Cutshort logo
Physical security Jobs in Bangalore (Bengaluru)

11+ Physical security Jobs in Bangalore (Bengaluru) | Physical security Job openings in Bangalore (Bengaluru)

Apply to 11+ Physical security Jobs in Bangalore (Bengaluru) on CutShort.io. Explore the latest Physical security Job opportunities across top companies like Google, Amazon & Adobe.

icon
Bangalore
5 - 10 yrs
₹15L - ₹30L / yr
Information security
ISO/IEC 27001:2005
HIPAA
Systems Development Life Cycle (SDLC)
Physical security
+7 more

What are we looking for?

An enthusiastic individual with the following skills. Please do not hesitate to apply if you do not match all of it. We are open to promising candidates who are passionate about their work and are team players.

Key Responsibilities & expectations from the candidate 

  • Must have strong experience in Information Security Management system(ISMS), creation of policy, procedures and implementation.
  • Operates as a key contributor to the RFP, Third-Party Risk assessment, cloud security assessment etc.
  • Lead the strategic and tactical development of information security framework, risk management and new compliance initiatives
  • Subject matter expertise in ISO 27001, SOC2, CCPA, CPRA, GDPR, PCI DSS and HIPAA.
  • Must have a strong experience in the documentation process and reviewing MSA, SCC, SLA & DPA.
  • Good knowledge of BCP/DR, Incident response, VA/PT and Audit methodologies of various compliance frameworks.
  • Good knowledge of Access management, Network, Application Security, Encryption, Backup, Physical Security, ISMS Training & Awareness etc..
  • Ability to deal with the customers and vendors on Security and privacy matters.
  • Knowledge of Core IT processes, SDLC, network infrastructure will be useful.

Personal Attributes

  • Good written, oral, and interpersonal communication skills.
  • Ability to conduct research into IT security issues
  • Ability to present ideas in business-friendly and user-friendly language.
  • Ability to effectively prioritize and execute tasks in a high-pressure environment.
  • Highly self-motivated and hardworking.

Qualification and certification 

  • Bachelor’s/master's degree in Security, Computer Science, Management Information Systems, Engineering or related field.
  • Should be at least ISO 27001 lead auditor or lead implementer. 
  • 3+ years of related work experience in information security governance, risk and compliance (GRC) or relevant compliance roles in the SaaS industry.

What can you look for?

A wholesome opportunity in a fast-paced environment that will enable you to juggle between concepts, yet maintain the quality of content, interact, and share your ideas and have loads of learning while at work. Work with a team of highly talented young professionals and enjoy the benefits of being here.

We are

It is a rapidly growing fintech SaaS firm that propels business growth while focusing on human motivation. Backed by Giift and Apis Partners Growth Fund II, Company offers a suite of three products - Plum, Empuls, and Compass. Company  works with more than 2000 clients across 10+ countries and over 2.5 million users. Headquartered in Bengaluru, Company  is a 300+ strong team with four global offices in San Francisco, Dublin, Singapore, New Delhi.

Way forward

We look forward to connecting with you. As you may take time to review this opportunity, we will wait for a reasonable time of around 3-5 days before we screen the collected applications and start lining up job discussions with the hiring manager. We however assure you that we will attempt to maintain a reasonable time window for successfully closing this requirement. The candidates will be kept informed and updated on the feedback and application status.

 
Read more
Upswing Financial Technologies Private Limited

at Upswing Financial Technologies Private Limited

2 candid answers
4 recruiters
Simran Bindra
Posted by Simran Bindra
Bengaluru (Bangalore)
3 - 6 yrs
Best in industry
Linux/Unix
Linux administration
Information security
Network Security
skill iconDocker
+4 more

At Upswing, we are committed to building a robust, scalable & secure API platform to power the world of Open Finance.

We are a passionate and self-driven team of thinkers who aspire to build the rails to connect the legacy financial sector with financial innovators through a simple and powerful banking-as-a-service (BaaS) platform.

We are looking for motivated engineers who will be working in a highly creative and cutting-edge technology environment to build a world-class financial services suite.

 

About the role

As part of the DevSecOps team at Upswing, you will get to work on building state-of-the-art infrastructure for the future. You will also be –

  • Managing security aspects of the Cloud Infrastructure 
  • Designing and Implementing Security measures, Incident Response guidelines 
  • Conducting Security Awareness Training
  • Developing SIEM tooling and pipelines end to end for vulnerability/security/incident reporting 
  • Developing automation and performing routine VAPT for Network and Applications
  • Integrating with 3rd party vendors for the services required to improve security posture 
  • Mentoring people across the teams to enable best practices 

What will you do if you join us?

  • Engage in a lot of cross-team collaboration to independently drive forward DevSecOps practices across the org 
  • Take Ownership of existing, ongoing, and future DevSecOps initiatives 
  • Plan and Engage in Architecture discussions to bring in different angles (especially security angles) to the table
  • Build Automation stack and tools for security pipeline 
  • Integrate different security measures and pipelines with the SIEM tool
  • Conducting routine VAPT using manual and automated workflows, generating and maintaining the report for the same
  • Introduce and Implement best practices across teams for a great security posture in the org

 

You should have

  • Curiosity for on-the-job learning and experimenting with new technologies and ideas
  • A strong background in Linux environment
  • Proven experience in Architecting networks with security first implementation
  • Experience with VAPT tooling for Networks and Applications is required 
  • Strong experience in Cloud technologies, multi-cloud environments, and best practices in Cloud 
  • Experience with at least one scripting language (Ruby/Python/Groovy)
  • Experience in Terraform is highly desirable but not mandatory
  • Some experience with Kubernetes, and Docker is required 
  • Understanding Java web applications and monitoring them for security vulnerabilities would be a plus 
  • Any other DevSecOps-related experience will be considered


Read more
Emids Technologies

at Emids Technologies

2 candid answers
Darshan K
Posted by Darshan K
Bengaluru (Bangalore)
7 - 14 yrs
Best in industry
Information security
Implementation
Risk Management
Cyber Security
ISO 27001:2013
+7 more

Experience:- Overall 10 to 12 years of experience of which atleast 5 to 7 years’ experience should be in Information Security. Mandatory is 5 to 7 years’ experience in Information security and with one full end to end implementation experience.

Base location: - Bengaluru - Must

Requirements: -

  1. Mandatory - ISO 27001:2013 lead implementor certified
  2. Mandatory - ISO 27001:2013 lead auditor certified (but if it is a good candidate, we can still consider)
  3. Good to have – CISA, CISM, Risk management certification, Privacy certifications.
  4. Mandatory - Atleast one end to end implementation experience of ISO 27001 standard. The candidate should have a good implementation knowledge of ISO 27001, ISO 27002 standards and is required to implement the ISO requirements and run the ISMS program for multiple countries.
  5. This immediate requirement is for implementing the ISMS program for our Canadian office location. The candidate should be willing to work from Bengaluru in EST time zone during this implementation phase whenever required.
  6. Good documentation skills.
  7. Develop, implement, maintain, review and continually improve Information Security policies.
  8. Good understanding and knowledge of applicable legal and regulatory requirements as relevant to information security.
  9. Manage and maintain a risk register / risk database along with risk treatment plans.
  10. Good understanding of physical and environmental security.
  11. Conduct Internal Audits based ISO 27001 standards and Personal Data Protection policies. A good experience in independently conducting Internal and supplier audit with respect to information security.
  12. Provide training to the employees on Privacy & Information Security Management System on regular intervals.
  13. The greater part of the job involves interacting with people, interviewing them / auditing, Preparing audit reports, discussing / persuading / influencing.
  14. Mandatory: Good verbal and written communication skills. Eye for details.
  15. Good presentation skills.
  16. Since this is a trusted role, candidates must be willing to undergo extensive background checks to verify their identity, character, qualifications, skills and experience.
Read more
Bengaluru (Bangalore)
4 - 10 yrs
₹11L - ₹20L / yr
IT security audit
ISO/IEC 27001:2005
ISMS implementation

1) Determine client needs and expectations and participate in the development of the overall client service plan. Analyse, develop, and implement information security programs, including organizational design and key processes for our clients as per plans

2)Design and develop cyber security strategies and programs for large and complex organizations

3)Define and implement cyber risk management structures, governance models, organizational transformations in the areas of cyber security

4)Develop security policies, processes, procedures. Map controls and compliance requirements. Responsible for risk assessments, gap analysis (against standards and benchmarks), risk mitigation strategy development.

4)Roll out the GRC Cybersecurity controls framework while balancing the approach with end user experience and compliance

5)Develop and tailor approaches, methods and tools to support clients cyber risk programs and initiatives

6)Provide strategic and operational advice in the areas of safeguarding critical information. Identify areas requiring improvement in the client's business processes to enable preparation of recommendations. 7)Evaluate, implement and operationalize security controls, define metrics for measure performance and establish a framework for continuous monitoring and improvement and Play substantive role in internal and external client relationship and communication

8)Interact with CxOs to define the roadmap for GRC strategy.

9Help build Cyber Transformation practice by getting involved in areas beyond engagement delivery such as pre-sales, RFP response, solution designing, competency development and Go to market strategies

10)Create or help create though leadership content in the emerging areas of Cyber Strategy and Risk Transformation .


Immediate Joiners

Read more
Bengaluru (Bangalore)
4 - 10 yrs
₹15L - ₹18L / yr
IT Recruiter
Recruitment/Talent Acquisition
Talent Acquisition
Technical Recruiter
Github
+4 more
  • Coordinate with global hiring managers to identify staffing needs
  • Determine selection criteria
  • Source potential candidates through online channels (e.g. social platforms and professional networks)
  • Plan interview and selection procedures, including screening calls, assessments, and in-person interviews
  • Assess candidate information, including resumes and contact details, using our Applicant Tracking System
  • Design job descriptions and interview questions that reflect each position’s requirements
  • Lead employer branding initiatives
  • Organize and attend job fairs and recruitment events
  • Forecast quarterly and annual hiring needs by department
  • Foster long-term relationships with past applicants and potential candidates

 

Who we have in mind: 

  • Proven work experience as a Talent Acquisition Specialist or similar role
  • Familiarity with social media, resume databases, and professional networks (e.g. LinkedIn, https://resources.workable.com/tutorial/post-a-job-on-stackoverflow">Stack Overflow, and Github)
  • Hands-on experience with full-cycle recruiting using various interview techniques and evaluation methods
  • Knowledge of Applicant Tracking Systems (ATSs)
  • Excellent verbal and written communication skills
  • A keen understanding of the differences between various roles within organizations

Education: Must have a bachelor’s / Master’s degree in Management preferably in Human Resources, Business, or any other related field from a premier institute.

Experience: A candidate for the position will demonstrate a minimum of 4 years of relevant working experience in the IT industry.

Communication Skills: The position demands constant interactions with employees, management, and stakeholders and, therefore, excellent communication skills are an absolute necessity.

Computer Knowledge: A candidate for this position must be proficient in the use of MS Word, Excel, and PowerPoint, all necessary for the creation of not only visually but verbally engaging materials, reports, presentations, and proposals for departmental heads and management, stakeholders.


Interpersonal Skills
:

  • He should also possess good
  • Verbal and non-verbal communication.
  • Listening skills.
  • Assertiveness.

 

 

Read more
A leading IT company
Bengaluru (Bangalore)
2 - 5 yrs
₹6L - ₹12L / yr
Information security
ISO/IEC 27001:2005
HIPAA

The Role

We are looking foran Information Security Analyst – Compliance to primarily strengthen our practice towards compliances such as HIPAA, HITRUST,etc. and ensure highest levels of security around sensitive data.

  • Identifying new risks and performing risk assessments.
  • Performing continuous gap analysis.
  • Auditing the applications, configurations, and internal practices against standards such as HIPAA, HITRUST etc.
  • Providing advice and implementing forward-thinking information security policies, procedures, and standards.
  • Assisting several teams (internal and external) with best practicesand security consultations.
  • Supporting with other information security activities as assigned.
  • Ensuring the organizational compliance during audits and certification efforts.

Requirements:

  • Demonstrated experience in implementing and maintaining security standards such as HIPAA, HITRUST, SOC2, ISO 27001 etc.
  • Ability to understand and interpret legal, regulatory, and contractual compliance requirements.
  • Experience in InfoSec policy creation and documentation.
  • Ability to understand technology and pertaining risks.
  • Knowledge on IT, Servers, SDLC, Database, etc.
  • Experience working with / securing cloud-based applications is an add-on.
  • 2+ years of experience.
  • Excellent written and verbal communication skills.
  • Relevant Security Certifications will be a good add-on.
Read more
Bengaluru (Bangalore)
1 - 3 yrs
₹3.5L - ₹5.5L / yr
Content Writing
Vlogs
Blogs
Social media content
SEO content
  • Create content marketing campaigns to drive leads and subscribers 
  • Regularly produce various content types, including email, social media posts, and blogs
  • Actively manage and promote our blog, and pitch articles to relevant third-party platforms
  • Edit content produced by other members of the team
  • Collaborate with other departments to create innovative content ideas
    Create quirky content for Insta, Facebook posts.

Skills-

  • Bachelor’s degree in English, Journalism or related field
  • Knowledge of digital marketing tactics, including SEO, email marketing, and social media marketing (Preferred)
  • Excellent writing skills, as well as the ability to communicate and collaborate effectively
  • The ability to consistently meet tight deadlines

 

Read more
Bengaluru (Bangalore)
3 - 7 yrs
₹5L - ₹15L / yr
Network Security
Web application security
Cyber Security
Description :

We are looking for candidates with the below experience.

- Mandatory experience on any of

a) Cylance Protect and Optics

b) Crowdstrike Falcon Insight

c) Sentinel One ActiveEDR

d) Carbon Black EDR

- Hands-on experience in security incident response lifecycle and its phases

- Should have experience in L1 and L2 in EDR

- Hands-on experience in event and log analysis on Windows endpoints

- Overall experience: 3-7 years, Relevant experience: 2+ years

Please note : Candidate should have experience in the below skills must :

- EDR Experience

- EDR Product Worked on and which level of support they are working on

- Incident Response

- Malware Analysis

- Flexible for shifts
Read more
Hyderabad, Pune, Bengaluru (Bangalore)
10 - 16 yrs
₹15L - ₹30L / yr
Network Security
Security
Web application security
skill iconJava
skill iconPython
- 10+ Years of experience in a technical position helping enterprise customers.

- 5+ Years of leading an engagement.

- 5+ Years developing and implementing security operations and technology in large, complex enterprises in multiple industry verticals, across a wide range of technology platforms.

- 4+ Years on any Cloud Platform (AWS, Azure, Google, others).

- Master's or Bachelor's degree in Information Science / Information Technology, Computer Science.

- Deep hands-on experience leading the design, development and deployment of business software at scale.

- Experience with service-oriented architectures, private and public clouds and web services security.

- Strong skills in security principles such as least privilege access, defense in depth, preventative vs detective controls, Infrastructure and Network Security, Data protection, and Incident response.

- Professional experience and good technical knowledge of application security, system security, network security, authentication/authorization protocols, and cryptography.

- Experience advising customers on architectures meeting industry standards such as PCI DSS, ISO 27xxx, SOC, HIPAA, GDPR, and NIST/DoD frameworks.

- Experience with enterprise risk management methods and techniques to drive successful outcomes in a global enterprise environment.

- Good understanding of Enterprise Networks, Security and Identity Access Management.

- Configuration management using CloudFormation and/or Chef/Puppet.

- Experience with agile approaches and Experience in DevOps or DevSecOps, and how they impact risk management and compliance.

- Hands-on technical expertise in technology automation, implementation, integration, and/or deployment using scripting and/or IaaC.

- Knowledge of professional software engineering practices & best practices for the full software development life cycle, including coding standards, code reviews, source control management, libraries building, build processes, testing, and operations.

- Demonstrated ability to mentor other software developers to maintain architectural vision and software quality.

- Experience taking a lead role developing complex software systems that have successfully been delivered to customers.

- Ability to travel to customer sites as needed.

PREFERRED QUALIFICATIONS:

- AWS Solutions Architect Certified.

- AWS Security Speciality Certified.

- CISSP, CCSP, CISM, and/or other comparable certifications.
Read more
Pune, Bengaluru (Bangalore)
10 - 15 yrs
₹20L - ₹45L / yr
Information security
Security operations
Penetration testing
Security analysis
Cyber Security
+1 more
Security Architectural solutions, designing, Security Analysis, Infrastructure architecture, Application architecture, DevSecOps and cloud understanding, Threat Modelling, Penetration testing, Governance Risk & Compliance
Read more
Swiggy

at Swiggy

1 video
13 recruiters
Suresh Kaushik
Posted by Suresh Kaushik
Bengaluru (Bangalore)
3 - 12 yrs
₹25L - ₹60L / yr
Network Security
Penetration testing
skill iconProgramming
Security architecture
Computer Security
+2 more
Job Description Roles and Responsibilities: • Exploit security flaws and vulnerabilities with attack simulations on multiple application platforms like Android, iOS and Web. • Ability to flow from black box to grey box to white box tests. • Ability to effectively work with the engineering teams to provide technical risk. assessment of technologies in networks, applications, code reviews in the release management cycle. • Ability to perform vulnerability assessments and penetration testing, utilizing tools - commercial and open source. • Perform, review and analyze security vulnerability data to identify applicability and false-positives. • Conduct penetration testing in line with Open Web Application Security Project (OWASP) • Write technical reports that include suggested resolution for identified problem areas and perform operational risk assessment. Required Skills and Abilities: • OWASP top 10 • Security Pen Testing methodologies including automated scans and manual methods • Tools including Burp, Nexpose, NMap, Whois etc. is a plus • Good Hands-On with Linux Debian Flavors and security hardening of the same • Understanding of Web Servers and HTTP 1.0/1.1 Protocol • Troubleshooting web servers like Apache, Nginx and other reverse proxy platforms • Basic understanding of NodeJS, Python and JAVA • TCP/IP networking including IP classes, subnets, NAT • SSL Handshake and Certificates - Understanding • DNS, and DHCP, Network troubleshooting • Remote access methods • Backup and disaster recovery methodologies • Network analysis tools • Good Hands-on using Linux Debian Flavors • Experience with security issues in Cloud Technologies (AWS) is a plus • Ability to grasp new technology concepts quickly • Good documentation skills • Ability to work in a team environment and interact with people • Knowledge and understanding of basic information security principles • Should be aware of the latest Major Application Zero-day vulnerabilities • Should be able to understand security alerts and take necessary actions accordingly Education and Experience: • Bachelor’s degree in information technology related field
Read more
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Why apply via Cutshort?
Connect with actual hiring teams and get their fast response. No spam.
Find more jobs
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort