Participate in triage meetings with application teams to explain and document...
- ...SLAs and required ITIL standards. Build roles changes / new roles, single and composite. Incident Management prompt resolution of security and authorization related issues. Applications operations support for authorizations and other operational support as required....Flexible hours
- ...As an SAP Security Consultant with Brownfield migration experience, you will be responsible for designing, implementing, and managing user roles and authorizations to ensure secure access across SAP systems. Your role includes role-based access control (RBAC), segregation of...Hybrid work
- ...Role Summary: Implements and manages security measures to protect sensitive data and systems. Key Responsibilities: Monitor systems for breaches and investigate incidents. Install and configure security software (firewalls, encryption). Conduct risk assessments...