Cutshort logo
An Indian energy and power company. logo
Security (AM/Executive)
Security (AM/Executive)
An Indian energy and power company.'s logo

Security (AM/Executive)

Agency job
3 - 10 yrs
₹5L - ₹15L / yr
Ahmedabad
Skills
Network Security
Cyber Security
IT security
Web application security
Torrent Power is an Indian energy and power company, having interests in power generation, transmission, distribution and manufacturing and supply of power cables.

Security (AM/Executive)

• To design the security infrastructure / policies for the organisation, implement & monitor the same
• To ensure security compliance with respect to recommendations received from government agencies like CEA, NCIIPC
• Design, review, implement & monitor IT security related controls as part of Internal
• Controls, IFC, ERM
• ISMS certification (ISO 27001) for IT systems; this will include preparation and periodic review of policies and SOPs, regular trainings and maintaining records in prescribed formats
• Conducting internal security audit and generating reports by deploying VA tools
• Periodic security/VAPT audits and implementation of the findings
• IT security related new initiatives like - Security Operations Centre (SOC), Security Information and Event Management (SIEM), cloud security, EMM-enterprise mobility management
• Creating IT Security awareness within the organisation
Read more
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos

About An Indian energy and power company.

Founded
Type
Size
Stage
About
N/A
Company social profiles
N/A

Similar jobs

Egnyte
at Egnyte
4 recruiters
John Vivek
Posted by John Vivek
Remote only
6 - 15 yrs
₹10L - ₹40L / yr
Web application security
Authentication
Authorization

Sr. Offensive Security Engineer:


Security engineers at Egnyte are involved in every stage of the SDLC pipeline to highlight security vulnerabilities and provide expert advice on reducing them. By promoting security principles, ongoing penetration testing, and developing “paved roads,” we’re able to provide our customers with a secure and reliable product.

We’re looking for a senior engineer who’s well-rounded in terms of application security and has in-depth expertise in offensive security/red teaming focused on product security. 

You will be working closely with other security engineers will enable you to develop your expertise in a wide range of areas of your choosing.

To excel at this role, you need to be passionate about and proficient in hacking. We’re looking for someone who loves breaking into systems and is happy to help secure them by collaborating with software engineers by sharing expertise and providing actionable advice on remediation of identified issues.



WHAT YOU’LL DO:

  • Perform high-quality penetration tests of Egnyte applications independently, or as part of a team
  • Designing comprehensive plans for the security engagements and thoroughly documenting findings, gaps, and remediation recommendations
  • Contributing to team tooling, innovation, and improvements
  • Communicating and collaborating with other teams, product owners, engineering managers, and leadership to influence, prioritize, and drive the resolution of discovered security findings


YOUR QUALIFICATIONS:

  • 5+ years of experience in a penetration testing or similar offensive security role
  • 5+ years of professional experience with security engineering practices, including: web application security, mobile application security, authentication and authorization and other security disciplines
  • 3+ years of experience with dynamic and manual code auditing to identify security issues
  • 3+ years of experience with interpreted or compiled languages (e.g. Python, Java)
  • Experience with threat modeling, design review, or other threat analysis techniques


Bonus points:

  • Experience with mobile application penetration testing
  • Knowledge of cloud service providers, especially Google Cloud
  • Experience in various security domains (e.g. system and network security, authentication and security protocols, cryptography, application security, incident response)
  • Experience in developing security tooling and automation
  • Experience in CTFs, CVE research, and/or Bug Bounty programs


Read more
HSR Layout , Bangalore
2 - 6 yrs
₹4L - ₹10L / yr
Web application security
Penetration testing
Source Code review

1. Perform security assessment of web applications, Android, iOS mobile applications, Source Code Review

2. In-depth knowledge of security vulnerabilities not just limited to OWASP Top 10

3. False Positive removal and manual application testing      

4. Working exp of Python, Java, .Net etc         
5. Experience of using MF Fortify is a must

6. Proactively identify vulnerabilities and recommend fixes

7. Ownership of the tasks, Adapt to technologies/languages/platforms/frameworks of the time                                                                                     

8. Experience in using security tools to carry out manual as well as automated security assessments

9. Experience working with common product flows like payment gateway integration, authentication etc.                                                          

10. Client handling exp

11. Should be able to address client queries, work on proposals etc                                                        

12. Independent, self-motivated and comfortable working in a fast-paced environment with teams ranging from product to engineering teams

Read more
Ongrid
at Ongrid
3 recruiters
Pushpendra Singh
Posted by Pushpendra Singh
Gurugram
4 - 8 yrs
₹10L - ₹18L / yr
Information security
Cyber Security
Compliance
Policies and procedures
Vulnerability assessment
+2 more
Role and Responsibilities:-

- Develop efficient strategies to protect the system, the networking infrastructure, data, and information systems against potential threats/cyber risks

- Routinely performing threat analysis, system checks, and security tests

- Defining and updating information security criteria and validation procedures

- Effectively discuss to understand safety and security and fix the problems along with different stakeholders

- To be a security representative or point of contact for all technical deliveries, initiatives, and project implementations.

- To develop technical processes and procedures and promote compliance in line with regulations, corporate policies, or standards as per ISO27001

- Assess technical security risks in terms of impact on systems and service confidentiality, integrity, and availability, and report and escalate results of risk assessments.

- Report any real or potential security breaches/vulnerabilities to various stakeholders and provide technical support during incident response

- Monitor security tools to detect security events & incidents Report and escalate any security breaches to the Information Technology Security Officer

- Operate vulnerability scanning and compliance tools to identify system weaknesses

- Represent IT Security matters at technical and business forums.

Desired candidate profile :

- Relevant experience in the information security field

- Relevant experience working with ISO Policies, and GDPR guidelines.

- Strong knowledge of network architecture and security concepts related to routing

- Exceptional attention to detail

- Excellent analytical and problem-solving skills

- Great team player and able to work efficiently with minimal supervision

- Excellent communication skills, both written and verbal, work with the different stakeholders on strengthening the security risks.

- Able to handle and cope with stressful situations and understands the pressures of a start-up environment
Read more
Bengaluru (Bangalore)
7 - 12 yrs
₹5L - ₹25L / yr
Cyber Security
Automotive
C
Linux/Unix
Debugging
+2 more
We are looking for a LinuxMiddleware Cybersecurity Development engineer having experience in Linux kernel/Device drivers/Device tree configuration, Bootloaders/Uboot/Secure Boot customization in the embedded domain. The ideal candidate should have expertise in Linux BSP development with Yocto build system for the Automotive SoC platform
Read more
Delhi
7 - 12 yrs
Best in industry
ceh
OWASP
Cyber Security
Information security
clair
+3 more
b. Experience
i. Technology Graduate with 8+ years of experience in the IT industry & Information Security / Cyber Security
iii. Provide Security Vision & Strategy to the Organization, strategic direction, development, and implementation of information security programs and projects to address risks relevant to the attainment of organizational strategic goals.
iv. Experience in advising leadership team regarding Security Technology Land scape, product issues, and possible improvements
v. Expertise in providing executive roadmaps for continual improvement in teams, technology, and processes, process across various security & DevSecops teams
vi. Experienced in Information Security Risk Management, gap analyses, Audits.
vii. Hands-on Experience in formulating Cyber Security Policies, Design and implementation of Security Technologies, DevSecOps.
viii. Working Knowledge in implementation of Cyber Security Solution in Open Source, OpenStack environment.
ix. Ability to provide strategies to increase the ability to withstand cyber-attacks, as measured by annual sophisticated attack simulations.
x. Experience in upgrading, troubleshooting and tuning of Cyber Security Solutions, SOC Operations.
xi. Thorough understanding and good knowledge latest Cyber Security technologies, Security Architectures, vulnerabilities, security threats.
xii. Expertise in Test-Driven Development and establishing a DevSecOps practice. Multiple product launches under your belt - from design to launch, having played a key role in their success
xiii. Ability to setup PoC for latest security solutions
xiv. Good understanding of Open Source Technologies, Private Cloud Technologies.
Read more
TIKAJ
at TIKAJ
2 recruiters
Anamika Srivastava
Posted by Anamika Srivastava
Remote, Gurugram
0 - 2 yrs
₹1.4L - ₹2.4L / yr
Security awareness
Cyber Security
Incident management

TIKAJ is seeking a passionate person who is ready to kickstart his/her cybersecurity career. Security Analyst is your first step to a brighter future as a cybersecurity expert.

Responsibilities


  • Respond and take enforcement actions on cyber security incidents
  • Monitor user activity, network events, and signals from security tools to identify events.
  • Categorize alerts and other anomalous activities that represent real threats.
  • Remediate attacks and Triage on general information security tickets.
  • Collect data for more analysis, evaluate the attack, identify the root of the attack, and implement required security actions to counter the attack.
  • Responsible for investigating and generating reports on information security issues.

We are looking for Candidates

  • Who are motivated, self-learning, and team-oriented individuals?
  • Have a degree in computer science or a related field.
  • Who have beginner to intermediate level experience in Python
  • Who has an interest in Cyber security, phishing, cyber laws and enforcement
  • Good is written and verbal communication.
Read more
Olacabs.com
at Olacabs.com
6 recruiters
Agency job
via zyoin by RAKESH RANJAN
Bengaluru (Bangalore)
8 - 12 yrs
₹18L - ₹30L / yr
Web application security
Mobile security
Infrastructure
Roles and Responsibilities 
    • Manage a team of highly skilled security engineers
    • Responsible for the security of all Ola applications. 
    • Enforce Security in SDLC,  and ensure any identified vulnerabilities are fixed before a feature goes to production.
    • Participate in the design review discussions to identify any security loophole, and recommend a secure design solution. 
    • Partner with engineering leaders across the company to help them prioritize security issues in their products.
    • Run the Ola’s Bug Bounty program effectively. 
    • Develop a roadmap for future work to enhance security, derive a project plan, and ensure the completion of the project within the timelines. 
    • Mentor the team members and work towards their career growth. 

     

    Minimum Qualifications

    • 7+ years of work experience in security engineering, including 2+ years of proven hands-on technical management experience of security engineers. 
    • Experience recruiting and managing technical teams, including performance management.
    • Technical experience across security disciplines – web/mobile app security, infrastructure security, security operations center. 
    • Experience building relationships with stakeholders and business leaders.
    • Must have Coding experience at least in one language.
    • Knowledge of standards like PCI-DSS, ISO27001, GDPR etc. 

     

    BS/MS in Computer Science or equivalent experience

Read more
Virtual Engineering Services Pvt Ltd
Abha Sachdeva
Posted by Abha Sachdeva
NCR (Delhi | Gurgaon | Noida)
3 - 5 yrs
₹4L - ₹8L / yr
OWASP
Vulnerability assessment
Web application security
Penetration testing
IT security
+11 more

IT Security Specialist

 

 

Roles and Responsibilities

  • Extensive experience of 2-5 years in Vulnerability Assessment and Penetration testing, Web Application security.
  • An Experience in performing web application security assessments using hands on techniques for identifying SQL injections, XSS, CSRF, authentication/authorization, OWASP top 10 issues.
  • Must have working experience in OWASP Top 10 Vulnerabilities Testing in Web applications.
  • Create policy and standards for developers and testers to secure programming in the organization. (secure code review, static application security testing.
  • Experience on both commercial and open source tools Cenzic Hailstorm, Burpsuite, AppScan, WebInspect, Appspider, sqlmap, OWASP ZAP. Assessing cloud security risk (AWS and Azure) and recommending appropriate security controls.
  • Ability to interact with project teams to understand the security requirements and come up with solutions
  • Extensive knowledge of managing Web Application Firewall (Product) including rules management and product administration
  • Strong understanding of networking concept.

 

Desired Candidate Profile

 

  • Excellent knowledge of Microsoft Windows operating environments and with special attention to security and hardening issues.
  • Able to work independently with minimal supervision.
  • Good knowledge of secure software development standard, process, techniques, cloud security policies and tools.
  • Keep stakeholders updated with communications and weekly reporting.
  • Collaborate with Security Platform and Services teams to build and integrate existing security solutions.
  • Excellent communication skills - written, verbal, presentation and interpersonal.
  • Willing to learn new skills and implement new technologies.
  • Should come with bachelor’s degree in engineering, mathematics or master’s in computer application / programing.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Read more
Hyderabad, Pune, Bengaluru (Bangalore)
10 - 16 yrs
₹15L - ₹30L / yr
Network Security
Security
Web application security
Java
Python
- 10+ Years of experience in a technical position helping enterprise customers.

- 5+ Years of leading an engagement.

- 5+ Years developing and implementing security operations and technology in large, complex enterprises in multiple industry verticals, across a wide range of technology platforms.

- 4+ Years on any Cloud Platform (AWS, Azure, Google, others).

- Master's or Bachelor's degree in Information Science / Information Technology, Computer Science.

- Deep hands-on experience leading the design, development and deployment of business software at scale.

- Experience with service-oriented architectures, private and public clouds and web services security.

- Strong skills in security principles such as least privilege access, defense in depth, preventative vs detective controls, Infrastructure and Network Security, Data protection, and Incident response.

- Professional experience and good technical knowledge of application security, system security, network security, authentication/authorization protocols, and cryptography.

- Experience advising customers on architectures meeting industry standards such as PCI DSS, ISO 27xxx, SOC, HIPAA, GDPR, and NIST/DoD frameworks.

- Experience with enterprise risk management methods and techniques to drive successful outcomes in a global enterprise environment.

- Good understanding of Enterprise Networks, Security and Identity Access Management.

- Configuration management using CloudFormation and/or Chef/Puppet.

- Experience with agile approaches and Experience in DevOps or DevSecOps, and how they impact risk management and compliance.

- Hands-on technical expertise in technology automation, implementation, integration, and/or deployment using scripting and/or IaaC.

- Knowledge of professional software engineering practices & best practices for the full software development life cycle, including coding standards, code reviews, source control management, libraries building, build processes, testing, and operations.

- Demonstrated ability to mentor other software developers to maintain architectural vision and software quality.

- Experience taking a lead role developing complex software systems that have successfully been delivered to customers.

- Ability to travel to customer sites as needed.

PREFERRED QUALIFICATIONS:

- AWS Solutions Architect Certified.

- AWS Security Speciality Certified.

- CISSP, CCSP, CISM, and/or other comparable certifications.
Read more
Mumbai
7 - 9 yrs
₹14L - ₹17L / yr
Network Security
Project Management
DevOps
application security
OWASP
+2 more
Overall purpose of the job - This role would be responsible for identifying and implementing mitigations, practices and controls ensuring adequate application and infrastructure security posture is maintained all at times Key Performance Areas - • Good at application threat modeling and applications risk identification & remediation • Strong web application security experience with thorough understanding of web application vulnerabilities • Knowledge of database, application, and web server design and implementation • Familiarity with Security standards \ frameworks and groups (OWASP, OSSTM, WASC, FISMA) • Experience in dynamic and static application vulnerability scanners like HP WebIspenct, IBM AppScan, HP Fortify, etc • Create, implement & review data protection strategy across the organization. • Experience in client handling including interaction with developers for understanding the mitigations • Experience on Mobility Platform like Phone-Gap \ native Android \ Worklite and MDM /MAM • Knowledge of DevOps and other upcoming technologies used in SDLC • Experience in manual verification of false positives reported by automated tool • Devise and enforce standards and best practices for data protection in line with international standards and industry best practices. • Evaluate the adequacy of security measures including network security to protect organizational data and information assets • Define and implement project as per approved Plan of action. • Identify security solutions as per business needs • Manage POC for agreed and approved solutions as per defined process • Conduct partner reviews • Coordinate with vendors / partners on closure of projects / activities • Manage intra and inter department conflict amicably • Benchmark and compare security practices with the industry • Implementation, operation and maintenance of the Information Security Management System based on standards like ISO/IEC 27001, Cobit, ITIL etc as applicable. • Information security risk assessments and controls selection activities • Track all audit schedules and ensure closure of all security gaps. • Reporting of all critical security issues • Co-ordinate for Risk Assessment of IT systems and Third Party workloads • Facilitate Internal process and IT audits • Software license compliance at all times • Implement tools and processes related to compliance monitoring as per internal security policies and applicable laws and regulations • Facilitate and drive initiatives of Internal Audits for Information Technology and update on Closure and Identified Risk to the Management • Review of Third Party applications / systems and network security on monthly basis • Adherence To Change Management Processes
Read more
Why apply to jobs via Cutshort
people_solving_puzzle
Personalized job matches
Stop wasting time. Get matched with jobs that meet your skills, aspirations and preferences.
people_verifying_people
Verified hiring teams
See actual hiring teams, find common social connections or connect with them directly. No 3rd party agencies here.
ai_chip
Move faster with AI
We use AI to get you faster responses, recommendations and unmatched user experience.
21,01,133
Matches delivered
37,12,187
Network size
15,000
Companies hiring
Did not find a job you were looking for?
icon
Search for relevant jobs from 10000+ companies such as Google, Amazon & Uber actively hiring on Cutshort.
companies logo
companies logo
companies logo
companies logo
companies logo
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos