Cutshort logo
Rezo.AI logo
Security Engineer
Security Engineer
Rezo.AI's logo

Security Engineer

Aishwarya Srivastava's profile picture
Posted by Aishwarya Srivastava
6 - 10 yrs
₹5L - ₹15L / yr
Noida
Skills
IT security
Data security
ISO 27001
ISO/IEC 27001:2005
Firewall
GDPR
ISO/IEC 27000-series

About Us 

Rezo.ai is an AI-Powered Contact Centre that enables enterprises to enhance customer experience and boost revenue by automating and analyzing customer agent interactions across multiple channels including voice, email, chat/WhatsApp, and social, at the required scale, whilst training agents with minimal costs 


How do we do it 

Rezo’s AI-Powered contact center leverages ground-breaking technologies in AI, ML, ASR, NLP, RPA, and predictive intelligence to transform customer experience and reduce costs by automating, analyzing social media, whilst coaching them.


Overview

Providing leadership in the information security space, helping ensure ISO and GDPR certification, and establishing, maintaining, and enforcing our security policies. Working closely with our business and technology teams to ensure awareness and adherence to the policies and procedures established.

To ensure that the security solutions being designed and delivered are aligned with the enterprise security architecture, supporting the transition of the security architecture from its current to its planned future state.

To lead and provide strategic oversight to ensure and assure the beneficial and cost-effective security change across key accounts, through the evaluation of business strategies and requirements providing advice, guidance and assurance.


Role & Responsibility

  • Provide security advice and guidance to business and delivery teams ensuring solutions are consistent with the enterprise security roadmap whilst balancing business values and security risk.
  • Recommend changes to IT systems to bring them into compliance with security policy, standards, blueprints and roadmaps.
  • Influence stakeholders to adopt architecturally sound approaches to the management of risk.
  • Advise on the translation of business requirements into secure IT solutions and migration roadmaps.
  • Preparation and documentation of standard security operating procedures and protocols
  • Recommend technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks
  • Advise on alternate solutions and countermeasures to mitigate identified information risks.
  • Provide assurance that identified solutions or countermeasures mitigate identified information risks.
  • Write comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement
  • Implements security improvements by assessing the current situation; evaluating trends; anticipating requirements.
  • Keeps users and businesses informed by preparing performance reports; communicating system status, and owning security incidents when they arise.

 

Technical Skills Required

  • Proven experience in the design, implementation and operation of scaled IT security services and capabilities, ideally within a large government organization or complex large-scale multi-supplier organization.
  • Strong technical aptitude and exposure to ISO 27001 or similar-based security policies and standards.
  • Excellent communication skills, with the ability to articulate complex technical issues into business-focused terms and communicate with Stakeholders.
  • Knowledge of GDPR, its business implications and the merits of various technical approaches
  • Expertise in IT security risk in a business context
  • Exposure to web application security and penetration testing.
  • Exposure to securing the software development life cycle and to project management disciplines.
  • Excellent organizational and technical documentation skills.
  • Strong understanding of Information Security including threats, attacks, and vulnerability management.
  • Deep understanding of secure development practices, with practical experience of cyber security, privacy protection, cloud security, identity management, situations awareness, protective monitoring, security operations, risk management and reporting.
Read more
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos

About Rezo.AI

Founded :
2017
Type
Size
Stage :
Raised funding
About

Rezo.ai is an AI-Powered Contact Center that enables enterprises to enhance customer experience and boost revenue by automating and analyzing customer agent interactions across multiple channels including voice, email, chat/WhatsApp, and social, at the required scale, whilst training agents with minimal costs.

Read more
Company social profiles
bloglinkedin

Similar jobs

Stratogent Technology Services
Bengaluru (Bangalore)
10 - 15 yrs
₹15L - ₹25L / yr
Security Information and Event Management (SIEM)
IT security
Splunk
ArcSight
ITIL
+2 more

Position Title: Manager – Security Operations Organization /Function: Manager is responsible for day to day operational and project delivery for a set of customers Relevant Experience: 10+ years of experience in security area and at least 2 years as Security manager Educational Qualification: BE/B.Tech/ME/M.Tech/Graduate/Master in any stream with excellent academic record

Must-have Skills: • Must know common security policy frameworks and possess knowledge of how security programs are run at mid to large scale companies • Must have managed a team to deliver “Managed Security Service” or “Security Operations Center” • Prior working Background in either SIEM tools (Splunk, ArcSight, QRadar, DNIF etc.) or Vulnerability assessment and Management tool (Qualys/Rapid7) and process • Has broader context and understanding of managed security services • Must have service mindset and empathy. Must deal with a level of ambiguity, chaos and apparent stubbornness from customers, and manage around it by thinking through the issue or request from the customer’s perspective to drive to a reasonable conclusion • Must have prior experience on Project Management • Must have prior experience of onsite-offshore delivery model and should have directly worked with US/European customers or colleagues • Must have ITIL process knowledge

Read more
Octro Inc
at Octro Inc
1 recruiter
Akansha Gupta
Posted by Akansha Gupta
Noida
6 - 10 yrs
₹10L - ₹25L / yr
ISO 9000
IT security
Information security
Information security management system
Data security
+1 more

