Get new jobs by email
- ...Bachelor's degree in Computer Science, IT, Cybersecurity, or related field ~2+ years of experience in cybersecurity or information security ~ Proficiency in tools like SIEM (Splunk, QRadar, etc ), IDS/IPS, and antivirus systems ~ Strong knowledge of firewalls, VPNs, proxy...Suggested
- ...Security Policies and Procedures: Assist in the development and implementation of information security policies, standards, and procedures. Educate employees on information security best practices and enforce compliance with policies. Security Awareness and...Suggested
- ...Responsibilities : Perform application security testing and penetration testing of web application, APIs and mobile (ios/android) applications to identify potential vulnerabilities and risks. Conduct threat modelling, secure architecture review and application security...Suggested
- ...connects everyone at The Economist Group (TEG). Our businesses share a devotion to innovation, independence... ...We are seeking a Vulnerability Management Analyst to lead the identification, assessment, and remediation of security vulnerabilities across our organization. The...SuggestedContract workShift work
- ...Contract Management, Account Governance and Business Process Compliance activities to enable... ...Managers, Vertical CFOs, Financial analysts and other key stake holders to maintain smooth... ...Order-to-Cash process ~ Conducting UAT and securing Sign Offs for new requirements under...SuggestedContract workFlexible hours
- ...Science (Data & Analytics), Advanced Analytics, Market Research, Business Support Services, Media Services, and Project Management.... ...will manage data protection and privacy components of the broader security program. Working across Legal, IT, client, and partner ecosystems...Suggested
- ..., Gurugram, Haryana, Gurugram, Haryana, 122016, IN Line Of Business: CRR(CRR) Job Category: ~ Operations Experience Level:... ...advantageous. Responsibilities The Crisis Management Operations Analyst (Shift Worker) is responsible for monitoring and responding to...SuggestedWork at officeLocal areaHybrid workShift workWeekend workWeekday work
- ...process improvement Actively participate in automation, designing new systems, reviewing, repairing, maintaining, and testing to improve business process operations Key Skills, Knowledge, and Abilities Good Communication and transversal collaborative skills Process...Suggested
- ...Team: We are the Global SOC team, part of Global Information Security at Hitachi Digital. Our mission is to protect the company's and its... ...hunters working 24x7. You should have 3-4 years of experience in cyber security. Your role will include: Act as a Primary contact for...SuggestedFull timeFlexible hours
- ...We are seeking a highly skilled Cybersecurity Analyst with 10-15 years of experience to join our dynamic team in India. The ideal candidate... ...standards. Responsibilities Monitor and analyze security incidents and alerts. Conduct vulnerability assessments and penetration...Suggested
- ...maintain, develop, and improve centralized security management, monitoring and reporting... ...The platforms which we manage help our SOC Analysts, Specialists, Implementation Engineers, CYSOC... ...Engages with product teams translating business requirements into technical requirements...SuggestedFull time
- ...Data Discovery processes to the relevant teams. Required Skills and Qualifications Minimum 10 years of proven experience in Data Security and Data Discovery. Strong background in designing and operationalizing Data Discovery processes. Excellent analytical skills...Suggested
- ...Roles and Responsibilities: As a SOC Analyst , you will play a critical role in safeguarding the organization's IT infrastructure by monitoring, detecting, analyzing, and responding to security threats. You will work in a fast-paced environment, handling security incidents...Suggested
- ...We are looking for a Senior Cyber Security Engineer to drive end-to-end security architecture, operations, and culture across DeHaat’s tech landscape. You will work closely with engineering, DevOps, data, and compliance teams to lead security initiatives and strengthen our...Suggested
- ...Key Responsibilities: Security Assessments: Conduct security assessments, including vulnerability assessments, penetration testing, and risk assessments. Security Consulting: Provide expert security advice and guidance to clients. Incident Response: Assist clients...Suggested
- .... Analyze and interpret results from penetration tests to provide actionable recommendations. Collaborate with development and security teams to remediate vulnerabilities found during testing. Prepare detailed reports and presentations for stakeholders, summarizing...
- ...We are seeking an experienced Penetration Tester to join our security team in India. The ideal candidate will have a strong background in identifying and mitigating security vulnerabilities across various systems and applications. This role requires a deep understanding of...
- ...create detailed reports outlining findings and recommendations for remediation. Collaborate with development and IT teams to ensure security best practices are implemented during the software development lifecycle. Stay updated on the latest security threats,...
- ...Job description Offensive Security Engineer (Ransomware Penetration Testing) Job Description: Offensive Security Engineer (Ransomware Penetration Testing) Responsibilities Execute complex Red Team engagement as a penetration tester, simulating real-world ransomware...
- ...We are seeking a highly skilled and experienced Business Analyst with PMP certification and a deep understanding of the construction industry. This role will serve as a Subject Matter Expert (SME), advising clients on best practices in tendering, bidding, and trading operations...Full time
- ...We are seeking a highly skilled and experienced Business Analyst . Required Certifications & Expertise PMP certification . In-depth knowledge of the construction industry . Strong expertise in construction project management, supply chain dynamics , and cost...
- ...recommendations to relevant stakeholders. Collaborate with business units and IT teams to understand processes, identify risk areas,... ...up to date with the latest trends and developments in IT audit, security frameworks, and regulatory requirements such as ISO 27001, NIST,...Full timeWeekday work
- ...background in identifying and exploiting vulnerabilities in applications and networks. You will play a crucial role in enhancing our security posture and protecting sensitive information. Responsibilities Conduct penetration testing on various applications, networks,...
- Required Skills and Experience: Strong understanding of hacking techniques and tools. Experience with penetration testing frameworks and tools (Metasploit, Kali Linux). Strong scripting skills (Python, PowerShell). Knowledge of network protocols and system administration...
- ...Undertake complete ownership in accomplishing activities and assigned responsibilities across all phases of project lifecycle to solve business problems across one or more client engagements. Apply appropriate development methodologies (e.g., agile, waterfall) and best...
- ...Outlook, PowerPoint, and Excel Must have a sense of urgency around completing tasks and the order and priority of tasks based on business needs Strong composition, grammar, and business language skills Strong communication and interpersonal skills with the ability...Full time
- ...), threat feeds, and dark web. Risk Assessment: Assess the potential impact of threats and vulnerabilities on the organization s security posture. Incident Response: Respond to security incidents by analyzing logs, identifying root causes, and implementing containment...
- ...responsibilities include: Lead the design and construction of new mobile solutions using the latest technologies, always looking to add business value and meet user requirements. Strive for continuous improvements by testing the build solution and working under an agile...
- ...Description We are looking for a skilled System Analyst with 5-10 years of experience to join our team in India. The ideal candidate will... ...and specifications. Collaborate with stakeholders to gather business requirements and translate them into technical specifications....
- ...governance standards, along with a strong track record in driving business-aligned technology solutions across global organizations.... ...architecture solutions across technology, data, application, and security domains. Frameworks & Tools: TOGAF, ArchiMate, BiZZdesign, ABACUS...Long term contract