Cutshort logo
Information security jobs

32+ Information security Jobs in India

Apply to 32+ Information security Jobs on CutShort.io. Find your next job, effortlessly. Browse Information security Jobs and apply today!

icon
Appknox

at Appknox

1 video
9 recruiters
Amrita Panigrahy
Posted by Amrita Panigrahy
Remote only
0 - 1 yrs
Best in industry
Penetration testing
Vulnerability assessment
Information security
Web application security
Mobile security
+1 more

A BIT ABOUT US


Appknox is one of the top Mobile Application security companies recognized by Gartner and G2. A profitable B2B SaaS startup headquartered in Singapore & working from Bengaluru.

The primary goal of Appknox is to help businesses and mobile developers secure their mobile applications with a focus on delivery speed and high-quality security audits.

Appknox has helped secure mobile apps at Fortune 500 companies with Major brands spread across regions like India, South-East Asia, Middle-East, US, and expanding rapidly. We have secured 300+ Enterprises globally.


We are a 30+ incredibly passionate team working to make an impact and help some of the biggest companies globally. We work in a highly collaborative, very fast-paced work environment. If you have what it takes to be part of the team, we are excited, and let’s speak further.


The Opportunity

To join the security team engaging with multiple clients, helping them with end-to-end security audits, also researching new topics and vulnerabilities to be added to the scanner, present research at conferences.


What An Ideal Candidate Would Look Like: 

  • Anyone pursuing their graduation or post-graduation related to IT security 
  • Skills - Application Penetration Testing, 
  • Knowledge or experience of IoT testing, and source code audits are plus points
  • Responsibilities: Engage with clients for scoping call, perform security audits, and remediation call with clients to patch the issues


Minimum Requirements

  • Must be comfortable with tools like burp suite, nmap, sqlmap, r2 etc
  • Strong Analytical Skills
  • Strong grasp of fundamentals of information security
  • Strong Grasp of Web, API and mobile Pen-Testing
  • Self-taught learner willing to read and keep up-to-date on technological changes and how they could be used
  • Can accurately define an issue and create detailed Proof-of-concept and write-up of the findings.
  • Provide appropriate remediation and mitigations of the identified vulnerabilities.


Responsibilities

  • Security assessment of web and mobile applications.
  • Understand and explain the results with impact on business and compliance status
  • Continuously learning and training on latest tools and techniques


Personality traits we really admire

  • A confident and dynamic working persona, which can bring fun to the team, and a sense of humor, is an added advantage.
  • Great attitude to ask questions, learn and suggest process improvements.
  • Has attention to details and helps identify edge cases.
  • Highly motivated and coming up with fresh ideas and perspectives to help us move towards our goals faster.
  • Follow timelines and absolute commitment to deadlines.


Interview Process 

  • Round 1 CTF Round - Profile and skill Evaluation
  • Round 2 - Technical Interview with security team member
  • Round 3 - Technical Interview with the Team Lead
  • Round 4 - HR Round


 Why Join Us


  • Great Stipend& PPO: We keep up with the market standards & provide stipend/pay packages considering updated standards. Also as Appknox continues to grow, you’ll have a great opportunity to earn more & grow with us. Moreover, we also PPO for our top interns.
  • Freedom & Responsibility: If you are a person who enjoys challenging work & pushing your boundaries, then this is the right place for you. We appreciate new ideas & ownership as well as flexibility with working hours.
  • Holistic Growth: We foster a culture of continuous learning and take a much more holistic approach to train and develop our assets: the employees. We shall also support you all on that journey of yours.
  • Transparency: Being a part of a start-up is an amazing experience, one of the reasons being open communication & transparency at multiple levels. Working with Appknox will give you the opportunity to experience it all first-hand.
Read more
Jeeves
Gokul Dhuraisaami
Posted by Gokul Dhuraisaami
Remote only
8 - 11 yrs
Best in industry
Amazon Web Services (AWS)
WAF
Information security
devsecops
cloud security
  • Solid experience in designing, implementing, and securing cloud environments, including services such as EC2, S3, RDS, IAM, VPC, and CloudTrail.
  • Strong understanding of DevOps methodologies and experience with CI/CD pipelines and tools (e.g., Jenkins, GitHub, SonarQube).
  • In-depth knowledge of cloud security best practices, industry standards, and compliance frameworks (e.g., NIST, CIS, ISO 27001).
  • Proficiency in scripting languages such as Python, Bash, Groovy.
  • Experience with Infrastructure-as-Code (IaC) tools like AWS CloudFormation or Terraform.
  • Familiarity with security scanning and monitoring tools, such as AWS Security Hub, GuardDuty, Inspector, or third-party solutions.
  • Strong understanding of network security concepts, including firewalls, VPNs, and secure network architectures.
  • Knowledge of secure coding practices and experience with application security testing tools (e.g., SAST, DAST, fuzzing, and secure coding patterns).
  • Excellent problem-solving skills and ability to work collaboratively in a team-oriented environment.
  • Participate in incident handling and other related duties to support the information security function.
  • The ability to learn and apply new concepts quickly
  • Strong written and oral communication skills


Read more
Ongrid

at Ongrid

3 recruiters
Sudhanshu Yadav
Posted by Sudhanshu Yadav
Gurugram
3 - 6 yrs
₹9L - ₹15L / yr
Information security
Compliance
Network architecture

We are looking for a motivated Information Security who is a self-starter, has an eye for detail, is analytical in approach, loves solving problems, and someone who can take initiatives to build and improve the company’s information security, identify risks and act on the required changes quickly.


What you will do:


  • Develop efficient strategies to protect the system, the networking infrastructure, data, and information systems against potential threats/cyber risks
  • Routinely performing threat analysis, system checks, and security tests
  • Defining and updating information security criteria and validation procedures
  • Effectively discuss to understand safety and security and fix the problems along with different stakeholders
  • To be a security representative or point of contact for all technical deliveries, initiatives, and project implementations.
  • To develop technical processes and procedures and promote compliance in line with regulations, corporate policies, or standards as per ISO27001
  • Assess technical security risks in terms of impact to systems and service confidentiality, integrity, and availability, and report and escalate results of risk assessments.
  • Report any real or potential security breaches/vulnerabilities to various stakeholders and provide technical support during incident response
  • Monitor security tools to detect security events & incidents Report and escalate any security breaches to the Information Technology Security Officer
  • Operate vulnerability scanning and compliance tools to identify system weaknesses
  • Represent IT Security matters at technical and business forums


Requirements:

  • 3-5 years of relevant experience in the information security field.
  • Team handling/Mentoring experience
  • Relevant experience working with ISO Policies, GDPR guidelines.
  • Strong knowledge of network architecture and security concepts related to routing
  • Exceptional attention to detail
  • Excellent analytical and problem-solving skills
  • Great team player and able to work efficiently with minimal supervision
  • Excellent communication skills, both written and verbal, work with the different stakeholders on strengthening the security risks
  • Able to handle and cope with stressful situations and understands the pressures of a start-up environment.
Read more
Emids Technologies

at Emids Technologies

2 candid answers
Darshan K
Posted by Darshan K
Bengaluru (Bangalore)
7 - 14 yrs
Best in industry
Information security
Implementation
Risk Management
Cyber Security
ISO 27001:2013
+7 more

Experience:- Overall 10 to 12 years of experience of which atleast 5 to 7 years’ experience should be in Information Security. Mandatory is 5 to 7 years’ experience in Information security and with one full end to end implementation experience.

Base location: - Bengaluru - Must

Requirements: -

  1. Mandatory - ISO 27001:2013 lead implementor certified
  2. Mandatory - ISO 27001:2013 lead auditor certified (but if it is a good candidate, we can still consider)
  3. Good to have – CISA, CISM, Risk management certification, Privacy certifications.
  4. Mandatory - Atleast one end to end implementation experience of ISO 27001 standard. The candidate should have a good implementation knowledge of ISO 27001, ISO 27002 standards and is required to implement the ISO requirements and run the ISMS program for multiple countries.
  5. This immediate requirement is for implementing the ISMS program for our Canadian office location. The candidate should be willing to work from Bengaluru in EST time zone during this implementation phase whenever required.
  6. Good documentation skills.
  7. Develop, implement, maintain, review and continually improve Information Security policies.
  8. Good understanding and knowledge of applicable legal and regulatory requirements as relevant to information security.
  9. Manage and maintain a risk register / risk database along with risk treatment plans.
  10. Good understanding of physical and environmental security.
  11. Conduct Internal Audits based ISO 27001 standards and Personal Data Protection policies. A good experience in independently conducting Internal and supplier audit with respect to information security.
  12. Provide training to the employees on Privacy & Information Security Management System on regular intervals.
  13. The greater part of the job involves interacting with people, interviewing them / auditing, Preparing audit reports, discussing / persuading / influencing.
  14. Mandatory: Good verbal and written communication skills. Eye for details.
  15. Good presentation skills.
  16. Since this is a trusted role, candidates must be willing to undergo extensive background checks to verify their identity, character, qualifications, skills and experience.
Read more
Upswing Financial Technologies Private Limited

at Upswing Financial Technologies Private Limited

2 candid answers
4 recruiters
Simran Bindra
Posted by Simran Bindra
Bengaluru (Bangalore)
3 - 6 yrs
Best in industry
Linux/Unix
Linux administration
Information security
Network Security
Docker
+4 more

At Upswing, we are committed to building a robust, scalable & secure API platform to power the world of Open Finance.

We are a passionate and self-driven team of thinkers who aspire to build the rails to connect the legacy financial sector with financial innovators through a simple and powerful banking-as-a-service (BaaS) platform.

We are looking for motivated engineers who will be working in a highly creative and cutting-edge technology environment to build a world-class financial services suite.

 

About the role

As part of the DevSecOps team at Upswing, you will get to work on building state-of-the-art infrastructure for the future. You will also be –

  • Managing security aspects of the Cloud Infrastructure 
  • Designing and Implementing Security measures, Incident Response guidelines 
  • Conducting Security Awareness Training
  • Developing SIEM tooling and pipelines end to end for vulnerability/security/incident reporting 
  • Developing automation and performing routine VAPT for Network and Applications
  • Integrating with 3rd party vendors for the services required to improve security posture 
  • Mentoring people across the teams to enable best practices 

What will you do if you join us?

  • Engage in a lot of cross-team collaboration to independently drive forward DevSecOps practices across the org 
  • Take Ownership of existing, ongoing, and future DevSecOps initiatives 
  • Plan and Engage in Architecture discussions to bring in different angles (especially security angles) to the table
  • Build Automation stack and tools for security pipeline 
  • Integrate different security measures and pipelines with the SIEM tool
  • Conducting routine VAPT using manual and automated workflows, generating and maintaining the report for the same
  • Introduce and Implement best practices across teams for a great security posture in the org

 

You should have

  • Curiosity for on-the-job learning and experimenting with new technologies and ideas
  • A strong background in Linux environment
  • Proven experience in Architecting networks with security first implementation
  • Experience with VAPT tooling for Networks and Applications is required 
  • Strong experience in Cloud technologies, multi-cloud environments, and best practices in Cloud 
  • Experience with at least one scripting language (Ruby/Python/Groovy)
  • Experience in Terraform is highly desirable but not mandatory
  • Some experience with Kubernetes, and Docker is required 
  • Understanding Java web applications and monitoring them for security vulnerabilities would be a plus 
  • Any other DevSecOps-related experience will be considered


Read more
OSBIndia Private Limited
Ashwini Mamidi
Posted by Ashwini Mamidi
Hyderabad
3 - 5 yrs
₹5L - ₹9L / yr
Identity management
Access control
SailPoint
Information security
Cyber Security
+1 more

 

·        Maximum 5 years of Information Technology/Technology Operations/Information Security experience required.

·        Minimum 3 years of experience in Cybersecurity, Identity & Access Management, Role Based Access Control, and Identity Governance is mandatory.

·        Knowledge on User Life Cycle Management, Access provisioning, Access administration is must.

·        Experience with technologies such as Role-Based Active Control (RBAC) and Attribute Based Access Control (ABAC) is required.

·        Experience in User Access Re-certification activities is mandatory.

·        Working knowledge on Active Directory is must.

·        Working experience on any IAM tool (SailPoint/Okta/OneIdentity/Varonis/MIM) would be added advantage.

·        Knowledge on Identity and Access Management role/processes/tools is must.

·        Prior experience in processing IAM requests (Add/Modify/Delete) is must.

·        Experienced in Incident management & Change Management processes.

·        Knowledge of and the ability to adhere to SAS and SOX audit requirements pertaining to Identity & Access Management job requirements.

·        Experience with work-flow management tools such as ServiceNow.

·        Leveraging creative thinking and problem solving skills, individual initiative, and utilizing MS Office (Word, Excel, Access, and PowerPoint).

·        Understanding personal and team roles; contributing to a positive working environment by building solid relationships with team members; proactively seeking guidance, clarification and feedback.

·        Identifying and addressing business needs: building relationships with Stake Holders; developing an awareness of Firm services; communicating with the business/stake holders in an organized and knowledgeable manner; delivering clear requests for information; demonstrating flexibility in prioritizing and completing tasks; and communicating potential conflicts to a supervisor

·        Experience performing user administration tasks for various in-house and third-party applications.

·        Analyzing, prioritizing, and resolving faults to resolution. Resolve tickets according to SLAs and escalation procedures.

·        Strong analytical, problem solving and organizational skills. Be proactive, dynamic, and flexible.

·        Good Communication skills, able to articulate well with business and stakeholders.

 

·        Education Qualification : Any graduate/post graduate with Computer Science background.

 

 

Read more
Octro Inc

at Octro Inc

1 recruiter
Akansha Gupta
Posted by Akansha Gupta
Noida
6 - 10 yrs
₹10L - ₹25L / yr
ISO 9000
IT security
Information security
Information security management system
Data security
+1 more

Roles and responsibilities:

- Audit the current Information Security system and procedures and do a Gap analysis

- Identify immediate potential Information Security Risks and manage remediation tasks through to closure

- Create an Information Security Compliance Roadmap and execute end-to-end compliance initiatives by that roadmap

- Design high-quality test plans and direct Data/Information security control test activities

- Continuously improve Octro Data/Information security control framework

- Maintain handbook pages and procedures related to Information security compliance

- Identify opportunities for Information security compliance control automation, execute them and then maintain

- Provide actionable and constructive advisement to cross-functional teams, including driving remediation activities for high and select moderate-risk Observations across all Octro departments

- Design, develop, and deploy scripts to automate continuous control monitoring, administrative tasks and metric reporting for all security compliance programs

- Direct and support external audits as and when necessary


Requirements


- A minimum of 6-8 years' experience working with Data/Information Security Compliance programs

- Detailed knowledge of common information security management frameworks, regulatory requirements and applicable standards such as: ISO, SOC 2, GDPR, PCI etc.


About Octro Inc :


We are one of the fastest-growing mobile gaming companies around, a technology-driven organization at heart, and take pride in the platforms we create.

Founded in 2006 with a mission to create productivity applications for Mobile Devices. After pioneering one of the first mobile Voice-over-IP infrastructures called OctroTalk, the company ventured into building mobile gaming platforms. Sequoia Capital has invested in Octro. The funding was announced in June 2014.

Read more
codersbrain

at codersbrain

1 recruiter
Aishwarya Hire
Posted by Aishwarya Hire
Remote only
8 - 10 yrs
₹10L - ₹15L / yr
SAP ABAP
SAP
Information security
  • Participate and collaborate with the users, business analyst, quality assurance/quality control analyst in the gathering of user requirements and specifications.
  • Analyze technical and business requirements and translate these into basic and detailed technical design.
  • Participate and conduct feasibility study, research and development, prototyping and proof of concept (PoC) in implementing new/existing systems, solutions and processes.
  • Participate in the technical and project documentation such as but not limited to functional, system and technical design, requirements and specifications.
  • Develop, customize, enhance, fix and maintain codes, applications and systems.
  • Create test scenarios and data and conduct or participate in non-functional and functional testing (e.g., unit testing, system testing, integration testing, etc.).
  • Document, analyze and report test results.
  • Develop and review codes, programs and configurations to verify consistency and conformance with established programming and industry standards, guidelines, policies and practices.
  • Conduct incident and problem analysis, data gathering, investigation and resolution of issues, and provide technical consultancy, assistance and support.
  • Deliver the required systems/applications/solutions on time and based on agreed budget and specifications.
  • Identify, assess and recommend opportunities for application and process improvement.
  • Prepare reports, manuals and other documentation on the status, operation and maintenance of software.
  • Provide regular and effective progress updates to the project manager/team lead/supervisor/immediate manager.
  • Actively participate in and lead the peer review and status meeting to communicate progress and escalate risks and roadblocks.
  • Prepare training materials and provide assistance in conducting the training to users or other members of the team.
  • Responsible for the information security by protecting confidential information from unauthorized access, ensuring the integrity of the information and information system, taking appropriate measures to manage security risks and following and complying with the laws, legislations and terms of contracts.
  • Perform other duties as assigned, if necessary.
Read more
Ongrid

at Ongrid

3 recruiters
Pushpendra Singh
Posted by Pushpendra Singh
Gurugram
6 - 15 yrs
₹10L - ₹15L / yr
Information security
Cyber Security
ISO/IEC 27000-series
GDPR
Role and Responsibilities:-

- Develop efficient strategies to protect the system, the networking infrastructure, data, and information systems against potential threats/cyber risks
- Routinely performing threat analysis, system checks, and security tests
- Defining and updating information security criteria and validation procedures
- Effectively discuss to understand safety and security and fix the problems along with different stakeholders
- To be a security representative or point of contact for all technical deliveries, initiatives, and project implementations.
- To develop technical processes and procedures and promote compliance in line with regulations, corporate policies, or standards as per ISO27001
- Assess technical security risks in terms of impact on systems and service confidentiality, integrity, and availability, and report and escalate results of risk assessments.
- Report any real or potential security breaches/vulnerabilities to various stakeholders and provide technical support during incident response
- Monitor security tools to detect security events & incidents Report and escalate any security breaches to the Information Technology Security Officer
- Operate vulnerability scanning and compliance tools to identify system weaknesses
- Represent IT Security matters at technical and business forums.

Desired candidate profile :

- Relevant experience in the information security field
- Relevant experience working with ISO Policies, and GDPR guidelines.
- Strong knowledge of network architecture and security concepts related to routing
- Exceptional attention to detail
- Excellent analytical and problem-solving skills
- Great team player and able to work efficiently with minimal supervision
- Excellent communication skills, both written and verbal, work with the different stakeholders on strengthening the security risks.
- Able to handle and cope with stressful situations and understands the pressures of a start-up environment
Read more
MindTickle

at MindTickle

1 video
11 recruiters
Namrata Priya
Posted by Namrata Priya
Pune
5 - 14 yrs
₹10L - ₹35L / yr
Data security
Information security
Privacy
data privacy
GDPR
+2 more

Job Brief:

 

You'll be joining Mindtickle’s InfoSec and Compliance team, which is responsible for various functions related to Security, Privacy, and Compliance around Mindtickle's rapidly growing cloud platform. You'll play a crucial role in all our compliance & information security initiatives, including but not limited to those arising from regulations (e.g., GDPR, CCPA, UK DPA 2018, FINRA), audit requirements (e.g., SOC 2, HIPAA), and customer/ prospects requests (typically large enterprises).

 

As Data Privacy & Compliance Manager, you will champion the highest data privacy standards and drive forward compliance across all of Mindtickle. Crucial to this role will be an expert knowledge of international data protection laws and a proactive and pragmatic approach towards data privacy and compliance. 

 

Key Responsibilities:

  • Act as the single point of contact for all privacy-related topics, including communication with customers and prospects, including RFPs, emails, or privacy calls

  • Closely working with the internal legal team and external legal counsel to support the review of third parties/customer data processing addendums (DPAs), standard contractual clauses, contracts, and other data protection agreements

  • Maintain the data protection terms agreed with customers in a contract management software

  • Perform due diligence of new third parties and periodic risk review of existing third parties, including processes around sub-processors

  • Support in other industry compliance projects such as ADA, Section 508, WCAG, FINRA, 21 CFR Part 11, etc.

  • Lead the assessment of new legislation or other regulatory changes (GDPR, CCPA, UK DPA 2018, LGPD, PIPEDA, Swiss FDAP) and make recommendations as necessary to ensure that risks are mitigated as well as ongoing compliance

  • To work flexibly and collaboratively across all teams in the organization while driving privacy & compliance-related projects, including sales, customer success, product, and engineering

  • Own internal and external privacy audit projects, including planning, scoping, need analysis, ongoing project management, and communications with all relevant stakeholders

  • Onboard privacy solutions, design, build and deploy data privacy programs on the solutions to ensure compliance with privacy requirements

  • Maintain Records of Processing Activities (ROPA) and ensure Privacy By Design for new features/changes in the platform

  • Undertake all other reasonable and related tasks associated with this role

Desired Qualification:

  • 5-10 years of experience in data privacy and compliance, with exposure to cloud software platforms

  • Extensive experience in data protection and knowledge of relevant legislation, including GDPR, Standard Contractual Clauses, Transfer Impact Assessment, CCPA, UK DPA 2018, LGPD, PIPEDA, Swiss FDAP, etc.

  • Certifications such as CIPP/E, CIPP/US, CIPM, CIPT, etc., are preferred

  • Specialist knowledge in a relevant area, e.g., data security and individual rights requests

  • Excellent communication, interpersonal, project management, and issue resolution skills

  • Excellent analytical skills, organizational skills, ingenuity, and the ability to work as part of a team

  • Experience in managing privacy audits and risk management processes

  • Demonstrated ability to learn quickly, take the initiative, and drive complex projects

 

Read more
GI TECH I GAME INDIA PRIVATE LIMITED
Chennai
5 - 12 yrs
₹6L - ₹10L / yr
ISO 9001
ISO/IEC 27001:2005
ISO 2100
Audit
Information security
+4 more

Hiring for Lead Auditor (QMS / ISMS) role.

 

Job description Below :

 

  • Preparation Dept. Objective reports.
  • Preparation of Internal Audit Schedule & Coordination /opening meeting and closing meeting.
  • Follow up for Internal Audit closing of Observations.
  • Preparation of Management review meeting Input & Output reports.
  • Coordination Certification Audit and Surveillance (TUV-SUD) Audit for ISO 9001:2015 and ISO 27001:2013.
  • Follow up for closing of Observations.
  • To update QMS & ISMS Manual, Procedures, Policies, Risk Assessment Plan, SOA & Formats.
  • Internal Audit of ISO - QMS & ISMS standards.
Read more
Ongrid

at Ongrid

3 recruiters
Pushpendra Singh
Posted by Pushpendra Singh
Gurugram
4 - 8 yrs
₹10L - ₹18L / yr
Information security
Cyber Security
Compliance
Policies and procedures
Vulnerability assessment
+2 more
Role and Responsibilities:-

- Develop efficient strategies to protect the system, the networking infrastructure, data, and information systems against potential threats/cyber risks

- Routinely performing threat analysis, system checks, and security tests

- Defining and updating information security criteria and validation procedures

- Effectively discuss to understand safety and security and fix the problems along with different stakeholders

- To be a security representative or point of contact for all technical deliveries, initiatives, and project implementations.

- To develop technical processes and procedures and promote compliance in line with regulations, corporate policies, or standards as per ISO27001

- Assess technical security risks in terms of impact on systems and service confidentiality, integrity, and availability, and report and escalate results of risk assessments.

- Report any real or potential security breaches/vulnerabilities to various stakeholders and provide technical support during incident response

- Monitor security tools to detect security events & incidents Report and escalate any security breaches to the Information Technology Security Officer

- Operate vulnerability scanning and compliance tools to identify system weaknesses

- Represent IT Security matters at technical and business forums.

Desired candidate profile :

- Relevant experience in the information security field

- Relevant experience working with ISO Policies, and GDPR guidelines.

- Strong knowledge of network architecture and security concepts related to routing

- Exceptional attention to detail

- Excellent analytical and problem-solving skills

- Great team player and able to work efficiently with minimal supervision

- Excellent communication skills, both written and verbal, work with the different stakeholders on strengthening the security risks.

- Able to handle and cope with stressful situations and understands the pressures of a start-up environment
Read more
Delhi
7 - 12 yrs
Best in industry
ceh
OWASP
Cyber Security
Information security
clair
+3 more
b. Experience
i. Technology Graduate with 8+ years of experience in the IT industry & Information Security / Cyber Security
iii. Provide Security Vision & Strategy to the Organization, strategic direction, development, and implementation of information security programs and projects to address risks relevant to the attainment of organizational strategic goals.
iv. Experience in advising leadership team regarding Security Technology Land scape, product issues, and possible improvements
v. Expertise in providing executive roadmaps for continual improvement in teams, technology, and processes, process across various security & DevSecops teams
vi. Experienced in Information Security Risk Management, gap analyses, Audits.
vii. Hands-on Experience in formulating Cyber Security Policies, Design and implementation of Security Technologies, DevSecOps.
viii. Working Knowledge in implementation of Cyber Security Solution in Open Source, OpenStack environment.
ix. Ability to provide strategies to increase the ability to withstand cyber-attacks, as measured by annual sophisticated attack simulations.
x. Experience in upgrading, troubleshooting and tuning of Cyber Security Solutions, SOC Operations.
xi. Thorough understanding and good knowledge latest Cyber Security technologies, Security Architectures, vulnerabilities, security threats.
xii. Expertise in Test-Driven Development and establishing a DevSecOps practice. Multiple product launches under your belt - from design to launch, having played a key role in their success
xiii. Ability to setup PoC for latest security solutions
xiv. Good understanding of Open Source Technologies, Private Cloud Technologies.
Read more
Bangalore
5 - 10 yrs
₹15L - ₹30L / yr
Information security
ISO/IEC 27001:2005
HIPAA
Systems Development Life Cycle (SDLC)
Physical security
+7 more

What are we looking for?

An enthusiastic individual with the following skills. Please do not hesitate to apply if you do not match all of it. We are open to promising candidates who are passionate about their work and are team players.

Key Responsibilities & expectations from the candidate 

  • Must have strong experience in Information Security Management system(ISMS), creation of policy, procedures and implementation.
  • Operates as a key contributor to the RFP, Third-Party Risk assessment, cloud security assessment etc.
  • Lead the strategic and tactical development of information security framework, risk management and new compliance initiatives
  • Subject matter expertise in ISO 27001, SOC2, CCPA, CPRA, GDPR, PCI DSS and HIPAA.
  • Must have a strong experience in the documentation process and reviewing MSA, SCC, SLA & DPA.
  • Good knowledge of BCP/DR, Incident response, VA/PT and Audit methodologies of various compliance frameworks.
  • Good knowledge of Access management, Network, Application Security, Encryption, Backup, Physical Security, ISMS Training & Awareness etc..
  • Ability to deal with the customers and vendors on Security and privacy matters.
  • Knowledge of Core IT processes, SDLC, network infrastructure will be useful.

Personal Attributes

  • Good written, oral, and interpersonal communication skills.
  • Ability to conduct research into IT security issues
  • Ability to present ideas in business-friendly and user-friendly language.
  • Ability to effectively prioritize and execute tasks in a high-pressure environment.
  • Highly self-motivated and hardworking.

Qualification and certification 

  • Bachelor’s/master's degree in Security, Computer Science, Management Information Systems, Engineering or related field.
  • Should be at least ISO 27001 lead auditor or lead implementer. 
  • 3+ years of related work experience in information security governance, risk and compliance (GRC) or relevant compliance roles in the SaaS industry.

What can you look for?

A wholesome opportunity in a fast-paced environment that will enable you to juggle between concepts, yet maintain the quality of content, interact, and share your ideas and have loads of learning while at work. Work with a team of highly talented young professionals and enjoy the benefits of being here.

We are

It is a rapidly growing fintech SaaS firm that propels business growth while focusing on human motivation. Backed by Giift and Apis Partners Growth Fund II, Company offers a suite of three products - Plum, Empuls, and Compass. Company  works with more than 2000 clients across 10+ countries and over 2.5 million users. Headquartered in Bengaluru, Company  is a 300+ strong team with four global offices in San Francisco, Dublin, Singapore, New Delhi.

Way forward

We look forward to connecting with you. As you may take time to review this opportunity, we will wait for a reasonable time of around 3-5 days before we screen the collected applications and start lining up job discussions with the hiring manager. We however assure you that we will attempt to maintain a reasonable time window for successfully closing this requirement. The candidates will be kept informed and updated on the feedback and application status.

 
Read more
Bengaluru (Bangalore)
3 - 6 yrs
₹20L - ₹30L / yr
Information security
ISO/IEC 27001:2005
Incident management
Systems Development Life Cycle (SDLC)
Acess Management
+1 more

What are we looking for?

An enthusiastic individual with the following skills. Please do not hesitate to apply if you do not match all of it. We are open to promising candidates who are passionate about their work and are team players.

Key Responsibilities & expectations from the candidate 

  • Must have strong experience in Information Security Management system(ISMS), creation of policy, procedures and implementation.
  • Operates as a key contributor to the RFP, Third-Party Risk assessment, cloud security assessment etc.
  • Lead the strategic and tactical development of information security framework, risk management and new compliance initiatives
  • Subject matter expertise in ISO 27001, SOC2, CCPA, CPRA, GDPR, PCI DSS and HIPAA.
  • Must have a strong experience in the documentation process and reviewing MSA, SCC, SLA & DPA.
  • Good knowledge of BCP/DR, Incident response, VA/PT and Audit methodologies of various compliance frameworks.
  • Good knowledge of Access management, Network, Application Security, Encryption, Backup, Physical Security, ISMS Training & Awareness etc..
  • Ability to deal with the customers and vendors on Security and privacy matters.
  • Knowledge of Core IT processes, SDLC, network infrastructure will be useful.

Personal Attributes

  • Good written, oral, and interpersonal communication skills.
  • Ability to conduct research into IT security issues
  • Ability to present ideas in business-friendly and user-friendly language.
  • Ability to effectively prioritize and execute tasks in a high-pressure environment.
  • Highly self-motivated and hardworking.

Qualification and certification 

  • Bachelor’s/master's degree in Security, Computer Science, Management Information Systems, Engineering or related field.
  • Should be at least ISO 27001 lead auditor or lead implementer. 
  • 3+ years of related work experience in information security governance, risk and compliance (GRC) or relevant compliance roles in the SaaS industry.

What can you look for?

A wholesome opportunity in a fast-paced environment that will enable you to juggle between concepts, yet maintain the quality of content, interact, and share your ideas and have loads of learning while at work. Work with a team of highly talented young professionals and enjoy the benefits of being at Xoxoday.

We are

Xoxoday is a rapidly growing fintech SaaS firm that propels business growth while focusing on human motivation. Backed by Giift and Apis Partners Growth Fund II, Xoxoday offers a suite of three products - Plum, Empuls, and Compass. Xoxoday works with more than 2000 clients across 10+ countries and over 2.5 million users. Headquartered in Bengaluru, Xoxoday is a 300+ strong team with four global offices in San Francisco, Dublin, Singapore, New Delhi.

Way forward

We look forward to connecting with you. As you may take time to review this opportunity, we will wait for a reasonable time of around 3-5 days before we screen the collected applications and start lining up job discussions with the hiring manager. We however assure you that we will attempt to maintain a reasonable time window for successfully closing this requirement. The candidates will be kept informed and updated on the feedback and application status.

Read more
technoforte software pvt. ltd.
Hema Chandwani
Posted by Hema Chandwani
Bengaluru (Bangalore)
5 - 8 yrs
₹9L - ₹15L / yr
Shell Scripting
Cyber Security
Endpoint protection
Web application security
Information security
+1 more

Desired Skills

To have skills:

·       Proven technical expertise in cyber security domains, i.e. endpoint security, application security testing.

·       Knowledge and experience in public cloud solutions.

·       Knowledge on network security, networking concepts and architectural implementations.

·       Knowledge on vulnerability testing and define proper remediation’s.
Experience with application, database, and infrastructure security.

·       Shell scripting experience - Shell/Bash/Python.

·       Working experience of Linux operation.

 

Desire to have skills:

·       One or more of the following cyber security certifications: CEH, CISSP, OSCP, SSCP  CCSP.

·       Excellent problem solving, and follow-up skills.

·       Ability to convey technical security concepts to non-technical audiences.

Read more
Bengaluru (Bangalore)
4 - 5 yrs
₹13L - ₹14L / yr
Internal audit
Audit
QMS
Information security
IT security
+1 more
Our client is the Health-tech initiative of India's largest business house. Started in 2015, it empowers healthcare providers and consumers in India. All healthcare monitoring services are made available through an app that will help connect doctors, hospitals, pharmacies, laboratories and consumers, enabling preventive and predictive healthcare. It helps the care-givers to track the entire patient journey from the initial appointment and maintaining their records, generating lab test reports to providing virtual consultation and home-care solutions. It is expected that this futuristic guide will strengthen doctor-patient relationship and enhance the in-clinic experience.
 
As a Associate/ Sr Associate-Information Security, you will be responsible for helping the management in creating IT policies and assisting the various processes and the management team to ensure adherence to the adopted policies and established procedures.

What you will do:

  • Working closely with the external auditors to achieve common goals
  • Conducting Enabling Service Audit (HR, Admin, IT) once in 6 months for the verification of ISMS & QMS Standards
  • Performing ISMS and Internal Audit
  • Being part of the external Audits (ISMS, QMS & CMMI)
  • Managing of implementation of ISMS

 

Desired Candidate Profile

What you need to have:

  • Strong communication and team building skills with proficiency at grasping new technical concepts quickly and utilizing the same in a productive manner
  • Experience in ISO27001, Internal Audits, CMMI    

 

Read more
Yext

at Yext

3 recruiters
Yash Rathod
Posted by Yash Rathod
Hyderabad
5 - 10 yrs
₹5L - ₹15L / yr
IT security
Information security
Security Information and Event Management (SIEM)
Scripting language
Amazon Web Services (AWS)
+1 more

Responsibilities:

The Senior Information Security Engineer is responsible for the implementation, execution and maintenance of technology solutions to mitigate risk, to protect the IT and Engineering environments by reducing the probability of, and to minimize the effects of, damage caused by malware, malicious activities and security events.

The individual will help protect the company by deploying, tuning, and managing security tools across the computing environment, as well as provide security incident response cycle support. They should have a passion and skills for identifying the latest cyber threats. The individual will:



Basic Qualifications

  • Working knowledge of infrastructure-as-code and CI/CD pipelines tools (i.e. Jenkins, Teamcity, CircleCI etc..)
  • Lead and participate in major day-to-day operational aspects of the security engineering team including improvement of current security controls while constantly identifying areas of needed improvement
  • Deep hands-on security experience with cloud providers, such as AWS, GCP, Azure
  • Understanding of automated security testing approaches and tools
  • Experience with proactive integration of security into the development process
  • Lead continuous improvement efforts of out security tools and systems (Concertation on SIEM, IDS, EDR Tools)
  • Work with our customers (Security Operations, Incident Response, and Product teams) to incorporate high quality security alerting into their operational workflows
  • Improve overall security practitioner efficiency through process automation
  • Foster and promote collaboration among all members of the IT, Infrastructure, and Risk Management Departments.


Minimum Qualifications/Requirements

  • BS or MS in Computer Science or related field
  • Minimum 7+ years of cybersecurity experience
  • Must have previous experience performing threat hunting and incident response duties using SIEM tools, cybersecurity management consoles, and ticketing systems
  • Experience in deployment, development, and maintenance of SIEM
  • Experience writing and using Ansible server administration scripts, and create simple Python, BASH, or Powershell scripts to automate cybersecurity functions
  • Scripting experience to automate security operations, alerting, and compliance checks, CI/CD design, deployment, and management
  • Experience with managing endpoint response and detection infrastructure and endpoints at the enterprise level, including performing upgrades to the back end application and deploying new agent versions to endpoints
  • Understanding the investigative process and performing triage for cybersecurity incidents
  • Experience maintaining industry leading security technologies or infrastructure systems in complex technical IT operations environment
  • Must be detail-oriented and organized with ability to handle competing demands while meeting deadlines
  • Experience in authentication protocols and frameworks to include OAuth, and AWS IAM
  • Proactive and motivated; team player with a positive can-do attitude
  • Strong analytical/problem-solving skills and cross-functional knowledge across multiple IT operational and security disciplines
  • Ability to communicate technical concepts to a broad range of technical and non-technical staff
  • Must possess a high degree of integrity, be trustworthy, and have the ability to lead and inspire change
Read more
MNC
Bengaluru (Bangalore)
4 - 6 yrs
₹2L - ₹10L / yr
Requirement Analysis
IT security
Information security
IT security assessment
  • Threat and vulnerability analysis.
  • Investigating, documenting, and reporting on any information security (InfoSec) issues as well as emerging trends.
  • Analysis and response to previously unknown hardware and software vulnerabilities.
  • Preparing disaster recovery plans.

SOC analysts are considered the last line of defense and they usually work as part of a large security team, working alongside security managers and cybersecurity engineers. Typically, SOC analysts report to the company’s chief information security officer (CISO).

SOC analysts need to be detail oriented because they are responsible for monitoring many aspects simultaneously. They need to watch the protected network and respond to threats and events. The level of responsibility typically depends on the size of the organization.

Read more
Net connect
Bengaluru (Bangalore), Pune, Mumbai, Delhi
3 - 8 yrs
₹5L - ₹15L / yr
Cyber Security
IT security
Risk assessment
Information security
ISO/IEC 27001:2005
+2 more

Qualifications & Responsibilities

 

Year of Experience : 3- 8 yrs

 

Location : Bangalore, Delhi, Mumbai, Pune

 

Work on ISO 27001 & NIST based Information Security Management System implementation and sustenance.

