IT Auditor

at Technomech Consultancy

DP
Posted by Laxmi Ghoble
icon
Pune, Mumbai, Bengaluru (Bangalore)
icon
5 - 12 yrs
icon
₹15L - ₹25L / yr
icon
Full time
Skills
CISA
CISSP
Cyber Security
Information security
CEH
IT audit
IT security audit
Ethical Hacking
CISACISM CISSP CEH

Position: IT Auditor

Experience: 4-12 Years

Location: Pune

Key Skills Required:

CISA, CISSP, CISM, IT Audit, Technology Audit, IT Infrastructure Audit, Application Security Audit, Information Security Audit, Cyber Security Audit, Cloud Security, Ethical Hacker

Additional key words: Vulnerability assessment, Penetration Testing, ITGC testing, Cloud Computing,

 

 

IT AUDITOR is responsible to plan and perform the audit assignment starting from audit announcement, audit planning, field work, audit quality reviews, pre-closing / closing meetings with the respective Directors / Head of the Departments including writing of the audit report and its finalization as well as follow up of the audit actions. Additionally IT AUDITOR will also be responsible to:
•    Evaluate IT systems, processes and projects in place;
•    Determine risks to the Group’s information assets, and help identify methods to minimize those risks;
•    Ensure information management processes are in compliance with IT-specific laws, policies and standards;
•    Determine inefficiencies in IT systems, IT projects and associated management processes and
•    Consult in IT projects, new initiatives and organizational frameworks.

Description

 

Audit Planning

1)    Perform audits at Volkswagen Group entities. and other concerned Volkswagen Group Companies with focus on IT processes keeping the associated business risks in mind.
2)    Participate in the preparation of audit objective & scope document along with audit schedule based on the audit objective and timeline specified by Head of IT Audit India Hub.
3)    Participate in the preparation of work program

Audit Process

1)     Prepare and conduct preparatory interviews with the Directors and Heads of the audited departments to identify the processes to be assessed during the audit.
2)     Request and collect relevant audit data for analysis from respective business areas.
3)     Prepare audit matrix on periodic basis to record the audit field work and update the progress of the audit to IT Audit Manager and the Head of IT Audit Hub India.
4)    Define actions including relevant controls to mitigate the business risks identified based on the evidences provided during the audit.
5)    Organize and conduct pre-closing meetings with business areas to agree upon audit observations and relevant actions.
6)    Prepare and conduct closing meetings with the Directors / Heads of the Department for audited division to agree upon the audit observations, risks and proposed actions.
7)    Prepare the draft audit report and submit the same to the  IT Audit Manager and the Head of IT Audit India Hub for review.
8)    Ensure that adequate documentation is prepared for the audit assignment. Peer review changes are done before release of the final audit report to the business area.
9)    Contact business area to review the progress of the implementation of audit actions defined in the final audit report. Based on the review, write the status of the follow up and submit the same for upload in RIAS.
10)    Obtain necessary certifications / qualifications to support the job requirements by attending relevant trainings
11)    Support the conduction of unscheduled audits/special investigations and audits from the anti-corruption system.
12)    Relevant knowledge is shared among the team members.
13)    Consult in IT projects, new initiatives and organizational frameworks.
14)    Ensure information management processes are in compliance with IT-specific laws, policies and standards.
15)    Determine risks to the Group’s information assets, and help identify methods to minimize those risks.
16)    Evaluate IT systems, processes and projects in place.
17)    Determine inefficiencies in IT systems, IT projects and associated management processes.

