Get new jobs by email
Search Results: 3,732 vacancies
- ...Security Firmware Engineer - Embedded System We are seeking a highly motivated and skilled Security Firmware Engineer to join our team in Hyderabad, Telangana. You'll contribute to the development of cutting-edge security solutions, taking responsibility for designing, developing...Suggested
- ...Job Description: SOC Security Analyst (L2) will be responsible for responsible for day-to-day security threat monitoring and analysis.... ...Support in resolving security incidents. Monitor networks and systems for potential threats. Knowledge of network data flows, ports...SuggestedShift work
- ...your primary responsibilities are to implement a comprehensive security monitoring, incident response and threat intelligence program for... ...documentation and audit artifacts Identify and track suspicious system activity Identify trends and patterns, and present them to...Suggested
- ...Skills: Cybersecurity Strategy, Design, Incident Response, Security Operations, Risk Management, Cloud Security, Threat Intelligence,... ...Oversee the deployment of advanced threat detection and response systems, ensuring proactive identification and mitigation of security...Suggested
- ...device or app. Our Workforce and Customer Identity Clouds enable secure yet flexible access, authentication, and automation that transforms... ...belongs to you. Okta has an opening for a Manager of People Systems within our Business Technology Organization. Working directly with...SuggestedFull timeWork at officeFlexible hoursShift work
- ...goes, so we started Netskope to redefine Cloud, Network and Data Security. Since 2012, we have built the market-leading cloud security... ...troubleshoot problems as they arise, ensuring the highest levels of systems and infrastructure availability of Netskope's production...SuggestedWork at officeImmediate start
- ...Key Design and architect scalable and secure integration solutions for Salesforce with third-party and internal systems using REST/SOAP APIs, ETL tools, and middleware Define and enforce API architecture best practices including versioning, governance, and security protocols...Suggested
- ...Leads the design, development, and operational support for backend systems, ensuring system reliability, performance, and security. Guides the team in lifecycle management, incident management, and capacity planning. Oversee the implementation of best practices in system...SuggestedPermanent employmentFull time
- ...before Indian Oil Bunk,Bangalore,Karnataka,560078 Role: Computer Systems Validation Lead(Pharma) Location: Bangalore, India Full/... ...business segments covering HVAC, refrigeration, and fire and security. We make modern life possible by delivering safer, smarter and more...SuggestedFull timePart timeFlexible hours
- ...Who we are We're a leading, global security authority that's disrupting our own category. Our encryption is trusted by the major ecommerce... ...companies, the major cloud providers, entire country financial systems, entire internets of things and even down to the little things...Suggested
- ...Linux, VMWare, AWS, physical servers, and networks. Conducting security assessments through vulnerability testing and risk analysis.... ...and problems. Develops appropriate metrics to measure total system performance. Qualifications Education: An undergraduate degree...Suggested
- ...Policy Adherence: Ensure firmware development aligns with Fluke's Security Development Lifecycle (SDL), embedding security best practices... ...in incident response for embedded or firmware-related systems Education: Bachelor's degree in Cybersecurity, Computer Engineering...Suggested
- ...Role & responsibilities About the Role: Uber's Security Response and Investigations (SRI) team is the cybersecurity incident response... ...limited to network protocols (e.g. TCP/IP stack) and security, system security, email security, etc. ~2+ years of hands-on experience...SuggestedShift workSundaySaturday
- ...issues Develop and maintain documentation for onboarding and security processes Continuously improve IAM processes using latest technologies... ...Design, implement, and support secure IAM integrations across systems Collaborate with cross-functional teams to align IAM goals...Suggested
- ...Incident Documentation : Review security incidents and vulnerabilities, documenting all findings clearly and accurately. Ensure that findings... .... Tracking and Follow-up : Maintain a clear and organized system for tracking open findings, vulnerabilities, and remediation...Suggested
- ...multiple functions (sales channels, product development, product security, and information security) to meet customer and company... ...compliance. Experience with Operational Technologies (e. g. Controls Systems, Building Management) a plus. Customer relations acumen with...
- ...that all firmware development processes align with Fluke s SDL (Security Development Lifecycle) policy, actively embedding security best... ...response efforts, particularly in the context of firmware or embedded systems. Education B.S. Degree in Cybersecurity, Computer...
- ...degree required. • Deep familiarity with the OWASP Top 10 and other security concerns for web applications • Deep Understanding of OWASP... ...tools • Experience working/integrating with secret management systems. • Advanced knowledge of front-end and back-end web...
- ...We are hiring a Security Analyst to work on our growing IT Security team This position will primarily monitor our computer networks and... ...the configuration of our centralized log and alert management systems Stay current on IT security trends and news Assist with the...
- ...Role Overview: We're hiring a Security Specialist to safeguard our trading infrastructure, data, and systems. The role involves proactive threat monitoring, incident response, security audits, and ensuring regulatory compliance in a fast-paced trading environment. Key...Full time