Get new jobs by email
- Key Responsibilities: Perform forensic acquisition and analysis of various digital media, including: RAID-configured storage systems (RAID 0/1/5/6/10) Mobile devices (iOS, Android) Hard drives, SSDs, USB devices, memory cards Use forensic tools to image, recover...Suggested
- ...in a deep variety of business-critical activities that keep our company running efficiently. From strategic marketing and financial management to human resources and operational oversight, you'll have the opportunity to optimize processes and implement game-changing policies...Suggested
- Digital Forensics Analyst Start Date Starts Immediately CTC (ANNUAL) Competitive salary Competitive salary Experience ...SuggestedImmediate startFlexible hours
- ...security (AWS/Azure firewalls, cloud-native security tools). Your Profile ~4-12 years of experience in designing, deploying, and managing enterprise firewalls Palo Alto Networks (PAN-OS, Panorama), Check Point (R80.x, SmartConsole, SmartEvent), Cisco ASA/Firepower (FTD,...Suggested
- ...Summary Position Summary Manager, Network Architect – Technology & Infrastructure Deloitte Technology & Infrastructure (T&I) is the engine of the Deloitte network. Our professionals reach across disciplines and borders to develop and lead global initiatives. We...SuggestedShift work
- ...Core Focus: Enterprise network operations and security administration Key Technologies: Palo Alto, Arista Primary Objective: Manage, secure, and maintain network infrastructure with strong firewall and switching expertise Responsibilities: Administer and secure...SuggestedPermanent employment
- ...Improvement Heartfelt Personal Touch Ethical Empathetic Care Real Accountability Service Excellence Job Title: Senior Manager - Regional Call Center Location: Kauvery Hospital, Trichy! Position Type: Full-time Job Summary: We are seeking a...SuggestedFull time
- ...and conduct user acceptance testing (UAT), ensuring that solutions meet business requirements before deployment. Support Change Management Initiatives: Guide business partners through changes brought about by the implementation of new technologies, assisting in training,...SuggestedHybrid workWork at officeLocal areaRemote job
- ...workflows, retail/e-commerce systems, and technical understanding of integrations. Responsibilities SaaS Application & Vendor Management Manage and administer various SaaS applications used across the organization. Serve as the Business Point of Contact (POC) for...Suggested
- ...join Aon's growing internal penetration testing team. The IT Manager-Information Security will work closely with various cross-organizational... ...a key resource for guiding proper remediation of identified vulnerabilities. GENERAL DESCRIPTION OF ROLE: Aon is seeking a driven...SuggestedFull timeHybrid work
- Are you passionate about uncovering security vulnerabilities before malicious actors can exploit them Join our Security Team at Swiss Re as a... ...lessons learned sessions for IT developers and relevant partners Manage relationships with internal stakeholders and external security...SuggestedLong term contractFlexible hours
Rs 3 - 6 lakhs p.a.
...The Enterprise IT Service Desk Workstation Vulnerability Analysts role is to help secure the company's workstations against vulnerabilities... .... Provide support to other teams on vulnerability management best practices. Required Education and Experience: ~ An...SuggestedShift work- ...software as a service ('SaaS') platform enables dealerships to manage their end-to-end business operations including the acquisition,... ...across CDK, and collaborate with our DAST team to convert recurring vulnerabilities into automated test cases. This position is a key part of...SuggestedVisa sponsorship
- ...As a Business Systems Analyst, you bridge the gap between business users and technical teams, driving innovative solutions for Order Management. We are seeking a highly motivated and experienced Business Systems Analyst to join our Order Management team. You will play a...SuggestedRelocation
- ...and compliance solutions. The ideal candidate will uncover vulnerabilities, simulate attack scenarios, and work with our teams to fortify... ...interactions, and interprocess communications. Test agent privilege management and evaluate risks of escalation or exploitation. Data...SuggestedRemote job
- ...penetration tests on AGCO’s products (web, sw, and hw) Research and design tools and methodologies to identify security findings (vulnerabilities) and/or gaps in AGCO products and systems. Develop, maintain, and improve test strategies, methodologies, processes,...WorldwideFlexible hours
- ...web application and wireless penetration testing and related technical security assessments. • Collaborate with clients, project management, and engagement leaders to identify, develop, and obtain information for developing approach proposals. • Assist in the...
- ...while building a healthy and financially secure workforce by unifying the benefits ecosystem across health, wealth, wellbeing, absence management and navigation. With a comprehensive total rewards package, continuing education and training, and tremendous potential with a...For contractorsFor subcontractorLocal areaWorldwide
Rs 3.5 - 13.5 lakhs p.a.
...Wireless / RCPE Professional-Level Certification in WAN Optimization / ACCP / CCNP Service Provider Delivery Skills: 1. Technology Management: Responsible for overall network technology management for the business. Responsible for planning and execution of new technology...Shift work- ...279;#120306;#120320;#120304;#120319;#120310;#120317;#120321;#120310;#120316;#120315; We are hiring Experienced Managers for IT Audit (2LoD) to provide real-time support, guidance, and coaching to audit engagement teams. The role focuses on enhancing audit...Full time
- ...exciting opportunity exists to join Flutter's Internal Controls Assurance team. We are seeking to hire a talented Internal Controls Senior Manager to join the team. The ideal candidates will have experience working in an IT Controls function for a major multinational company or...Long term contractTemporary workHybrid workWork at officeWorldwideHome office2 days week
- ...procedures. Ability to perform complex troubleshooting of security vulnerabilities. OSCP, ECSA, LPT Master, GPEN or any other industry... ...Provide remediation guidance to identified vulnerabilities. Managing the Statutory and Internal Auditors on Application Security....
- ...pentesting certifications. Red/Purple team experience. Strong understanding of attack paths and adversary emulation. Enterprise vulnerability management experience (vulnerability research, scanning, operational process). Wider SDL activities such as threat/attack modelling...Permanent employment
Rs 4 - 12 lakhs p.a.
...ideal candidate will perform advanced penetration tests, identify vulnerabilities, and provide actionable recommendations to improve system... ...security. This role involves collaborating with internal teams and managing third-party testing engagements to ensure comprehensive...Rs 33.8 lakh p.a.
...products, which help the world's largest companies to monitor and manage their mainframe systems. The modernization of mainframe is the... ..., you will assess application-layer security risks, identify vulnerabilities in product implementations, and lead secure architecture reviews...Hybrid work- ...a highly skilled Security Engineer to design, implement, and manage the security architecture of our organization. The ideal candidate... ...mitigation . 5. VAPT & IT Security Operations Perform Vulnerability Assessments & Penetration Testing (VAPT) on infrastructure,...Full timeHybrid workWork at office
- ...penetration testing and ethical hacking activities to identify vulnerabilities and potential weaknesses for exploitation. The Penetration... ...cybersecurity defenses. Key responsibilities: Plans, executes and manages complex penetration testing engagements on various IT assets,...Hybrid workRemote job
- ...evaluate the security of the system. Not to be confused with a vulnerability assessment. The test is performed to identify both weaknesses... ...strategies Research, document and discuss security findings with management and IT teams Review and define requirements for information...Permanent employmentFull timeWork at officeLocal areaImmediate startRemote jobFlexible hoursWeekend work
Rs 8 - 12 lakhs p.a.
Your Experience and Qualifications ~3 8 years of product security experience in IoT, connected vehicles, or embedded systems. ~ Strong familiarity with OWASP Top 10, OWASP IoT Top 10, and CWE Top 25. ~ Proven expertise in penetration testing methodologies and tools for...WorldwideFlexible hours- ...influence strategic security direction, ensure threat‑aligned coverage of critical systems, and partner closely with teams such as Vulnerability Management, Application Security, CTEM, BU CISOs/BISOs, and senior technology Some other highly valued skills may include: OSCP/...Long term contractTemporary work