-          Responsible for SOX (IT Security Controls) and track the monthly/quarterly/annual control reports and drive effectiveness of SOX controls.

-          Work on Business Continuity Planning, IT Disaster Recovery as per ISO27001 & NIST requirements

-          Assess information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk

-          Conduct Information Systems audits covering IT infrastructure assets

-          Working knowledge in security domains such as: security governance policies and procedures, risk management, compliance, access control, network security, security architecture, security incident response, disaster recovery, business continuity management, privacy and data protection

-          Experience in leveraging industry standards and frameworks such as ISO/IEC 27001, NIST CSF/800-171, etc.

-          Possesses certifications such as ISO27001 LA. CISSP, CISA certification- preferred

 

Why NCG?

 

WHO WE ARE DRIVES WHAT WE DO!

 

We Don't build the organization; we create an everlasting family. Our people express a sense of winning together when times are good and sticking together when times are tough.

 

Are you a Doer or Achiever?

 

Well, at NCG, our doors are Open for Doers and Achievers alike. We are a Cult where we create, innovate, learn and Contribute in a comfortable, transparent, and fair environment.

 

Joining NCG means contributing to a shared ambition for reliable work culture, tackling extraordinary technological challenges in multicultural teams, preserving your work/life balance, and more!

Read more
A leading IT company
Bengaluru (Bangalore)
2 - 5 yrs
₹6L - ₹12L / yr
Information security
ISO/IEC 27001:2005
HIPAA

The Role

We are looking foran Information Security Analyst – Compliance to primarily strengthen our practice towards compliances such as HIPAA, HITRUST,etc. and ensure highest levels of security around sensitive data.

  • Identifying new risks and performing risk assessments.
  • Performing continuous gap analysis.
  • Auditing the applications, configurations, and internal practices against standards such as HIPAA, HITRUST etc.
  • Providing advice and implementing forward-thinking information security policies, procedures, and standards.
  • Assisting several teams (internal and external) with best practicesand security consultations.
  • Supporting with other information security activities as assigned.
  • Ensuring the organizational compliance during audits and certification efforts.

Requirements:

  • Demonstrated experience in implementing and maintaining security standards such as HIPAA, HITRUST, SOC2, ISO 27001 etc.
  • Ability to understand and interpret legal, regulatory, and contractual compliance requirements.
  • Experience in InfoSec policy creation and documentation.
  • Ability to understand technology and pertaining risks.
  • Knowledge on IT, Servers, SDLC, Database, etc.
  • Experience working with / securing cloud-based applications is an add-on.
  • 2+ years of experience.
  • Excellent written and verbal communication skills.
  • Relevant Security Certifications will be a good add-on.
Read more
Banyan Data Services

at Banyan Data Services

1 recruiter
Sathish Kumar
Posted by Sathish Kumar
Bengaluru (Bangalore)
4 - 10 yrs
₹8L - ₹20L / yr
Information security
Splunk
Cyber Security
IT risk management
IT security audit
+9 more

Information Security Specialist

Notice Period: 45 days / Immediate Joining

 

Banyan Data Services (BDS) is a US-based data-focused Company that specializes in comprehensive data solutions and services, headquartered in San Jose, California, USA. 

 

We are looking Information Security Specialist who has the expertise and deep knowledge of Information security regulations, compliance, and SIEM tools, and the ability to develop, describe and implement Security Baselines and Policies.

 

It's a once-in-a-lifetime opportunity to join our rocket ship startup run by a world-class executive team. We are looking for candidates that aspire to be a part of the cutting-edge solutions and services we offer that address next-gen data evolution challenges. 

 

Key Qualifications

 

· Design, deploy, and support Information Security Solutions provided by BDS

 

· Assist clients to carry out the IT Risk Management assessment on both on-prem and cloud platforms

 

· Provide subject matter expertise on IT security compliances during the security audits to meet various security governances.

 

· Research and strategic analysis of existing, and evolving all IT and data security technologies

 

· Establish baselines to define required security controls for all infrastructure components and application stack

 

· Follow latest vulnerabilities and threats intelligence updates across a wide range of technologies and make recommendations for improvements in the security baselines.

 

· Overseeing security event monitoring, understand the impact, and coordinate remediation efforts

 

· Create and optimize the SIEM rules to adjust the specification of alerts in responding to incident follow up

 

· Must be able to work a flexible schedule during off-hours

 

Key Skills & Qualification

 

· Minimum of 4 years relevant work experience in information/cyber security, audit, and compliance

 

· Certifications in any of technical security specialty (e.g., CISA, CISSP, CISM)

 

· Experience in managing SIEM products like Arcsight, Qradar, Sumo Logic, RSA NetWitness Suite, ELK, Splunk

 

· Exposure of the security audit tools on public cloud platforms

 

· Solid understanding of the underlying LINUX/UNIX and Windows OS security architecture

 

· Certified Ethical Hacker would be a plus

 

· Handling of Security audits is a must

 

· Proven interpersonal skills while contributing to team effort by accomplishing related results

 

· Passion for learning new technologies and the ability to do so quickly.

http://www.banyandata.com" target="_blank">www.banyandata.com 

Read more
Hyderabad
2 - 3 yrs
₹7L - ₹8.5L / yr
IT security
Security Information and Event Management (SIEM)
WAF
Firewall
security
+3 more
JOB TITLE : INFORMATION SECURITY Engineer

NOTE- we are looking for hose who can join  immediately or within notic period of 15-20days.
location_;Hyderabad
(wfh till pandemic)
JOB DESCRIPTION
• Job Scope
o Analyse incident in our security devices, conducting investigation and finding the
root cause of incidents.
o Managing endpoint detection security system
o Managing, configuration and fine tuning of on-prem firewall and WAF
o Provide and advise IT team on security and IT related issues such as network
configuration, firewall configuration, etc
o Ensuring all utilized cloud services are secured and the configuration comply to best
practices benchmark
o Communicate risk and recommendations to mitigate risk to the senior
administration by communicating in non-technical format
o Assists other department to ensure regulatory compliance to any necessary
compliance
• Minimum Requirements
o At least 2 years of experiences in managing endpoint detection system, WAF and
FW.
o Hands on experience on cloud environment preferably Microsoft Azure.
o Bachelor’s degree of any IT related courses.
o Strong understanding of incident detection and response process and procedure
o Strong knowledge in networking and in operating system such as
Linux/Unix/Windows
Read more
netmedscom

at netmedscom

3 recruiters
Vijay Hemnath
Posted by Vijay Hemnath
Chennai
5 - 10 yrs
₹10L - ₹30L / yr
Information security
IT security
WAF
Docker
Ethical Hacking
+16 more

We are seeking a Security Program Manager to effectively drive Privacy & Security Programs in collaboration with cross functional teams. You will partner with engineering leadership, product management and development teams to deliver more secure products.

 

Roles & Responsibilities:

  • Work with multiple stakeholders across various departments such as IT, Engineering, Business, Legal, Finance etc to implement controls defined in policies and processes.
  • Manage projects with security and audit requirements with internal and external teams and serve as a liaison among all stakeholders.
  • Managing penetration tests and security reviews for core applications and APIs.
  • Identify, create and guide on privacy and security requirements considering applicable Data Protection Laws and implement them across software modules developed at Netmeds.
  • Brainstorm with engineering teams to figure out how privacy and security controls can be applied to Netmeds tech stack.
  • Coordination with Infra Teams and Dev Teams on DB and application hardening, standardization of server images / containerization.
  • Assess vendors' security posture before onboarding them and after they qualify, review their security posture at a set frequency.
  • Manage auditors and ensure compliance for ISO 27001 and other data privacy audits.
  • Answer questions or resolve issues reported by the external security researchers & bug bounty hunters.
  • Investigate privacy breaches.
  • Educate employees on data privacy & security.
  • Prioritize security requirements based on their severity of impact and product roadmap.
  • Maintain a balance of security and business values across the organisation.

 Required Skills:

  • Web Application Security, Mobile Application Security, Web Application Firewall, DAST, SAST, Cloud Security (AWS), Docker Security, Manual Penetration Testing.
  • Good hands-on experience in handling tools such as vulnerability scanners, Burp suite, patch management, web filtering & WAF.
  • Familiar with cloud hosting technologies (ex. AWS, Azure). Understanding of IAM, RBAC, NACLs, and KMS.
  • Experience in Log Management, Security Event Correlation, SIEM.
  • Must have strong interpersonal skills and should be able to communicate complex ideas seamlessly in written and verbal communication.

 

Good to Have Skills:

  • Online Fraud Prevention.
  • Bug Bounty experience.
  • Security Operations Center (SOC) management.
  • Experience with Amazon AWS services (EC2, S3, VPC, RDS, Cloud watch).
  • Experience / Knowledge on tools like Fortify and Nessus.
  • Experience in handling logging tools on docker container images (ex. Fluentd).
Read more
openDr Business Services Pvt Ltd
Mumbai
10 - 15 yrs
₹10L - ₹15L / yr
IT infrastructure
Network Security
Information security
Routing & Switching

As an IT Infrastructure Architects design and implement information systems that support an enterprise infrastructure. You will provide the necessary technical infrastructure for the development of new and existing infrastructure technologies and system requirements. 


Improve efficiency and streamline operations. enhance design specs, create technical documentation, implement control concepts and deliver expected outcomes. Collect performance data to monitor systems resource usage and failures rates and provide solutions and recommend changes. ensure scalability and anticipate capacity growth through careful planning and awareness of industry, business and client’s growth trends. Design activities rely on accurate data, sensible KPIs and performance metrics to improve processes and bridge gaps


Primary Responsibilities:


Conducting research on emerging and existing technologies. Recommend system alternative technologies and infrastructure development efforts that increase infrastructure flexibility, reliability, stability, scalability, resilience, availability, performance and cost effectiveness. All collective research efforts will contribute to the creation of architectural road maps that leverage software and cloud technologies. Research customer interaction, policy adherence, enterprise processes. May act as the subject matter expert of architectural virtualization.


Needs to guide in execution of Incident, Change, Release, Problem, Performance, and Availability Management


Security of all infrastructure is of paramount importance and is periodically audited, monitored and updated in keeping up with latest threats and risks.


Identifying best practices for future implementation. Architects provide feedback to the enterprise and incorporate all gathered information into future integration plans.


Provides DevOps thought leadership and mentoring in both advisory and delivery contexts, focusing on the requirements of Technology and Business and how these are best served by continuous improvements to our delivery approach



Required Technical skills and Experience


  • Over 10+ years of experience as IT Infrastructure Architect
  • Bachelor / Masters Degree in Computer Science, Information Technology or related field
  • Must have experience in Infrastructure architecting on AWS/ Azure/ Google cloud.
  • Should have a very good understanding of Cloud Native services (IaaS, PaaS, SaaS) platforms for application deployment and scalability in a cost effective manner, addresses scalability, availability, service continuity (DR), performance and security requirements. auto-scaling and self-healing.
  • Has hands on experience with cloud orchestration using Kubernetes or apache Mesos on marathon would be an advantage
  • Evangelizing microservices-based architectures using containerized applications; help to drive strategy and implementation of cloud native infrastructure
  • Sound Knowledge of RDBMS, preferably with MYSQL Mongo, Elasticsearch, Redis. Working knowledge of, CDN/WAF 
  • Proven expertise on Linux, and DevOps tools such as Git, Jenkings, maven, Bamboo Docker, Puppet, Ansible,Kubernetes,terraform. Elastic Beanstalk, Openshift
  • Infrastructure security (VPC, tunneling, API management, Governance) and networking security solutions like routing, switching, Firewalls etc.
  • Good debugging skills on Linux, Apache, Nginx, PHP, MYSQL and cloud-based application and administration of RHEL, CentOS/Ubuntu
  • Experience in Cloud scale APM and Monitoring Tools such as ELK ,Splunk, Nagios, Graffana, XMON Datadog, Dynatrace, Appdynamics, Cloud Monitoring.
  • Troubleshoot and debug environment and infrastructure problems found in the production and non-production environments.
  • Implements security improvements by assessing current situations; evaluating trends; anticipating requirements.
  • Determines security violations and inefficiencies by conducting periodic audits.
  • Upgrades system by implementing and maintaining security controls.
  • Must have knowledge of leading storage backup solutions.
  • Experience with one or more Unix shell scripting languages (Bash, C-Shell)
  • Team mentoring and support for ramping up new engineers
  • Provide leadership in planning, defining requirements, scoping efforts, and setting appropriate milestones
  • Using a data-driven process/mindset, author technical content to support the incident response process (e.g. postmortem/root cause analysis) and develop interim solutions to prevent or quickly resolve issues/problems the next time.
  • Experience with networking technologies (routing, switching, IP addressing, DNS, Load balancers, etc.) Knowledge of :  - File systems, NFS, CIFS, iSCSI - IPv4 networking, including TCP/IP, SMTP/POP/ IMAP, HTTP/S, LDAP – DNS
  • Ability to work independently while tackling complex problems
  • Passionate to palm ownership and responsibility of the systems - 24x7
Read more
Open Finanacial Technologies
Bengaluru (Bangalore)
4 - 8 yrs
₹12L - ₹18L / yr
Information security
ISO/IEC 27001:2005
PCI DSS
ISO 27001
CISO

What you’ll be doing:
  • Establish, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program
  • Work directly with the business units to facilitate risk assessment and risk management processes
  • Develop and enhance an information security management framework
  • Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services
  • Provide leadership to the enterprise's information security organization
  • Partner with business stakeholders across the company to raise awareness of risk management concerns
  • Assist with the overall business technology planning, providing a current knowledge and future vision of technology and systems
  • Conduct regular internal audits in compliance with applicable legal and contractual requirements, ISO 27001 and PCI DSS requirements and companies internal requirements
  • Conduct regular Management reviews and update the management on information security aspects. The MRMs shall also focus on drawing Management attentions to the key areas for required management actions.
  • CISO is also responsible to ensure customer audits as well as re-certification and surveillance audits and successful.
  • Coordinate with relevant stakeholders to address the NC closures.
  • CISO shall ensure the information incidents are responded and resolved on time to ensure compliance with legal and contractual requirements.

What you’ll bring along:

  • Degree in business administration or a technology-related field required.
  • Professional security management certification
  • Minimum of 5 years of experience in a combination of risk management, information security and IT jobs
  • Knowledge of common information security management frameworks, such as ISO/IEC 27001, and PCI DSS.
  • Excellent written and verbal communication skills and high level of personal integrity
  • Innovative thinking and leadership with an ability to lead and motivate cross-functional, interdisciplinary teams
  • Experience with contract and vendor negotiations and management including managed services.
  • Specific experience in Agile (scaled) software development or other best in class development practices.
  • Experience with Cloud computing/Elastic computing across virtualized environments.
Read more
ShoppinPal

at ShoppinPal

5 recruiters
Akram  Shaikh
Posted by Akram Shaikh
Remote, Pune
5 - 9 yrs
₹12L - ₹25L / yr
NodeJS (Node.js)
Javascript
Microservices
Go Programming (Golang)
DevOps
+5 more

Our ideal candidate is someone who is an exceptional JS developer with significant experience on React and Node. You should be able to build and support complex applications single-handedly with a keen eye towards UX, design, security and performance. Additionally you will need to have a basic understanding of microservices, API integrations to aid in achieving our vision of building the most robust and scalable integration platform in the B2B Retail + Food verticals. You will be responsible for architecture, design and implementation of the entire system to support thousands of customers globally. Our stack is primarily built around Node, PHP, React, Angular, Mongo, PHP and advanced Infra and DevOps tools such as Kubernetes, Grafana, Prometheus, ELK and more.

Mentoring should come naturally to you, as well as finding the right balance towards process and documentation.

Highlights:
1) You will be working on interesting technical challenges in a product centric and open-source driven environment.
2) You will help set a very high bar on code quality with a focus on test driven development and writing highly performant, fault tolerant and secure code.
3) You will take ownership of product features from conception to implementation, testing deployment and support.
4) A lot of freedom on when and where you work from - just get stuff done.
5) You will open source as much as possible, and blog about cool things that you learnt and built.
6) You will help define who we become as a company.
7) You will get stock options in line with silicon valley standards.


Caveats:
1) We have a strict no-divas rule. There are a lot of smart engineers on the team but no one with an attitude / superiority complex.
2) If you think writing tests for your code, writing docs, doing customer support etc are not your cup of tea, this isn't the right role for you.
3) Similarly, if you're viewing this just as a 20-40% increment opportunity over your current compensation, this isn't the right role or company for you.


This role can be the growth opportunity of a lifetime for anyone who has been operating as a backend lead and wants to grow into a fullstack CTO. Check out the links below if you'd like to learn more about us. We encourage people from underrepresented groups to apply.

1) Why ShoppinPal? - https://www.youtube.com/watch?v=cE7DgtwA0ws" target="_blank">https://www.youtube.com/watch?v=cE7DgtwA0ws
2) Our hiring philosophy and process http://techstory.in/building-startup-team/" target="_blank">http://techstory.in/building-startup-team/
3) Our culture- https://www.shoppinpal.com/culture">https://www.shoppinpal.com/culture

Read more
NCR (Delhi | Gurgaon | Noida), Bengaluru (Bangalore)
4 - 7 yrs
₹6L - ₹9L / yr
Information security
Security Engineer
IT security
Network Security
security
+6 more
Exclusively for candidates who is on a career break of minimum 2 years

· Self-driven individuals with 4 to 7 years of relevant information security experience.
· Should have adequate experience in dealing with disparate teams.
· Previous experience on medium and large platforms, with multiples technologies/vendor.
· Worked under high pressure situations (priority incidents/urgent delivery)

Essential Requirements:
· Hands on experience on NGFW such Cisco, Juniper, CheckPoint, F5/ASM
· Hands on experience on IDS/IPS management, Web Proxy, Application Firewalls; Load Balancers.
· Hands on vulnerability scanning experience.
· Hands on NAC management , Cisco ISE, RSA SecureID experience.
· Knowledge of Information security standards, policies, controls and structures prevalent in the industry.
· Strong technical understanding of network fundamentals(Routing, Switching) and common Internet protocols( HTTP, SNMP, TLS, DNS etc.)
· Experience in regular operational/health check of platforms and applications.
· Experience in writing Operational documents such as system operating guides.

Desirable Requirements:
· Previous working experiences with managing SIEM platform.
· Previous experience in security monitoring and incident response.
· Sound understanding of IT Service Management disciplines in line with IT industry standards and best practices, e.g. ITIL
· Routing, Switching knowledge
· Unix, Windows Operating system knowledge
Read more
Pune, Bengaluru (Bangalore)
10 - 15 yrs
₹20L - ₹45L / yr
Information security
Security operations
Penetration testing
Security analysis
Cyber Security
+1 more
Security Architectural solutions, designing, Security Analysis, Infrastructure architecture, Application architecture, DevSecOps and cloud understanding, Threat Modelling, Penetration testing, Governance Risk & Compliance
Read more
Hyderabad
3 - 10 yrs
₹4L - ₹18L / yr
Logstash
Elastic Search
Information security
Kibana
ELK
+1 more
  • ELK (Elasticsearch, Logstash Kibana) Administration and Implementation.
  • Experience on implementing the Syslog NG on Unix/Linux Platform.
  • Experiance in Information/Cyber Security
Read more
Remote, PAN India
3 - 15 yrs
₹6L - ₹15L / yr
Artificial Intelligence (AI)
Machine Learning (ML)
Internet of Things (IOT)
Information security
Cloud Computing
+1 more

Professor:

To drive the campus academic operations in close coordination with,

    a) Head of Departments. b) Faculty members c) Students

To create an 'IT centre of excellence' at the campus.

Should have driven the academic function of IT dept.

Should have experience of handling the academic operations

Associate / Assistant Professor:

Adhering to university time line (other the new courses)

To ensure coverage of Syllabus as per university standards

Learning Outcome

Examination Result ( Includes both Internal & Main Exams)

Knowledge Improvement Program

Innovation & Development

 

Technical Skills:

  • General: C++, Java, OS, RDBMS, Software Engg, Data Structure etc
  • Niche technologies like Cloud, Mobility, Information security, Data Science, IoT and Artificial Intelligence to name a few

 

 Behavioural Competencies:

  • Strong Leadership Qualities              
  • Excellent Communication skills              
  • Strong interpersonal skills to work with diverse teams        
  • Strong Presentation Skills

 

Qualification: B.Tech, M.Tech & Ph.D - Completed / Pursuing

Year of Exp:

  • Professor: Min 12+ years of exp post PG and 5 years post Ph.D
  • Associate Professor: Min 10+ years of exp post PG and 3 years post Ph.D
  • Assistant Professor: 2+ years exp

 

How you match

 
Criteria provided by job poster

Skills

  • Match
     
    Teaching
  • No match
    Data Privacy
  • No match
    Internet of Things (IoT)
  • No match
    Artificial Intelligence (AI)
  • No match
    Curriculum
  • No match
    Network Security
  • No match
    Presentation Skills
  • No match
    Information Security
  • No match
    RDBMS
  • No match
    Interpersonal Skills.
Read more
CloudSEK

at CloudSEK

1 recruiter
balaji pandian
Posted by balaji pandian
Bengaluru (Bangalore)
1 - 4 yrs
₹8L - ₹10L / yr
Cyber Security
Information security
Penetration testing
Responsibilities
1. Monitor the quality of results of the automated system in the detection of attacks,
intrusions, and unusual, unauthorized or illegal activities.
2. Build and maintain scripts that collect cyber threats data from external sources as well as
from the in-house analytics engine, data quality inspection, and dataset creation for ML
with manual annotation.
3. Assist Data Scientists & Machine Learning Engineers in developing systems that
automate risk assessment/mitigation workflows.
4. Keep up to date with the latest security and technology developments.
5. Research and evaluate emerging cybersecurity threats and ways to manage them.
Required skills
1. Attention to details and a quality first mindset.
2. Knowledge of current hacking techniques, vulnerabilities, and security analysis
techniques.
3. Basic programming experience, and the ability to automate tasks.
4. Manual code review or source code analysis experience.
Note: We are a startup, you will have much more responsibilities.
Benefits
1. A competitive salary.
2. Health Insurance.
3. An awesome team that will challenge and respect you.
4. Lunch, Unlimited snacks and drinks.
5. Top notch office in the heart of Bangalore City.
Read more
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Why apply via Cutshort?
Connect with actual hiring teams and get their fast response. No spam.
Find more jobs
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort