Average salary: Rs1,816,681 /yearly
More statsGet new jobs by email
- ...Skills: Must be Ex-Army/CPMF/Police Officer, Incident Response, Security Operations, Threat Intelligence, Security Compliance, Identity and Access Management, Responsibilities And Duties Of CCSO To implement the security provisions as laid down in this Manual. To...SuggestedWork at officeImmediate start
- ...Key Responsibilities: Monitor and respond to alerts from SIEM systems (e.g., Splunk, Microsoft Sentinel, QRadar) and other security monitoring tools. Analyze and investigate potential security incidents , perform root cause analysis, and escalate as needed. Assist...Suggested
- ...Key Responsibilities: Monitor security alerts and logs from various sources such as SIEM, IDS/IPS, firewalls, and endpoint protection platforms. Analyze and investigate potential security incidents to determine impact and root cause. Perform initial triage and escalation...SuggestedShift work
- ...Key Deliverables: Oversee day-to-day security operations, ensuring guard deployment and SOP compliance Serve as site-level liaison for client coordination, issue resolution, and service quality Manage incident response, reporting, and ensure statutory documentation...Suggested
- ...Incident Documentation : Review security incidents and vulnerabilities, documenting all findings clearly and accurately. Ensure that findings are categorized, prioritized, and assigned appropriate severity levels. Security Reporting : Prepare detailed reports on security...Suggested
- ...Responsibilities Conduct varied security reviews and assessments to ensure compliance with enterprise standards. Apply security judgment to approve/deny/escalate requests based on risk and policy alignment. Collaborate with internal teams, vendors, and business units...Suggested
- ...conduct while assisting clients and visitors Document daily activities, shift reports, and incident logs diligently Collaborate with supervisors and report absenteeism or operational concerns Ensure consistent adherence to site-specific safety and security procedures...SuggestedShift work
- ...Identify, diagnose, and solve malware related issues as they arise, troubleshoot, and address them by implementing required adjustments to security solutions. Windows OS administration knowledge. Basic knowledge in configuring and troubleshooting various routers, switches,...Suggested
- ...We are hiring a Security Analyst to work on our growing IT Security team This position will primarily monitor our computer networks and IT assets for security issues; install, operate, and maintain security software; and resolve, report, and document any security issues...Suggested
- ...Key Responsibilities: Monitor security systems and logs (e.g., SIEM, IDS/IPS) for unusual activity and potential threats. Investigate and respond to security incidents and alerts in real time. Perform vulnerability assessments and assist in remediation efforts....Suggested
- ...'Must have experience in building authorizations in SAP BTP Security – authorizations management and user management - Must have experience in SAP Security in S/4 HANA end to end implementation / conversion - Good knowledge of SAP areas like Access Control, NetWeaver Security...Suggested
- ...Resilience, etc. Basic understanding of Technology Domains – Identity & Access Management, Change Management, Resilience, Information Security, etc. Basic Knowledge of technologies such as: cloud, mobile, and infrastructure Audit, compliance, quality assurance, or...SuggestedWork at office
- ...Respond to endpoint-related incidents. Maintain awareness of emerging threats Skills Required: Knowledge of Windows/Linux OS security. Experience with endpoint protection platforms (CrowdStrike, Sentinel One). Familiarity with encryption and certificate...Suggested
- ...We are seeking a detail-oriented IBP Security Consultant with 2 to 4 years of experience in managing security and authorizations within SAP Integrated Business Planning (IBP) . The ideal candidate will be responsible for setting up, managing, and maintaining user roles,...Suggested
- ...awaits you at Accor, visit Do what you love, care for the world, dare to challenge the status quo! #BELIMITLESS' Job Description Security Operation Perform duties according to the Duty Roster prepared by the Director of Security. The Security Officer may be deployed...SuggestedImmediate startWorldwide
- ...SOC Analyst (Security Operations Center Analyst Level 2)5+ Yrs. of hands on experience, Full time Hyderabad, work from office, Notice time: Immediate/ASAP Incident Investigation & Analysis: o Conduct in-depth analysis and investigation of security alerts and incidents...Full timeWork at officeImmediate startShift work
- ...Role Summary: Implements and manages security measures to protect sensitive data and systems. Key Responsibilities: Monitor systems for breaches and investigate incidents. Install and configure security software (firewalls, encryption). Conduct risk assessments...
- ...threat detection and incident response. Key Responsibilities: Monitor SIEM alerts and perform triage. Investigate and escalate security incidents. Conduct threat intelligence analysis. Assist in disaster recovery planning Skills Required: Experience with...
- ...proficiency in automation testing with solid knowledge of tools like Cypress . You will have the ability to perform automated API/security testing and possess sound knowledge of database and query languages (SQL) . Familiarity with JIRA for test case management and defect...
- ...application development. Implement and integrate third-party APIs and services as required. Ensure scalability, performance, and security of web applications on Azure and AWS. Debug and resolve issues reported by users or identified through testing. Conduct code...
- ...Responsibilities Perform recurring and on-demand scanning of organization systems and cloud environments Resolve information security incidents, including targeted threats and internal incidents Maintain documentation/standard operating procedure(SOP) regarding threat...
- ...At least two-year experience in a similar Information Security position Vulnerability research skills Experience in security assessments, pentesting web applications and infrastructure. Experience developing security tools and open source projects Attention to detail...
- ...We are seeking a highly skilled Security Architect / Consultant to join our team. The ideal candidate will have experience in SAP security and authorization concepts, along with expertise in various SAP modules and technologies. You will play a key role in ensuring secure...
- ...discovery, classification, and vulnerability assessment. Monitor and analyze database activities to detect and respond to potential security threats and anomalies. Implement data access controls, encryption policies, and masking techniques using Guardium features....
- ...We are seeking an SAP Security Testing Professional with strong comprehension of SAP Security concepts and the ability to troubleshoot SAP authorization issues . The ideal candidate will be highly collaborative, proactive in assisting team members, and flexible to work...Flexible hours
- ...Role & responsibilities ~ Experience: At least 6 years in static code analysis/SAST (Static Application Security Testing), secure coding, and software development. Technical Skills: Proficiency in static code analysis tools (e.g., SonarQube, Veracode, Checkmarx) and...
- ...Role & Responsibilities We are looking for a Static Code Analysis / SAST Specialist with deep expertise in secure coding and static application security testing (SAST). The ideal candidate will have hands-on experience using industry-leading tools and be capable of performing...
- ...and Experience Required : ~ Bachelors degree in information technology or related field ~5-9 years of experience in Salesforce security, with a focus on securing Salesforce platforms like Sales Cloud, Service Cloud, Marketing Cloud, and other Salesforce applications...Immediate start
- Job Description Responsibilities Application onboarding/integration with delimited, JDBC, Active Directory connectors. Defining rules, access controls, user policies, provisioning plans, custom connectors. SailPoint Application integration. Scheduling and configuring...
- ...We are looking for a skilled Networking Professional with strong experience in network security, routing, and switching. The ideal candidate will be responsible for maintaining and securing the organization's network infrastructure, ensuring high availability, performance,...