Get new jobs by email
- ...Security Firmware Engineer - Embedded System We are seeking a highly motivated and skilled Security Firmware Engineer to join our team in Hyderabad, Telangana. You'll contribute to the development of cutting-edge security solutions, taking responsibility for designing, developing...Suggested
- ...Job Description: SOC Security Analyst (L2) will be responsible for responsible for day-to-day security threat monitoring and analysis.... ...Support in resolving security incidents. Monitor networks and systems for potential threats. Knowledge of network data flows, ports...SuggestedShift work
- ...your primary responsibilities are to implement a comprehensive security monitoring, incident response and threat intelligence program for... ...documentation and audit artifacts Identify and track suspicious system activity Identify trends and patterns, and present them to...Suggested
- ...Skills: Cybersecurity Strategy, Design, Incident Response, Security Operations, Risk Management, Cloud Security, Threat Intelligence,... ...Oversee the deployment of advanced threat detection and response systems, ensuring proactive identification and mitigation of security...Suggested
- ...device or app. Our Workforce and Customer Identity Clouds enable secure yet flexible access, authentication, and automation that transforms... ...belongs to you. Okta has an opening for a Manager of People Systems within our Business Technology Organization. Working directly with...SuggestedFull timeWork at officeFlexible hoursShift work
- ...goes, so we started Netskope to redefine Cloud, Network and Data Security. Since 2012, we have built the market-leading cloud security... ...troubleshoot problems as they arise, ensuring the highest levels of systems and infrastructure availability of Netskope's production...SuggestedWork at officeImmediate start
- ...Key Design and architect scalable and secure integration solutions for Salesforce with third-party and internal systems using REST/SOAP APIs, ETL tools, and middleware Define and enforce API architecture best practices including versioning, governance, and security protocols...Suggested
- ...Linux, VMWare, AWS, physical servers, and networks. Conducting security assessments through vulnerability testing and risk analysis.... ...and problems. Develops appropriate metrics to measure total system performance. Qualifications Education: An undergraduate degree...Suggested
- ...before Indian Oil Bunk,Bangalore,Karnataka,560078 Role: Computer Systems Validation Lead(Pharma) Location: Bangalore, India Full/... ...business segments covering HVAC, refrigeration, and fire and security. We make modern life possible by delivering safer, smarter and more...SuggestedFull timePart timeFlexible hours
- ...Who we are We're a leading, global security authority that's disrupting our own category. Our encryption is trusted by the major ecommerce... ...companies, the major cloud providers, entire country financial systems, entire internets of things and even down to the little things...Suggested
- ...Policy Adherence: Ensure firmware development aligns with Fluke's Security Development Lifecycle (SDL), embedding security best practices... ...in incident response for embedded or firmware-related systems Education: Bachelor's degree in Cybersecurity, Computer Engineering...Suggested
- ...Role & responsibilities About the Role: Uber's Security Response and Investigations (SRI) team is the cybersecurity incident response... ...limited to network protocols (e.g. TCP/IP stack) and security, system security, email security, etc. ~2+ years of hands-on experience...SuggestedShift workSundaySaturday
- ...issues Develop and maintain documentation for onboarding and security processes Continuously improve IAM processes using latest technologies... ...Design, implement, and support secure IAM integrations across systems Collaborate with cross-functional teams to align IAM goals...Suggested
- ...Incident Documentation : Review security incidents and vulnerabilities, documenting all findings clearly and accurately. Ensure that findings... .... Tracking and Follow-up : Maintain a clear and organized system for tracking open findings, vulnerabilities, and remediation...Suggested
- ...that all firmware development processes align with Fluke s SDL (Security Development Lifecycle) policy, actively embedding security best... ...response efforts, particularly in the context of firmware or embedded systems. Education B.S. Degree in Cybersecurity, Computer...Suggested
- ...We are hiring a Security Analyst to work on our growing IT Security team This position will primarily monitor our computer networks and... ...the configuration of our centralized log and alert management systems Stay current on IT security trends and news Assist with the...
- ...Role Overview: We're hiring a Security Specialist to safeguard our trading infrastructure, data, and systems. The role involves proactive threat monitoring, incident response, security audits, and ensuring regulatory compliance in a fast-paced trading environment. Key...Full time
- ...A Day in Your Life at MKS: As a Principal Business Systems Analyst at MKS, you will have deep knowledge of SAP Finance (FI) and Controlling... ...financial information, and/or the ability to maintain physical security and safety. Because this position involves the above material...Work at office
- ...Work at the forefront of designing an innovative threat and security incident management solution Develop and optimize SOAR playbooks... ...of the organization, ensuring seamless interoperability between systems. Participate in a 24x7 coverage model to prevent and remediate...Full time
- ...As a Security Engineer in GCDI's Threat Management Center, you will be an integral part of a technical team that is responsible for providing... ...of the organization, ensuring seamless interoperability between systems. Participate in a 24x7 coverage model to prevent and...Full time
- ...Eurofins is ramping up the Security Operations Center and has a need to extend the L2 incident resolvers team. The person working in L2... ...oriented. Excellent communication with technical leaders. Systems Thinking - the ability to see how parts interact with the whole...Shift work
- ...platform combines best-in-class data protection, exceptional data security, advanced data intelligence, and lightning-fast recovery across... ...the company to coordinate efforts to protect critical systems and processes Communicate vertically and horizontally to keep...Fixed term contract
- ...Qualys SCA to identify risks in Active Directory and infrastructure systems. ~ Analyze scan results, validate findings, and prioritize... ...compliance status. Policy & Compliance: ~ Assist in reviewing security policies and ensuring adherence to industry standards like CIS benchmarks...
- ...Role Summary: Implements and manages security measures to protect sensitive data and systems. Key Responsibilities: Monitor systems for breaches and investigate incidents. Install and configure security software (firewalls, encryption). Conduct risk assessments...
- ...highly motivated problem solver to join our Corporate IT Team. A system administrator is a professional who manages, maintains, and troubleshoots... .... The system administrator ensures that the IT infrastructure is secure, reliable, and efficient. What will success look like in this...Flexible hours
- ...We are seeking an experienced SOC Analyst to join our Security Operations team. This role demands an individual with a strong technical... ...integrate new data sources into SIEM and enhance visibility. 3. System and Network Security: Perform continuous monitoring and analysis...
- ~ Experience in Cloud Security or IoT security. ~ Strong in Cloud Security or AWS cloud. ~ Experience in VAPT skills. ~ Conduct Penetration... ...in designing and implementing Identity and Access Management systems using SailPoint/CyberArk/Forgerock ~ Very good Java...
- ...Job description : Experience in SAP Security and with at list one end to end implementation in security and knowledge on Rulesets, Violations... ...Solid understanding of Microsoft Windows Server operating systems, Active Directory, and LDAP Experience with IIS...
- ...Security Requirements Understanding and Test Preparation: Work closely with stakeholders to understand security requirements for various applications and systems, especially in the retail domain . Develop and prepare test scripts to perform security assessments...
- The Security Testing Operations Analyst is a crucial role for the vulnerability management and offensive testing activities across the group... .../ Bug Bounty advantageous! Understanding of enterprise IT system environments Knowledge of security vulnerabilities and common...