Average salary: Rs590,000 /yearly
More statsSearch Results: 3,338 vacancies
...? Hold an experience in generating different type of reports, consulting with concerned teams, for PAM Audit Requirements
? Should be... ....
? Assist with the management of PAM-related audit or other security findings.
Qualifications:
The requirements listed are representative...
...Role Purpose
The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
# Design and develop enterprise cyber security strategy and architecture...
Summary :We are seeking a seasoned Security Architect with a passion for building secure and resilient cloud and OT environments. You will... ...business needs and customer requirements.Responsibilities :- Consult with internal stakeholders to understand business goals, customer...
...Product group of MNC that provides services in
learning and Assessment space.
About the Role
Designation : Cyber Security Engineer
Responsibility of / Expectations from the Role
Identify security measures to improve incident response...
...rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive... ...coordination & audit assistance
# Liaise with stakeholders in relation to cyber security issues and provide future recommendations
# Maintain...
...Responsibilities:
Monitor cloud networks and systems for security issues.
Investigate security breaches and other cybersecurity incidents... ...implementations.
End Point Detection and Response tools and management.
Information/Cyber security certifications are a plus...
...management on performance of the delivery
What you will need to have:
A Bachelors degree with 17+ years of experience in Cyber Security domain.
Must be able develop project plan and track the plan using MS Project and must have experience in Agile methodology and...
...correct tools / systems towards execution of successful pen-test- Conduct pen-test on variety of Automotive systems / ECUs- Perform security assessment of different hardware modules and identify vulnerabilities- Handle multiple hardware & software tools, required for testing...
...compliance groups to assure systems are properly validated. Provides input to, defines and approves Product Validations and Reports.
Consults with project teams to provide information on quality best practices by meeting with project teams for formal training or informal...
*Strong expertise in designing solutions using Okta toolset, enabling single sign on services for both cloud and on prem applications
*1-3 years of Experience working with F5 tools with specific experience protecting application using F5 Access Policy Manager (APM) module ...
...Hi Candidate ,
Tech M is hiring for security Consultant .
• Proficient in Incident Management and Response • Experience in security device... ...preferred. • In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident...
...fintech, we’d like to ask you: Are you FIS?
About the team:
IT Security Analyst will be member of FIS Security Governance Team. Security... ...of working on network security / information security / Cyber Security
~ Knowledge of Firewalls, Encryption and Security Tools...
...and products. - Manage client relationship through all phases of the sales cycle - Provide a consultative solutions sales process to prospects - Must have experience on Cyber security, Networking, Security Solution, Firewall. - Good communication Skills and flexibility to...
...most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analyzing... ...protocols and supervising employees.
Keep your knowledge of cyber security up to date.
Continuous review of the operations carried...
...Engineering and Related Attacks
12. Experience in OWASP Testing ASVS, MASVS Checklist (2-3 years)
13. Penetration testing – API, Thick Client, Web, mobile (IOS and Android)(3-6 years)
14. Good Knowledge in Threat modelling
15. Certification in Security - Is good...
...cybersecurity. In this role, you will be responsible for implementing, configuring, and managing Rapid7 products to enhance our organization's security posture.Responsibilities : - Implement and configure Rapid7 products, including InsightVM, InsightIDR, Metasploit, InsightAppSec, and...
Job Description : We are seeking a highly skilled and experienced API Security Penetration Tester to join our cybersecurity team. The ideal candidate will have 3-4 years of hands-on experience conducting penetration testing on APIs and a strong background in cybersecurity. In...
...potential cybersecurity threats and vulnerabilities within the organization. Incident Handling : - Respond promptly and effectively to security incidents and breaches, ensuring minimal damage and swift resolution.- Policy and Procedure Development: Develop and maintain...
Rs 20 - 30 lakhs p.a.
...Position: Network Security Expertise
Experience : 5+ years
Location: Balewadi, Pune
Job Description:
Requirements:... ...that would be a less preferred alternative
Managing Network and Cyber security projects to remediation of bugs in network, security, and...
...Dew Software, a trusted leader in the Digital Transformation space, is seeking a skilled Cyber Security Splunk Engineer to join their dynamic team. With a commitment to innovative solutions, Dew Software collaborates with Fortune 500 companies to help them achieve their strategic...