About Technomech Consultancy

Founded
2009
Type
Services
Size
20-100 employees
Stage
Profitable
View full company details
Why apply to jobs via Cutshort
Personalized job matches
Stop wasting time. Get matched with jobs that meet your skills, aspirations and preferences.
Verified hiring teams
See actual hiring teams, find common social connections or connect with them directly. No 3rd party agencies here.
Move faster with AI
We use AI to get you faster responses, recommendations and unmatched user experience.
2101133
Matches delivered
3712187
Network size
15000
Companies hiring

Similar jobs

Information Security- Financial

at IT services provider based out of the US

Agency job
via Jobdost
IT security
IT security audit
Information security
Security audit
ITGC
GRC
Cyber Security
General Ledger
Fraud
Budget
SSAE
SOC Audits
GDPR
TPRM
Infosec
ISMS
cloud security
balance sheet
icon
Bengaluru (Bangalore)
icon
3 - 5 yrs
icon
₹12L - ₹16L / yr

Job description- Information Security(Financial)

Roles and Responsibilities

HTC Global Security Delivery Centre will provide a professional opportunity to work in a dynamic environment where you will have the ability to develop process and Cyber security based skills

 

Work profile of individual

  • As part of the companyC Global cyber security consulting team, individual’s primary role would be to be a part of ISO 27k projects IT audits, ITGC audits, SSAE, SOC audits, IT Process Audit, Systems Audit, Gap assessment TPRM, GDPR, Infosec, GRC , ISMS, Cyber Security, SOX ITGC on customer engagements
  • Will address all aspects of security like physical, logical, data, access etc and review Information Security policy and suggest / recommend necessary changes to the same on customer engagements
  • Will be an active participant in internal / third party system security reviews and audits on customer engagements.
  • Will perform internal audits on all aspects of IT and ensure compliance with the prescribed security norms on customer engagements and will be responsible for tracking the open audit findings and closure of the same
  • Will be able to manage document tracking and updating - policies, processes, procedures, templates etc.
  • Will assist in developing proposals by owning parts of the proposal document and by giving inputs in solution design based on areas of expertise.
  • Will demonstrate ability to clearly and concisely communicate the privacy implications of technology and implementation.

 

Team work

  • Individual would be responsible for contributing to a strong team environment and promoting a positive working relationship with their colleagues.
  • Individual would predominately work with off-shore engagement teams and relevant HTC Territory teams on presale and cyber security delivery.
  • Communication, written and verbal, with these teams would be expected.
  • Team members would be required to apply learning from trainings and on the job experience to work requests and support continuous process improvement.
  • Team members would be required to handle multiple tasks at the same time.
  • Detailed focus when performing work and good project management skills when managing workload and maintaining timelines will be necessary.

Desired Candidate Profile

  • Bachelors
  • Certifications (ISO 27001/ ISO 31000/ or equivalent and other relevant qualification/certification
  • Experience : 3-5 years

 

Knowledge Required:

  • Strong knowledge of information security concepts, risk and controls concepts. Strong understanding of security principals: audit, policies, guidelines, and compliance.
  • Understanding of infrastructure (data centre, network end user computing) security / cloud security / managed security services / security operations centre / compliance risk management and ITGC controls
  • Sound knowledge of Internal financial Controls and Compliance. Must be able to recommend controls around people, process, and technology.
  • Sound knowledge of General Leger / Balance Sheet / Journal Entry / Budgeting / Financial fraud
  • Sound knowledge on business controls and process controls. Good experience with control assessment, check the effectiveness of the implemented controls and recommend mitigation / improvements.
  • Experience with the Microsoft Office suite of products (i.e. Word, Excel, PowerPoint, Visio, etc.),
  • Strong verbal and written communication skills Knowledge / experience in fields of ITGC audits, Internal Audit, External Audit / Statutory Audit projects
  • Candidates should exhibit good client service skill collateral's with a strong focus on building relationships.

 

Additional Responsibilities:

 

  • Ability to develop value-creating strategies and models that enable clients to innovate, drive growth and increase their business profitability
  • Good knowledge on software configuration management systems and license Management systems
  • Awareness of latest technologies and Industry trends
  • Logical thinking and problem solving skills along with an ability to collaborate
  • Understanding of the financial processes for various types of projects and the various pricing models available
  • Ability to assess the current processes, identify improvement areas and suggest the technology solutions
  • One or two industry domain knowledge
  • Client Interfacing skills
  • Project and Team management
Job posted by
Mamatha A

Information Security- Network

at IT services provider based out of the US

Agency job
via Jobdost
Information security
Network Security
IT security
IT security audit
ITGC
Cyber Security
GRC
Risk Management
IT risk
Internal audit
SSAE
SOC
ISMS
IT controls
external audit
statutory audit
cloud security
icon
Bengaluru (Bangalore)
icon
5 - 5 yrs
icon
₹10L - ₹12L / yr

Job description – Information Security (Network)

Roles and Responsibilities

Company will provide a professional opportunity to work in a dynamic environment where you will have the ability to develop process and Cyber security based skills

 

Work profile of individual

  • As part of the company cyber security consulting team, individual’s primary role would be to work with ISO 27k projects IT audits, ITGC audits, SSAE, SOC audits, IT Process Audit, Systems Audit, Gap assessment TPRM, GDPR, Infosec, GRC , ISMS , Cyber Security, SOX ITGC on customer engagements
  • Will address all aspects of security like physical, logical, data, access etc and review Information Security policy and suggest / recommend necessary changes to the same on customer engagements
  • Will be an active participant in internal / third party system security reviews and audits on customer engagements
  • Will perform internal audits on all aspects of IT and ensure compliance with the prescribed security norms on customer engagements and will be responsible for tracking the open audit findings and closure of the same
  • Will be responsible for implementation of new projects under Information Security Domain
  • Will be able to manage document tracking and updating - policies, processes, procedures, templates etc.
  • Will assist in development of proposals by owning parts of the proposal document and by giving inputs in solution design based on areas of expertise.
  • Will engage with clients and(or) application development teams for implementation of cyber security & data privacy by design and data protection controls.
  • Will support the clients with ongoing design, implementation and maintenance of the data privacy framework for managing data protection risk including responding to legislation, devising and owning policies and training.
  • Will demonstrate ability to clearly and concisely communicate the privacy implications of technology and implementation.

 

Team work

  • Individual would be responsible for contributing to a strong team environment and promoting a positive working relationship with their colleagues.
  • Individual would predominately work with off-shore engagement teams and relevant  teams on presale and cyber security delivery.
  • Communication, written and verbal, with these teams would be expected.
  • Team members would be required to apply learning from trainings and on the job experience to work requests and support continuous process improvement.
  • Team members would be required to handle multiple tasks at the same time.
  • Detailed focus when performing work and good project management skills when managing workload and maintaining timelines will be necessary.

 

Desired Candidate Profile

  • Bachelors
  • Certifications (ISO 27001/ ISO 31000/ CISA/ CISSP/ CSX or equivalent and other relevant qualification/certification
  • Experience : 3-5 years

Knowledge Required:

  • Strong knowledge of information security concepts, risk and controls concepts. Strong understanding of security principals: audit, policies, guidelines, and compliance.
  • Good understanding of infrastructure (data centre, network end user computing) security / cloud security / managed security services / security operations centre / compliance risk management and ITGC controls
  • Good understanding of technical security like network security, operating system, encryption, use of tools and technologies for various processes like logical access control, network security, security monitoring etc.
  • Sound knowledge of Internal Controls and Compliance. Must be able to recommend controls around people, process, and technology.
  • Sound knowledge on IT controls (especially IT risks). Good experience with control assessment, check the effectiveness of the implemented controls and recommend mitigation / improvements.
  • Good knowledge on Privacy, Governance and reporting
  • Experience with the Microsoft Office suite of products (i.e. Word, Excel, PowerPoint, Visio, etc.),
  • Strong verbal and written communication skills Knowledge / experience in fields of ITGC audits, Internal Audit, External Audit / Statutory Audit projects
  • Candidates should exhibit good client service skill collateral's with a strong focus on building relationships.

