Cutshort logo
Telecom Domain Company logo
Cyber Security Solutions Architect
Cyber Security Solutions Architect
Telecom Domain Company's logo

Cyber Security Solutions Architect

Agency job
10 - 15 yrs
₹15L - ₹30L / yr
Chennai
Skills
Solution architecture
Cyber Security

achelor of Engineering or Technology; or any degree on par;

·  12-15 years of Experience in security and similar areas solution/product development, design, etc

·  Minimum 7-8 years of experience in an Enterprise or Cyber Security practice dedicated role

·  Experience in Enterprise deployment of security with in depth knowledge of security, implementing security solutions and working closely with global customer accounts.

·  Proficient with concepts like SOC, OWASP Top 10 etc

·  Understanding of Enterprise Cyber security models like Mitre ATTACK and roadmap modelling.

·  Excellent analytical and problem-solving skills to drive product development

·  Excellent communicator, whether writing, speaking or presenting

·  Experience gathering and analysing data to create useful metrics that support positive change

Read more
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos

About Telecom Domain Company

Founded
Type
Size
Stage
About
N/A
Company social profiles
N/A

Similar jobs

Celebal Technologies Pvt Ltd
at Celebal Technologies Pvt Ltd
2 candid answers
Neelam Agarwal
Posted by Neelam Agarwal
Jaipur
4 - 5 yrs
₹3L - ₹15L / yr
Cyber Security
Security awareness
Antivirus
Network Security

Job Responsibilities:

·       Assist the Security Manager in developing and implementing security policies and procedures.

·       Conduct regular security risk assessments and audits.

·       Monitor security systems, including firewalls, intrusion detection systems, and access controls.

·       Respond to security incidents and provide recommendations for remediation.

·       Assist in managing user access and authentication.

·       Provide security awareness training to employees.

·       Maintain and improve endpoint security solutions (e.g. antivirus, endpoint detection and response).

·       Collaborate with other departments to ensure security is integrated into all aspects of the organization's operations.

·       Stay up to date on the latest security threats and industry trends.

Qualifications and skills:

·       Bachelor’s degree in computer science, Information Security, or a related field.

·       4-5 years of experience in security-related roles.

·       Knowledge of security systems and protocols.

·       Familiarity with risk management frameworks.

·       Knowledge of compliance regulations and standards.

·       Excellent communication and interpersonal skills.

·       Strong analytical and problem-solving skills.

·       Ability to work independently and as part of a team.

·       Attention to detail and accuracy.

Read more
OSBIndia Private Limited
Ashwini Mamidi
Posted by Ashwini Mamidi
Hyderabad
3 - 5 yrs
₹5L - ₹9L / yr
Identity management
Access control
SailPoint
Information security
Cyber Security
+1 more

 

·        Maximum 5 years of Information Technology/Technology Operations/Information Security experience required.

·        Minimum 3 years of experience in Cybersecurity, Identity & Access Management, Role Based Access Control, and Identity Governance is mandatory.

·        Knowledge on User Life Cycle Management, Access provisioning, Access administration is must.

·        Experience with technologies such as Role-Based Active Control (RBAC) and Attribute Based Access Control (ABAC) is required.

·        Experience in User Access Re-certification activities is mandatory.

·        Working knowledge on Active Directory is must.

·        Working experience on any IAM tool (SailPoint/Okta/OneIdentity/Varonis/MIM) would be added advantage.

·        Knowledge on Identity and Access Management role/processes/tools is must.

·        Prior experience in processing IAM requests (Add/Modify/Delete) is must.

·        Experienced in Incident management & Change Management processes.

·        Knowledge of and the ability to adhere to SAS and SOX audit requirements pertaining to Identity & Access Management job requirements.

·        Experience with work-flow management tools such as ServiceNow.

·        Leveraging creative thinking and problem solving skills, individual initiative, and utilizing MS Office (Word, Excel, Access, and PowerPoint).

·        Understanding personal and team roles; contributing to a positive working environment by building solid relationships with team members; proactively seeking guidance, clarification and feedback.

·        Identifying and addressing business needs: building relationships with Stake Holders; developing an awareness of Firm services; communicating with the business/stake holders in an organized and knowledgeable manner; delivering clear requests for information; demonstrating flexibility in prioritizing and completing tasks; and communicating potential conflicts to a supervisor

·        Experience performing user administration tasks for various in-house and third-party applications.

·        Analyzing, prioritizing, and resolving faults to resolution. Resolve tickets according to SLAs and escalation procedures.

·        Strong analytical, problem solving and organizational skills. Be proactive, dynamic, and flexible.

·        Good Communication skills, able to articulate well with business and stakeholders.

 

·        Education Qualification : Any graduate/post graduate with Computer Science background.

 

 

Read more
Ongrid
at Ongrid
3 recruiters
Pushpendra Singh
Posted by Pushpendra Singh
Gurugram
6 - 15 yrs
₹10L - ₹15L / yr
Information security
Cyber Security
ISO/IEC 27000-series
GDPR
Role and Responsibilities:-

- Develop efficient strategies to protect the system, the networking infrastructure, data, and information systems against potential threats/cyber risks
- Routinely performing threat analysis, system checks, and security tests
- Defining and updating information security criteria and validation procedures
- Effectively discuss to understand safety and security and fix the problems along with different stakeholders
- To be a security representative or point of contact for all technical deliveries, initiatives, and project implementations.
- To develop technical processes and procedures and promote compliance in line with regulations, corporate policies, or standards as per ISO27001
- Assess technical security risks in terms of impact on systems and service confidentiality, integrity, and availability, and report and escalate results of risk assessments.
- Report any real or potential security breaches/vulnerabilities to various stakeholders and provide technical support during incident response
- Monitor security tools to detect security events & incidents Report and escalate any security breaches to the Information Technology Security Officer
- Operate vulnerability scanning and compliance tools to identify system weaknesses
- Represent IT Security matters at technical and business forums.

Desired candidate profile :

- Relevant experience in the information security field
- Relevant experience working with ISO Policies, and GDPR guidelines.
- Strong knowledge of network architecture and security concepts related to routing
- Exceptional attention to detail
- Excellent analytical and problem-solving skills
- Great team player and able to work efficiently with minimal supervision
- Excellent communication skills, both written and verbal, work with the different stakeholders on strengthening the security risks.
- Able to handle and cope with stressful situations and understands the pressures of a start-up environment
Read more
Bengaluru (Bangalore)
5 - 8 yrs
₹5L - ₹20L / yr
Windows Azure
Microsoft Windows Azure
DevOps
Terraform
Solution architecture
+5 more

Senior Cloud Engineer / Jr. Cloud Solutions Architect

 

Roles and Responsibilities

  • Define, implement, deploy and maintain development, QA & production environments for cloud-based Azure architecture.

  • Create a strategy for establishing a secure and well-managed enterprise environment in Azure

  • Define and implement security architecture for production, ensure data security at all levels.

  • Provision Infrastructure as code using Azure CLI Powershell ARM templates and or Terraform with Ansible or other tools.

  • Develop scripts to automate the deployment of resource stacks and associated configurations

  • Extend MLP standard systems management processes into the cloud including change, incident, and problem management

  • Establish and implement monitoring and management infrastructure for both availability and performance management

  • Implement observability patterns using Azure Monitor Azure Application Insights and Log Analytics Workspace.

  • Provide internal training to the team.

 

Primary Skills/Requirements

  • 5+ years of experience in IT and infrastructure

  • 3+ years of experience in Azure design, support and management for a large-scale organization

  • Experience in design and implementation of high availability architecture.

  • Strong experience in Azure CLI Powershell and ARM Templates Terraform.

  • Strong understanding of IT Security and related audits

  • Experience with deploying applications on Linux - Ubuntu

  • Should know Azure offerings (Storage, OS instances, Availability zones, DR, Load balancers, VPN tunnel, Application Gateway, etc.)Cloud monitoring Experience with Azure Log Analytics Azure Monitor.

  • Experience with log collection tools and analysis, as well as infrastructure performance monitoring tools and optimization practices

  • Microsoft Azure Certification MCSE: Cloud Platform and Infrastructure or equivalent certification would be an added advantage

  • Experience with Postgres SQL Database

Behavioural

  • Positive work ethics

  • Ability to adapt to dynamic environment

  • Time Management

  • Team Player

  • Communication skills

  • Ability to work independently

Read more
Bengaluru (Bangalore)
7 - 12 yrs
₹5L - ₹25L / yr
Cyber Security
Automotive
skill iconC
Linux/Unix
Debugging
+2 more
We are looking for a LinuxMiddleware Cybersecurity Development engineer having experience in Linux kernel/Device drivers/Device tree configuration, Bootloaders/Uboot/Secure Boot customization in the embedded domain. The ideal candidate should have expertise in Linux BSP development with Yocto build system for the Automotive SoC platform
Read more
TIKAJ
at TIKAJ
2 recruiters
Anamika Srivastava
Posted by Anamika Srivastava
Remote, Gurugram
0 - 2 yrs
₹1.4L - ₹2.4L / yr
Security awareness
Cyber Security
Incident management

TIKAJ is seeking a passionate person who is ready to kickstart his/her cybersecurity career. Security Analyst is your first step to a brighter future as a cybersecurity expert.

Responsibilities


  • Respond and take enforcement actions on cyber security incidents
  • Monitor user activity, network events, and signals from security tools to identify events.
  • Categorize alerts and other anomalous activities that represent real threats.
  • Remediate attacks and Triage on general information security tickets.
  • Collect data for more analysis, evaluate the attack, identify the root of the attack, and implement required security actions to counter the attack.
  • Responsible for investigating and generating reports on information security issues.

We are looking for Candidates

  • Who are motivated, self-learning, and team-oriented individuals?
  • Have a degree in computer science or a related field.
  • Who have beginner to intermediate level experience in Python
  • Who has an interest in Cyber security, phishing, cyber laws and enforcement
  • Good is written and verbal communication.
Read more
US based company
Hyderabad
7 - 13 yrs
₹20L - ₹30L / yr
skill iconAmazon Web Services (AWS)
Cyber Security
Penetration testing
Threat modeling
Computer Security
+1 more

Job Responsibilities:

 

Experience: 8 Yrs to 12 Yrs

 

  1. Hands-on expertise on performing Application pen testing (Mobile(Android, IOS),networking, web application pen testing),
  2. Should worked on IOT,AWS,Application Penetration Testing, Reverse Engineering, source code review, CI/CD Pipeline
  3. have done any submission on Bug crowd or Bug Bounty.
  4. have developed tools or scripts for web pen test on GitHub.
  5. Certified on OSCP
  6. Threat Modeling
  7. Network scan in stealth mode or simple scan using Nmap and Burp suite

 

Implement security measures which monitor and protect sensitive data and systems from infiltration and cyber-attacks.

 

Developing different ways to solve the existing threats and security issues.

 

Configuring and implementing intrusion detection systems and firewalls.

 

Security product development, testing, and implementation.

 

Responsible for security technology research, penetration testing, and vulnerability scanning.

 

Please follow the below inputs.

 

The shift will starts from 03:00 PM to 12 AM (fixed for few months),

 

 

OSCP certification(Not mandatory, preferable)

 

Below are the primary key skills:

 

Total Application Security Experience:

Total Security Architecture Experience:

IOT(optional)

MOBILE

WEB

AWS(Mandatory)

NETWORKING

THREAT MODELS

 

 

Read more
Remote only
3 - 6 yrs
₹5L - ₹15L / yr
IT security
Information security
Cyber Security
Security Information and Event Management (SIEM)
Information security management system
+4 more
Operating and owning agreed upon core security tools, technologies, and processes:
o Tools:
 CrowdStrike Falcon Sensor - Or similar AV engine
 Cisco Umbrella Web Filtering – Or similar Web Proxy Filter
 Cisco FTD Intrusion Prevention – Or similar IPS/IDS
 O365 Email Protection (Spam, Phishing) - Or similar
 Phish Insight (Phishing Campaigns) - Or similar phish campaign technology
 Nessus Professional – Or similar vulnerability scanning tool
 Cisco NGFW – Or similar FW technology
o Technologies:
 Cloud (AWS IaaS, O365 SaaS),
 On Premis (Windows 90%, Linux 10%)
o Processes:
 Computer security incident response
 Security reviews and assessments
 Vulnerability management Penetration tests

 Manage Level 3 security incidents and requests
 Ensures compliance with corporate policies and procedures
 Research new ways to improve existing technical security controls
 Project SME and Lead for security related projects
 Conduct Risk assessments and assist in remediation activities
 Assist in internal and external audit activities

Required Experience and Skills:
 Bachelor's degree in Information Security, Computer Science or Engineering
 Minimum of 3 years in security engineering
 Knowledge in cloud ecosystems security - Amazon AWS, Microsoft O365
 Ability to work well in an international team (US or EU time zone)
 English spoken and written on at least B2 level
 Understanding of security monitoring and identification concepts
 Assessing and understanding the impact, severity and urgency of issues
 Cybersecurity Certifications an advantage but not essential: CEH, C|HFI, CISSP, CISA, CISM
 Expertise across a variety of security products including those listed in requirements above
Read more
netmedscom
at netmedscom
3 recruiters
Vijay Hemnath
Posted by Vijay Hemnath
Chennai
5 - 10 yrs
₹10L - ₹30L / yr
Information security
IT security
WAF
skill iconDocker
Ethical Hacking
+16 more

We are seeking a Security Program Manager to effectively drive Privacy & Security Programs in collaboration with cross functional teams. You will partner with engineering leadership, product management and development teams to deliver more secure products.

 

Roles & Responsibilities:

  • Work with multiple stakeholders across various departments such as IT, Engineering, Business, Legal, Finance etc to implement controls defined in policies and processes.
  • Manage projects with security and audit requirements with internal and external teams and serve as a liaison among all stakeholders.
  • Managing penetration tests and security reviews for core applications and APIs.
  • Identify, create and guide on privacy and security requirements considering applicable Data Protection Laws and implement them across software modules developed at Netmeds.
  • Brainstorm with engineering teams to figure out how privacy and security controls can be applied to Netmeds tech stack.
  • Coordination with Infra Teams and Dev Teams on DB and application hardening, standardization of server images / containerization.
  • Assess vendors' security posture before onboarding them and after they qualify, review their security posture at a set frequency.
  • Manage auditors and ensure compliance for ISO 27001 and other data privacy audits.
  • Answer questions or resolve issues reported by the external security researchers & bug bounty hunters.
  • Investigate privacy breaches.
  • Educate employees on data privacy & security.
  • Prioritize security requirements based on their severity of impact and product roadmap.
  • Maintain a balance of security and business values across the organisation.

 Required Skills:

  • Web Application Security, Mobile Application Security, Web Application Firewall, DAST, SAST, Cloud Security (AWS), Docker Security, Manual Penetration Testing.
  • Good hands-on experience in handling tools such as vulnerability scanners, Burp suite, patch management, web filtering & WAF.
  • Familiar with cloud hosting technologies (ex. AWS, Azure). Understanding of IAM, RBAC, NACLs, and KMS.
  • Experience in Log Management, Security Event Correlation, SIEM.
  • Must have strong interpersonal skills and should be able to communicate complex ideas seamlessly in written and verbal communication.

 

Good to Have Skills:

  • Online Fraud Prevention.
  • Bug Bounty experience.
  • Security Operations Center (SOC) management.
  • Experience with Amazon AWS services (EC2, S3, VPC, RDS, Cloud watch).
  • Experience / Knowledge on tools like Fortify and Nessus.
  • Experience in handling logging tools on docker container images (ex. Fluentd).
Read more
Pune, Bengaluru (Bangalore)
10 - 15 yrs
₹20L - ₹45L / yr
Information security
Security operations
Penetration testing
Security analysis
Cyber Security
+1 more
Security Architectural solutions, designing, Security Analysis, Infrastructure architecture, Application architecture, DevSecOps and cloud understanding, Threat Modelling, Penetration testing, Governance Risk & Compliance
Read more
Why apply to jobs via Cutshort
people_solving_puzzle
Personalized job matches
Stop wasting time. Get matched with jobs that meet your skills, aspirations and preferences.
people_verifying_people
Verified hiring teams
See actual hiring teams, find common social connections or connect with them directly. No 3rd party agencies here.
ai_chip
Move faster with AI
We use AI to get you faster responses, recommendations and unmatched user experience.
21,01,133
Matches delivered
37,12,187
Network size
15,000
Companies hiring
Did not find a job you were looking for?
icon
Search for relevant jobs from 10000+ companies such as Google, Amazon & Uber actively hiring on Cutshort.
companies logo
companies logo
companies logo
companies logo
companies logo
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos