Get new jobs by email
- ...Join Tsaaro as a Data Protection Consultant Lead with Purpose. Deliver Impact. Shape Privacy. About Tsaaro At Tsaaro, privacy and security are not side functions they... ...insights and hands-on support to help them manage privacy risks, demonstrate compliance, and strengthen...SuggestedHybrid workFlexible hours
- ...financial services organization, is looking to hire a mid–senior Data Privacy Officer (AVP level) for Mumbai/Pune. This role will focus on... ...data privacy frameworks, conducting privacy risk assessments, managing data breach responses, and acting as a key interface with...Suggested
- ...tech.? Vishay Pune, India is currently seeking applicants for a Data Privacy & Compliance Specialist role . Vishay is looking for a... ...CCPA, and other privacy frameworks, including website cookie management. 4.Assist in vendor and data transfer assessments, incl....Suggested
Rs 7.87 - 13 lakhs p.a.
...compliance, while supporting integrations with SAP ECC/S4 and identity management platforms. Key Responsibilities Design, configure, and... ...Configure and manage dynamic permission groups using employee data attributes (location, department, job classification, pay grade,...SuggestedFlexible hours- ...By combining the very latest red flags, crime models, and OSINT data, our system detects crimes spanning labor and sex trafficking, elder... ...tools, alongside strong technical foundations in endpoint management and identity administration. This position requires both strategic...SuggestedFull timeWork at officeWork from homeWorldwide
- ...solve complex problems by finding integrated data-centric solutions from the first stages... ...a good understanding of identity management as a business risk. Support Saviynt IGA... ...laws. You can read our full Recruitment Privacy Notice Here. Please note: If you are being...SuggestedFull timeLocal area
- ...KEDBs), playbooks, and knowledge base articles. Mentor and guide new joiners to build team capability and confidence. Produce management reports covering alert trends, investigation insights, and process performance. Participate and contribute to daily stand-up discussions...SuggestedLocal area
- ...proactive Cybersecurity Analyst with strong expertise in Vulnerability Management , Incident Response , and Security Automation . Experienced... ...scripts using Python , PowerShell , and Batch for data parsing, log analysis, and custom tool integrations. Certifications...Suggested
- ...best practices • Make changes to configurable items, which include hardware, software, documentation, etc. It covers configuration management planning, configuration identification, configuration controls & audits • Develop unit test package, execute tests & document...SuggestedImmediate start
Rs 5 - 9.5 lakhs p.a.
Key Responsibilities SAP Authorization & Security Design and maintain SAP roles (Single, Composite, Derived) and secure custom transactions. Maintain SU24 entries and ensure compliance with SOX and IT general controls. Implement SAP security across modules and Basis...Suggested- ...Cyber Security Analyst you should have experience with- Strong understanding of Information Security and Data Leakage. Ability to effectively identify and manage Cyber Information Risk. Support DLP exception governance and ensure appropriate control measures are...SuggestedImmediate start
Rs 3.5 - 7 lakhs p.a.
...including web, mobile, API, and network penetration tests . You'll be the technical authority for both clients and your team. Client Management & Scoping: Act as the technical leader for client engagements. This involves scoping solutions to their cybersecurity challenges...SuggestedWorldwide- ...Adhere to and align assessments with industry frameworks and standards such as OWASP, PTES, NIST, CIS, PCI DSS. Maintain confidentiality and integrity of client data at all times. Vulnerability tracker management Leading team onsite for overall project execution....Suggested
Rs 18 - Rs 23 per hour
...Vulnerability risk, Endpoint Security, Incident Management Job Description: Roles and... ...comprehensive organization-wide information privacy and security plans, policies,... ...Management (SIEM) tools (Splunk) – ingesting data (Forwarders, Event Collectors, add-ons),...SuggestedFull timeImmediate startDay shiftAfternoon shift- ...No Job Summary A Cyber Security Identity and Access Management (IAM) Analyst is responsible for ensuring the secure and efficient... ...identities to monitor and control access to sensitive systems and data, preventing unauthorized access and potential security breaches....SuggestedVisa sponsorshipWork at office
- ...Company Description Presidio Information Risk Management LLP (PIRM) is a global player in Information Security, Cybersecurity, Compliance... ...of services, including application security, cloud security, data privacy solutions, and v-CISO/v-DPO services. PIRM specializes in...Full timeWorldwide
Rs 12 - 18.5 lakhs p.a.
...SU24 authorization entries . Implement and maintain Segregation of Duties (SoD) controls and SAP access governance policies. Manage SAP security across ECC and S/4HANA environments. Configure and manage SAP GRC Access Control components such as ARA, EAM, ARM,...- ...Information Security Risk & Compliance Experience: 10 -14 YRS (Rel 9 yrs) Job Description: At least 7 years of experience in either data protection, data compliance areas, security regulations. Are able to communicate in fluent English. Has 4–5 years' experience...
- ...will: ● Conduct IT General Controls (ITGC) testing covering Access Management, Change Management, IT Operations, and Backup/DR. ● Support... ...Web Software Developers, Cloud Architects, Technical Consultants, Data Administrators, IT Security experts, DevOps Professionals &...Work at office
- ...you we would love to have you join us! Job Description Summary: You will focus on Non‑Human and Machine Identity & Access Management (NHI/IAM) with a emphasis on API security, secrets management, and centralised API governance. You will define, implementing, and...Hybrid workWork at officeLocal areaMonday to Thursday
- ...offerings and drive consistency. You will report to the Execution Manager. Your Responsibilities: ICS OT Security team responsible... ...Detection System) services such as deployment, tunning, data enrichment, reports generation, etc. in an ICS environment. An ICS...Full timeHybrid workWork at officeLocal areaRemote jobMonday to ThursdayShift work
- ...Information Security Lead is responsible for developing, implementing, and managing the organization’s information security strategy and operations. Ensures the confidentiality, integrity, and availability of data and IT systems by proactively identifying risks, enforcing...
- ...covering SOC2, AI Act/CRA applicability, security architecture, privacy metadata, and other product compliance artifacts Operating within... ...working style and ability to partner effectively with product managers , architects , product cyber , and GRC HQ . Have an...WorldwideFlexible hours
- ...networking, IT infrastructure, vulnerability scanning, configuration management, incident management, GitLab and security monitoring tools. •... ...) assessments on Confluence, • Review and validate KPCI data submitted by control owners to ensure accuracy, completeness, and...
- ...Security Analyst to join our team and help safeguard our people, data & digital infrastructure. This role will be responsible for monitoring... ...ahead of emerging cyber risks. Key Responsibilities Managing alerts within the group's security tooling (SIEM, EDR, DLP, PAM,...Flexible hoursAfternoon shift
- ...monitoring, triaging, analyzing and escalating incidents and events in the technology environment. This Senior SOC Analyst will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS/IPS, Firewalls, network traffic logs, cloud platforms, and SOAR...Long term contractHybrid workWorldwide
- ...or other Honeywell sales functions in driving and creating content for thought leadership, strategic cybersecurity planning and risk management strategies through a consultative approach. Build value propositions for solutions into the account, serving as the expert for...Work at office
- ...cybersecurity company. Our specialist teams design, engineer and manage solutions that do three things: Promote clarity and trust in a complex... ...analytical and critical thinking abilities to interpret complex data, identify patterns, and extract meaningful insights....Immediate start
- Critical Skills To Possess Education ~ Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or related field ~(or equivalent practical training or certifications). Technical Skills (Foundational Exposure/Knowledge) Basic understanding ...
- ...attacks and malware (Trojans, Ransomware, etc.) analysing event data generated from proxy, endpoints, IDS, MPS, network devices etc.... ...Understanding of traditional ITIL concepts Incident, Change and Problem management. Understanding of Cloud Security Principles (AWS/Google/Azure...Immediate start
