Average salary: Rs2,061,666 /yearly
More statsGet new jobs by email
- ...communication skills Ability to work effectively with global, virtual teams High degree of initiative and self-motivation. Ability to manage multiple priorities successfully. Team-oriented, with a focus on achieving team goals. Strong presentation and public speaking...Suggested
- ...analytics solutions using Databricks, Power BI, and other modern data management tools. Leverage data virtualization, ETL, and semantic... ...develop solutions based on best practices for data governance, security, and compliance within Databricks and Power BI environments....Suggested
- ...ABOUT THE ROLE The Senior Manager Information Security is responsible for leading the security automation product team and driving the development, integration and continuous improvement of a security automation platform. This role combines strong leadership, technical acuity...Suggested
- ...Job description Own and manage the contractual certification requirements like SOC1, SOC2, ISO27001, HIPAA, and PCI DSS Plan and conduct internal reviews and audits in line with SOC1, SOC2, ISO27001, HIPAA, and PCI-DSS. Serve as a subject matter expert on at least...Suggested
- ...Role Overview: We are seeking a vigilant and proactive Security Manager to oversee and enhance the security operations within our organization. The ideal candidate will be responsible for developing and implementing security policies, managing security personnel, and ensuring...Suggested
- ...Key Responsibilities: Monitor and respond to alerts from SIEM systems (e.g., Splunk, Microsoft Sentinel, QRadar) and other security monitoring tools. Analyze and investigate potential security incidents , perform root cause analysis, and escalate as needed. Assist...Suggested
- ...Key Responsibilities: Monitor security alerts and logs from various sources such as SIEM, IDS/IPS, firewalls, and endpoint protection... .... Conduct vulnerability assessments and support patch management processes. Maintain documentation for incidents, investigations...SuggestedShift work
- ...The Splunk Global Security (SGS) organization is seeking a Technical Program Manager (TPM) to drive projects and programs across SGS as well as with teams outside of SGS. This role is ideal for anyone with some years of experience as a TPM. This role requires the TPM...Suggested
- ...guidance on vulnerability remediation Drive the development of new security engineering projects Work with upstream open source projects... ...great engineering and organisational practices Plan and manage progress on agreed goals and projects Be an active part of the...SuggestedLocal areaWorldwide
- ...Responsibilities Develop and execute program charters, plans, and timelines. Implement project management tools and methodologies for effective execution, setting priorities, tracking progress, and managing dependencies. Set up regular execution rhythms such as weekly...Suggested
- ...Plan, track, and report progress against key deliverables and goals . Guide the team's work to align with stringent product security requirements such as FIPS, CIS, STIG, FedRAMP, and the Cyber Resilience Act (CRA). Support cryptography and compliance initiatives...SuggestedRemote job
- ...hybrid, multi-cloud world. Leading enterprises use our unified security and observability platform to keep their digital systems secure... ...Security (SGS) organization is seeking a Senior Service Delivery Manager (SDM) (working with the Senior Director of Strategy, Planning &...SuggestedHybrid work
- ...in more @ , , , The Role As part of the Risk & Compliance team within the Engineering division at Zeta, the Application Security Manager is tasked with safeguarding all mobile, web applications, and APIs. This involves identifying vulnerabilities through testing and...Suggested
- ...Experience 8-10 years of relevant experience preferably in Direct Sales. Industry Surveillance Projects & Products like Video Management Software, Surveillance Cameras, Access Controls, and BMS. Person working with System Integrator with direct selling experience will...SuggestedFor contractors
- ...Job Responsibilities Manage a team of senior Networking and Security personnel. Serves as the subject matter expert (SME) on Cloud networking and security, having previously worked in a senior technical network or security role. Help deliver and manage projects that...Suggested
- Implement threat management strategies, standards, procedures and accountability policies at enterprise-level to prevent internal or external... ...and management of the Cyber Command Center or other Cyber Security domains. Lead efforts to operationalize security incident detection...
- ...IS Specialist OT Security What you will do Let's do this. Let's change the world. In this vital role you will be responsible for developing... ...of OT environments by integrating security monitoring, risk management, and compliance efforts into industrial operations. The OT...
- ...Own product security of the SingleStore platform offering Prioritize features on your roadmap Contribute to the overall security vision... ...to communicate complicated concepts clearly Ability to manage your workload within a fast-paced, energetic, and dynamic workplace...
- ...impact Strategically engage with all levels of professionals and managers across the enterprise • Serve as an expert advisor to leadership... ...to both technology and business partners ~2+ years of Cloud security ~2+ years of implementing service accounts, workload...Long term contract
- ...SOC Analyst (Security Operations Center Analyst Level 2)5+ Yrs. of hands on experience, Full time Hyderabad, work from office, Notice... ...L1 analysts. o Utilize SIEM (Security Information and Event Management) tools (e.g., Splunk, QRadar, Sentinel), EDR (Endpoint...Full timeWork at officeImmediate startShift work
- ...threat detection and incident response. Key Responsibilities: Monitor SIEM alerts and perform triage. Investigate and escalate security incidents. Conduct threat intelligence analysis. Assist in disaster recovery planning Skills Required: Experience with...
- ...and configuring certification campaigns o Troubleshooting, monitoring, logging and audit events Optional o Identity Access Management o App Servers o Sailpoint, XSD, HTML, Application onboarding o Implementing upgrades Experience with IIQ, Sailpoint,...
- ...Proficient with managing endpoint protection tools- (Prisma Palo alto global protect VPN, EDR) Identify, diagnose, and solve malware related... ..., and address them by implementing required adjustments to security solutions. Windows OS administration knowledge. Basic knowledge...
- ...Key Responsibilities: Monitor security systems and logs (e.g., SIEM, IDS/IPS) for unusual activity and potential threats. Investigate and respond to security incidents and alerts in real time. Perform vulnerability assessments and assist in remediation efforts....
- ...Incident Documentation : Review security incidents and vulnerabilities, documenting all findings clearly and accurately. Ensure that... ...and platforms (such as SIEM, ticketing systems, vulnerability management tools) to document and track findings. Required Skills and Qualifications...
- ...We are hiring a Security Analyst to work on our growing IT Security team This position will primarily monitor our computer networks... ...and improve the configuration of our centralized log and alert management systems Stay current on IT security trends and news Assist...
- ...organization systems and cloud environments Resolve information security incidents, including targeted threats and internal incidents... .../standard operating procedure(SOP) regarding threat management, including policies and procedures Assist technology teams to...
- ...Responsibilities Conduct varied security reviews and assessments to ensure compliance with enterprise standards. Apply security judgment to approve/deny/escalate requests based on risk and policy alignment. Collaborate with internal teams, vendors, and business units...
- ...At least two-year experience in a similar Information Security position Vulnerability research skills Experience in security assessments... ...Experience in the following areas: Vulnerability management Risk management Qualifications Desired Security Certification...
- ...About the job This global leadership role in cyber security is to manage the Security Operations (SecOps) team responsible for design, implementation and evolution of Canonical security practices, techniques, tools, systems and policies. The team is the primary owner of strategy...