 

Additional Responsibilities:

 

  • Ability to assist in value-creating strategies and models that enable clients to innovate, drive growth and increase their business profitability
  • Good knowledge on software configuration management systems and license Management systems
  • Awareness of latest technologies and Industry trends
  • Logical thinking and problem solving skills along with an ability to collaborate
  • Understanding of the financial processes for various types of projects and the various pricing models available
  • Ability to assess the current processes, identify improvement areas and suggest the technology solutions
  • One or two industry domain knowledge
  • Client Interfacing skills
  • Project and Team management
Job posted by
Mamatha A

Security Researcher

at Appknox

Founded 2014  •  Product  •  20-100 employees  •  Profitable
Cyber Security
Mobile security
Vulnerability assessment
Penetration testing
IT security audit
IT security
Data security
API
Web application security
icon
Remote, Bengaluru (Bangalore)
icon
2 - 5 yrs
icon
Best in industry

A BIT ABOUT US

 

Appknox is one of the top Mobile Application security companies recognized by Gartner and G2. A profitable B2B SaaS start-up headquartered in Singapore & working from Bengaluru.

The primary goal of Appknox is to help businesses and mobile developers secure their mobile applications with a focus on delivery speed and high-quality security audits.

 

Appknox has helped secure mobile apps at Fortune 500 companies with Major brands spread across regions like India, South-East Asia, Middle-East, US, and expanding rapidly. We have secured 300+ Enterprises globally.

 

We are a 30+ incredibly passionate team working to make an impact and helping some of the biggest companies globally. We work in a highly collaborative, very fast-paced work environment. If you have what it takes to be part of the team, we are excited and let’s speak further.

 

The Opportunity

 

To join the security team engaging with multiple clients, helping them with end to end security audits, also research about new topics and vulnerabilities to be added to the scanner, present it in conferences.

What An Ideal Candidate Would Look Like: 

  • Skills - Application Penetration Testing (Web, iOS and Android), experience with IoT testing, source code audits.
  • Technology Stack: AWS, GCP, Objective C, Java, Python
  • Responsibilities: Engage with clients for scoping call, perform security audits, remediation call with clients to patch the issues, research on new technologies/vulnerabilities

Minimum Requirements

  • Should have at least 2 years experience in security or show something that proves experience doesn’t matter
  • Strong Analytical Skills
  • Strong grasp of fundamentals of information security
  • Self-taught learner willing to read and keep up-to-date on technological changes and how they could be used
  • Can accurately define an issue and create detailed Proof-of-concept and write-up of the findings.
  • Provide appropriate remediation and mitigations of the identified vulnerabilities.

Responsibilities

  • Security assessment of web/mobile/cloud application on various platforms
  • Focusing on Mobile Application Security
  • Static and Dynamic Code Analysis
  • Develop and interpret security standards and guides
  • Automation of security test cases
  • Understand and explain the results with impact on business and compliance status
  • Continuously learning and training on latest tools and technique

 

 

Work Expectations

Within 1 month

Training on processes, security workflow

Within 3 months

Pentesting web, mobile, API endpoints

Within 6 months

Research and publish whitepapers, contribute to the Appknox Scanner


Personality traits we really admire:-

  • A confident and dynamic working persona, which can bring fun to the team, and a sense of humour, is an added advantage.
  • Great attitude to ask questions, learn and suggest process improvements.
  • Has attention to details and helps identify edge cases.
  • Highly motivated and coming up with fresh ideas and perspective to help us move towards our goals faster.
  • Follow timelines and absolute commitment to deadlines.

Interview Process - 

  • Round 1 Interview - Profile Evaluation; HR
  • Round 2 - Testing Assignment
  • Round 3 - Technical Interview with security team members
  • Round 4 - Technical Interview with the CTO and Team Lead
  • Round 5 - HR Round

Compensation

  •  As per industry standards

 

Why Join Us:-

  • Freedom & Responsibility: If you are a person who enjoys challenging work & pushing your boundaries, then this is the right place for you. We appreciate new ideas & ownership as well as flexibility with working hours.
  • Great Salary & Equity: We keep up with the market standards & provide pay packages considering updated standards. Also as Appknox continues to grow, you’ll have a great opportunity to earn more & grow with us. Moreover, we also provide equity options for our top performers.
  • Holistic Growth: We foster a culture of continuous learning and take a much more holistic approach to train and develop our assets: the employees. We shall also support you all on that journey of yours.
  • Transparency: Being a part of a start-up is an amazing experience one of the reasons being open communication & transparency at multiple levels. Working with Appknox will give you the opportunity to experience it all first-hand.
  • Health insurance: We offer health insurance coverage upto 5 Lacs for you and your family including parents.
Job posted by
Anushka Tharad

Security (AM/Executive)

at An Indian energy and power company.

Agency job
via Jobdost
Network Security
Cyber Security
IT security
Web application security
icon
Ahmedabad
icon
3 - 10 yrs
icon
₹5L - ₹15L / yr
Torrent Power is an Indian energy and power company, having interests in power generation, transmission, distribution and manufacturing and supply of power cables.

Security (AM/Executive)

• To design the security infrastructure / policies for the organisation, implement & monitor the same
• To ensure security compliance with respect to recommendations received from government agencies like CEA, NCIIPC
• Design, review, implement & monitor IT security related controls as part of Internal
• Controls, IFC, ERM
• ISMS certification (ISO 27001) for IT systems; this will include preparation and periodic review of policies and SOPs, regular trainings and maintaining records in prescribed formats
• Conducting internal security audit and generating reports by deploying VA tools
• Periodic security/VAPT audits and implementation of the findings
• IT security related new initiatives like - Security Operations Centre (SOC), Security Information and Event Management (SIEM), cloud security, EMM-enterprise mobility management
• Creating IT Security awareness within the organisation
Job posted by
Sathish Kumar

Incident Response Lead

at A digital cyber security company presence across Globe.

Agency job
via Jobdost
Web application security
Network Security
Cyber Security
IT security
Security
DevOps
Data Analytics
Network Administration
Digital Investigation
computer forensics
Ranson Specialist
sentinelOne
icon
Remote, Hyderabad
icon
8 - 12 yrs
icon
₹35L - ₹50L / yr

Job Summary:  

The Incident Response (IR) Lead manages a team of experts with diverse skill setsincluding Security Operations Center (SOC), Forensics, and technical Subject Matter Expert (SME) advisory. The IR Lead is specifically tasked with managing all aspects of an Incident Response engagement to include incident validation, monitoring, containment, log analysis, system forensic analysis, and reporting. The Incident Response Lead is also responsible for building the relationship with the client and client’s counsel and ensuring the engagement’s objectives and expectations are met and executed successfully as documented in the statement of work. You will leverage a solid foundation of technical expertise in Cybersecurity, Incident Response, and Digital Forensics to successfully execute your responsibilities.

 

ROLES AND RESPONSIBILITIES

· Accurately collects information from the client concerning the incident to include but not be limited to the client’s environment, size, technology, and security threats. In addition, the IR Lead is responsible for capturing all client’s expectations and objectives throughout the engagement to ensure successful delivery.

· The main point of contact manages and participates in all communications with the client and the client’s counsel during the engagement. The IR Lead sets the cadence for communications.

· Management and Coordination of all technical efforts for the IR engagement to drive the process forward through; tool deployment, ransomware decryption, restoration, and recovery efforts, system rebuilds, system, application, and network administration tasks.

· Coordinates with the Ransom Specialist when ransom negotiations are needed. Ensures updates regarding ransom status are delivered to the client and counsel in a timely fashion.

· Manages and coordinates the onsite efforts with the Onsite Lead or team ensuring they understand and can execute the objectives for the onsite work. Additional responsibilities with onsite efforts include ensuring communications are frequent and getting the daily onsite update communicating these back to the IR Director and/or IR Ops Associate for their Tiger Team.

· Ensures the Forensic Lead is coordinating the collection of data necessary for the investigation.

· Ensures SentinelOne is deployed on time and adding value.

· Communicates with sales when appropriate for SentinelOne, provide client contact.

· Communicates in tandem with the Forensic Lead pertinent findings to the client during the investigation.

· Follows up with the SOC Lead on SentinelOne alerts and encourages/coordinates client participation with the product.

· Accountable for final report review, ensuring the report is accurate, professional, and meets the objective of client counsel.

· Other duties as assigned.

DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties, and skills required personnel so classified.

 

 Role Description : Skills & Knowledge

1. Experience leading scoping calls

2. Strong background and practical hands-on experience with Windows or Linux System and Network Administration, Security DevOps, Incident Response and Digital Forensics, or Security Engineering

3. Practical experience performing in a functional role including but not limited to one or more of the following disciplines: computer forensics, Incident Response, data analytics, Security Operations, and Engineering, Digital Investigations

4. Possesses strong verbal and written communication skills

JOB REQUIREMENTS

· Bachelor's degree in Computer Science, Computer Engineering, Information Assurance, Forensic Sciences, or related technical field; Graduate degree preferred

· 10+ years experience leading full-cycle incident response investigations and communicating with the client/counsel/carriers

· Must be eligible to work in the US without sponsorship

WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodations may be made to enable people with disabilities to perform the essential functions of this job.

 

PHYSICAL DEMANDS

· No physical exertion is required.

· Travel within or outside of the state.

· Light work: Exerting up to 20 pounds of force occasionally, and/or up-to 10 pounds of force as frequently as needed to move objects.

Job posted by
Sathish Kumar

Cyber Security Engineer

at WEN

Founded 2018  •  Services  •  employees  •  Bootstrapped
Cyber Security
icon
Surat
icon
6 - 7 yrs
icon
₹1L - ₹6L / yr
The roles and responsibilities of a Cyber Security engineer include:
• Evaluate the organization’s security needs and establish best practices and standards accordingly.
• Designing, implementing, maintaining, overseeing, and upgrading all security measures needed to protect organizations’ data, systems, and networks.
• Responding to all security breaches to the network and associated systems.
• Troubleshooting all network and security issues and incidents.
• Routinely conduct penetration testing.
• Taking appropriate security measures to ensure that the organization's infrastructure and existing data are kept safe.
• Conducting testing and scans to identify any vulnerabilities in the network and system.
• Taking an active role in the change management process.
• Assist in any security breach investigations.
• Handling routine daily administrative tasks such as reporting and keeping open lines of communication with the organization’s appropriate departments.
Job posted by
Kamaljeet Kaur

Ethical Hacker

at HUBILO

Founded 2020  •  Product  •  100-500 employees  •  Profitable
Ethical Hacking
Ethical Hacker
Routing & Switching
Javascript
Python
icon
Remote only
icon
3 - 5 yrs
icon
₹5L - ₹12L / yr

Certified Ethical Hacker Requirements:

  • Bachelor’s degree in Information Technology or Computer Science.
  • CEH Certification.
  • Proven work experience of at least 2-5 years as a Certified Ethical Hacker.
  • Effective Programming Skills required but not limited to HTML, JavaScript, Python, PHP, SQL etc.
  • Advanced knowledge of networking systems and security software.
  • In-depth knowledge of parameter manipulation, session hijacking, and cross-site scripting.
  • Technical knowledge of routers, firewalls, and server systems.
  • Good written and verbal communication skills.
  • Good troubleshooting skills.
  • Ability to see big-picture system flaws.

  • B.Tech/B.E.(IT/Computers), B.Sc( Computers), MSc (IT), BCA (Computer) or any equivalent graduation or post-graduation
Job posted by
Sowmya Rani

Cyber Security Engineer

at Dental Insurance

Cyber Security
Cloud Security
IT security
devsecops
HIPAA
Microsoft Windows Azure
Infrastructure
cloud security
icon
Remote only
icon
6 - 9 yrs
icon
$0.1K - $0.1K / yr
  • Max rate $85/hr
  • MUST HAVE- Application security covering micro services security and Restful API from technical and business process and architecture. 

  • MUST HAVE -Application security, penetration testing, red team tool (optional), development background, Should have done Application vulnerability Assessments.

  • GOOD TO HAVE - Infrastructure experience in Azure Cloud OR Microsoft 365 product implementations will be handy , network Architecture n design mostly in Azure space

  • GOOD TO HAVE - Enterprise platform – office 365 is plus and such implementation. 

  • Experience as a Azure DevSecOps engineer is desired 

  • Ability to communicate effectively with senior management as well as highly technical engineers to articulate security positions effectively. 

Job posted by
Ramya Bhaven

IT Security Specialist

at Virtual Engineering Services Pvt Ltd

Founded 1997  •  Product  •  20-100 employees  •  Profitable
OWASP
Vulnerability assessment
Web application security
Penetration testing
IT security
Burp suite
Cyber Security
Windows Azure
Web applications
Firewall
cenzic
hailstorm
Appscan
WebInspect
sqlmap
zap
icon
NCR (Delhi | Gurgaon | Noida)
icon
3 - 5 yrs
icon
₹4L - ₹8L / yr

IT Security Specialist

 

 

Roles and Responsibilities

  • Extensive experience of 2-5 years in Vulnerability Assessment and Penetration testing, Web Application security.
  • An Experience in performing web application security assessments using hands on techniques for identifying SQL injections, XSS, CSRF, authentication/authorization, OWASP top 10 issues.
  • Must have working experience in OWASP Top 10 Vulnerabilities Testing in Web applications.
  • Create policy and standards for developers and testers to secure programming in the organization. (secure code review, static application security testing.
  • Experience on both commercial and open source tools Cenzic Hailstorm, Burpsuite, AppScan, WebInspect, Appspider, sqlmap, OWASP ZAP. Assessing cloud security risk (AWS and Azure) and recommending appropriate security controls.
  • Ability to interact with project teams to understand the security requirements and come up with solutions
  • Extensive knowledge of managing Web Application Firewall (Product) including rules management and product administration
  • Strong understanding of networking concept.

 

Desired Candidate Profile

 

  • Excellent knowledge of Microsoft Windows operating environments and with special attention to security and hardening issues.
  • Able to work independently with minimal supervision.
  • Good knowledge of secure software development standard, process, techniques, cloud security policies and tools.
  • Keep stakeholders updated with communications and weekly reporting.
  • Collaborate with Security Platform and Services teams to build and integrate existing security solutions.
  • Excellent communication skills - written, verbal, presentation and interpersonal.
  • Willing to learn new skills and implement new technologies.
  • Should come with bachelor’s degree in engineering, mathematics or master’s in computer application / programing.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Job posted by
Abha Sachdeva

DevSecops- Information Security Architect

at EZEU (OPC) India Pvt Ltd

Founded 2020  •  Services  •  0-20 employees  •  Raised funding
Information security
Security operations
Penetration testing
Security analysis
Cyber Security
devsecops
icon
Pune, Bengaluru (Bangalore)
icon
10 - 15 yrs
icon
₹20L - ₹45L / yr
Security Architectural solutions, designing, Security Analysis, Infrastructure architecture, Application architecture, DevSecOps and cloud understanding, Threat Modelling, Penetration testing, Governance Risk & Compliance
Job posted by
HR Ezeu
Did not find a job you were looking for?
icon
Search for relevant jobs from 10000+ companies such as Google, Amazon & Uber actively hiring on Cutshort.
Get to hear about interesting companies hiring right now
iconFollow Cutshort
Want to apply to this role at Technomech Consultancy?
Why apply via Cutshort?
Connect with actual hiring teams and get their fast response. No spam.
Learn more
Get to hear about interesting companies hiring right now
iconFollow Cutshort