Get new jobs by email
- ...Senior Security Analyst Core Technical Competencies: Operating Systems Expertise:In-depth knowledge of Red Hat Enterprise Linux (RHEL... .... Proficient in cybersecurity tools and frameworks for endpoint security patch management and vulnerability scanning. Strong...SuggestedFull time
- ...Operations Center (CDOC) Senior Analyst you will work in advanced security operations with a focus on SIEM and SOAR technologies driving... ...Chronicle Crowdstrike Logscale Splunk. Strong working knowledge of endpoint security tools and concepts including EDR (CrowdStrike Defender...SuggestedFull timeHybrid workRemote job
- • Designation – IT Security Analyst • Experience: 4 - 5 Years • Location: Pune, India A. Your Skills:• Significant experience in SOC... ...of security technologies, including firewalls, IDS/IPS, SIEM, endpoint detection, anti-malware, and vulnerability assessment tools....SuggestedWork at office
- ...environments, ensuring stability, performance, and adherence to security baselines.- Security Integration: Apply a Cybersecurity mindset... ...remediation.- EDR Management: Provide hands-on administration of Endpoint Detection and Response (EDR) products (e.g., CrowdStrike, SentinelOne...SuggestedHybrid work
- Description : We are looking for a skilled and proactive Security Engineer with strong hands-on expertise in CyberArk (L2/L3) and experience... ...the deployment, administration, and maintenance of CyberArk Endpoint Privilege Manager (EPM).- Provide L2/L3 technical support, root...Suggested
- ...impact. Let me tell you about the role As an Information Security Engineering Specialist, you are responsible for implementing and... ...following areas: Cloud (AWS and Azure), Infrastructure (IAM, Network, endpoint, etc.), or Data (DLP, data lifecycle management, etc.). ~ Deep...SuggestedFull timeHybrid workRelocation packageWork at officeLocal areaRemote jobRelocationFlexible hours
- ...other grow. Position Overview The Manager of Information Security is responsible for overseeing the development implementation and... ...operations of security technologies and tools (e.g. SIEM firewalls endpoint security intrusion detection systems). - Ensure continuous...SuggestedFull time
- ...Description Security Policy Palo alto/NSX-T L3 Network & Access Core Network(Pune India) Looking for a workplace where people realize their full potential are recognized for the impact they make and enjoy the company of the peers they work with Welcome to Zensar!Read...SuggestedFull time
- ...Security consultant (S4HANA & Fiori) SAP Security Consultant with expertise in user access management, role design and compliance enforcement across SAP systems (ECC, S/4 HANA, Fiori, BW, HANA). Skilled in SAP GRC, Segregation of Duties(SoD), and audit support, ensuring...Suggested
- ...Job Description What you will do: Respond to security incidents as part of the Incident Response Team. Research attempted or successful efforts to compromise systems security determines causes of security violations and designs countermeasures. Analyse network access...SuggestedShift work
- We are seeking a passionate and skilled Engineer specializing in Application Security. The ideal candidate will have a solid foundational knowledge in security practices and possess hands-on experience with various security tools and methodologies. This role is essential in...Suggested
- Description : We Are Hiring Security Analyst (Network Security)Location : Kharadi, Pune (Local candidates preferred)Mode : Hybrid (2 days office/week)Joining : Immediate Joiner Only (No bench / No offer shopping)Experience : 3 - 5 YearsType : C2H VodafoneRole : Security Analyst...SuggestedHybrid workWork at officeLocal areaImmediate startShift work2 days week
- ...Job Summary The Information security Sr. Analyst -Incident Response in the computer security incident response team will be responsible for developing and executing standards, procedures and processes to uncover, resist and recover from security incidents. This position...Suggested
- ...The Infrastructure Security Operations Engineer Vulnerability Management SME will be responsible for maintaining and improving Endavas... ...security posture with a primary focus on vulnerability management endpoint security and application control . This role requires expertise...SuggestedFull timeRemote job
- SailPoint Identity Security ConsultantExperience : 4+ YearsLocation : Bengaluru, Hyderabad, PuneNP- Immediate or ServingAs a SailPoint Identity Security Consultant, you will be responsible for designing, deploying, and managing SailPoint identity solutions to ensure our clients...SuggestedImmediate start
- ...diverse client environments, maintaining client-specific processes, reporting standards, and access protocols to help improve their security posture- Research and develop innovative techniques, tools, and methodologies for penetration testing services, alongside commitment...
- In this Role, Your Responsibilities Will Be: Analysis of UML diagrams and DFDs/Threat Models for security flaws and detailing specific recommendations in software and system setup to address them Mentoring of developers on security topics and coding Develop and...Full timeTemporary workHybrid workNo agencyWork at officeLocal areaRemote jobWork from home
- ...Senior Security Analyst - AI - Cybersecurity Controls focusing on AI/ML systems. RIN Reporting to the AI Security Advisor the AI Security Analyst focus on the effectiveness of controls that are implemented to mitigate the risks agains AI/ML systems. This role blends cybersecurity...Full timeFlexible hours
- ...you and you're excited to join our journey, please review the job description below : We are seeking a detail-oriented and experienced Security Engineer to join our IT team. As a Security Engineer, you will be responsible for managing identity and access controls and...Full time
- ...Design and build custom parsers for diverse log formats, threat feeds, and telemetry sources.- Develop integration guides for connecting security tools with external systems (e.g , cloud platforms, identity providers, ticketing systems).- Write technical documentation for parser...
- ...Job Summary If you are a cyber security professional looking for an opportunity to grow, Emerson has an exciting opportunity for you! You will be responsible for coordinating and promoting product security activities across multiple product development teams. The Product...Full timeNo agencyFlexible hours
- ...In This Role, Your Responsibilities Will Be: • Work directly with other global product security leaders to develop and execute product security strategies • Research security best practices on pc and web application security to stay current on the latest threats...Full timeLocal areaFlexible hours
- ...The Information Security Analyst will focus on real-time alert monitoring and incident response utilizing tools such as SIEM MDR network monitoring email security and phishing detection systems. They will analyze security alerts to determine the nature and severity of potential...Full timeLocal areaImmediate startRemote job
- Summary :- Evaluates, tests, recommends, develops, coordinates, monitors, and maintains infrastructure security policies, procedures and systems, including hardware, firmware and software .- Ensures that infrastructure security architecture/designs, plans, controls, processes...Local area
- ...Defense Operations Center (CDOC) Specialist you will lead advanced security operations with a focus on SIEM and SOAR technologies driving... ...Crowdstrike Logscale Splunk. Strong working knowledge of endpoint security tools and concepts including EDR (CrowdStrike Defender...Full timeHybrid workRemote job
- ...Description The Senior Pen Tester is responsible for conducting security pen testing monitoring and auditing within a dynamic global organization. The products under test will have the coverage of embedded devices and cloud services. The Senior Pen Tester should have exposure...Full time
- ...Complex Computing Environment. Analysis and response of detected security incidents, timely escalation and drive to ensure the closure of... ..., Ransomware, etc.) analysing event data generated from proxy, endpoints, IDS, MPS, network devices etc. Minimum Qualification –...Permanent employment
- ...Job Summary The Enterprise Security Posture Management Analyst will oversee the identification, assessment, and mitigation governance of vulnerabilities and configuration weaknesses across on-premises, cloud, and hybrid environments to ensure robust security posture and...Hybrid work
- ...Join us as a “Security Application Support Analyst " at Barclays, where you'll spearhead the evolution of our digital landscape, driving innovation and excellence. You'll harness cutting-edge technology to revolutionise our digital offerings, ensuring unapparelled customer...Permanent employmentImmediate startShift work
- ...and water. We create a more resourceful world to protect essential resources for today and tomorrow. Join us. Title : Information Security Specialist (Application Security II). Location : Pune India. Itrons Resiliency Solutions business helps make communities more...Full time