Roles and responsibilities:

- Audit the current Information Security system and procedures and do a Gap analysis

- Identify immediate potential Information Security Risks and manage remediation tasks through to closure

- Create an Information Security Compliance Roadmap and execute end-to-end compliance initiatives by that roadmap

- Design high-quality test plans and direct Data/Information security control test activities

- Continuously improve Octro Data/Information security control framework

- Maintain handbook pages and procedures related to Information security compliance

- Identify opportunities for Information security compliance control automation, execute them and then maintain

- Provide actionable and constructive advisement to cross-functional teams, including driving remediation activities for high and select moderate-risk Observations across all Octro departments

- Design, develop, and deploy scripts to automate continuous control monitoring, administrative tasks and metric reporting for all security compliance programs

- Direct and support external audits as and when necessary


Requirements


- A minimum of 6-8 years' experience working with Data/Information Security Compliance programs

- Detailed knowledge of common information security management frameworks, regulatory requirements and applicable standards such as: ISO, SOC 2, GDPR, PCI etc.


About Octro Inc :


We are one of the fastest-growing mobile gaming companies around, a technology-driven organization at heart, and take pride in the platforms we create.

Founded in 2006 with a mission to create productivity applications for Mobile Devices. After pioneering one of the first mobile Voice-over-IP infrastructures called OctroTalk, the company ventured into building mobile gaming platforms. Sequoia Capital has invested in Octro. The funding was announced in June 2014.

Read more
Tech Data
Loyson Masacrenhas
Posted by Loyson Masacrenhas
Bengaluru (Bangalore)
5 - 10 yrs
Best in industry
Network Security
Palo Alto
Fortinet
WAF
Firewall
+1 more

Responsibilities :


  • Determine the scope based on requirements, designing and building security components, and testing efforts, including stating the scope of work, calculating the resources, required in delivering the services and advising the senior system engineer preparing the quotation
  • Install and configure services as per the approved implementation plan
  • Carry out technology, professional and maintenance support services as per scope within the stipulated duration/ timeline.
  • Provide level 1/2 support (basic hardware break-fix & troubleshooting of hardware and software issues) for installed services
  • Provide technical deliverables such as high-level design documents, user acceptance test (UAT) doc and as-built documentation
  • Provide outstanding quality of service and meet predefined customer service level agreements (SLAs)
  • Undergo technical training and obtain technical certifications that are required to meet suppliers' mandatory technical requirements
  • Conduct knowledge transfer training (where required)


Knowledge, Skills and Experience :

  • Minimum 3 years of relevant experience
  • Certified in at least one of the technology domain (Infrastructure hardware and software, network, security)
  • Expertise on any two firewalls Specially - Palo Alto, Checkpoint, Fortinet, WAF
  • Strong technical knowledge on the assigned solution domain/product
  • Expertise in enterprise security products implementation, migration and support.
  • Implements security solutions infrastructure and/or application including the design, configuration, development, testing and deployment of security-related technologies such as Firewalls, WAF, LB , IDS/IP
  • Strong interpersonal skills with a customer-centric attitude; oral and written communication skills
  • Strong attention to technical details, priority management and planning skills
  • Ability to work independently with little to no supervision
  • Results-oriented
  • Security Certifications such as CCNP/CCIE Security or CCSA/CCSE/CCCP/PCNSE/Fortinet NSE1/2/3/4 are desirable


What's In It For You?

  • Elective Benefits: Our programs are tailored to your country to best accommodate your lifestyle.
  • Grow Your Career: Accelerate your path to success (and keep up with the future) with formal programs on leadership and professional development, and many more on-demand courses.
  • Elevate Your Personal Well-Being: Boost your financial, physical, and mental well-being through seminars, events, and our global Life Empowerment Assistance Program.
  • Diversity, Equity & Inclusion: It's not just a phrase to us; valuing every voice is how we succeed. Join us in celebrating our global diversity through inclusive education, meaningful peer-to-peer conversations, and equitable growth and development opportunities.
  • Make the Most of our Global Organization: Network with other new co-workers within your first 30 days through our onboarding program.
  • Connect with Your Community: Participate in internal, peer-led inclusive communities and activities, including business resource groups, local volunteering events, and more environmental and social initiatives
Read more
Bengaluru (Bangalore)
4 - 10 yrs
₹11L - ₹20L / yr
IT security audit
ISO/IEC 27001:2005
ISMS implementation

1) Determine client needs and expectations and participate in the development of the overall client service plan. Analyse, develop, and implement information security programs, including organizational design and key processes for our clients as per plans

2)Design and develop cyber security strategies and programs for large and complex organizations

3)Define and implement cyber risk management structures, governance models, organizational transformations in the areas of cyber security

4)Develop security policies, processes, procedures. Map controls and compliance requirements. Responsible for risk assessments, gap analysis (against standards and benchmarks), risk mitigation strategy development.

4)Roll out the GRC Cybersecurity controls framework while balancing the approach with end user experience and compliance

5)Develop and tailor approaches, methods and tools to support clients cyber risk programs and initiatives

6)Provide strategic and operational advice in the areas of safeguarding critical information. Identify areas requiring improvement in the client's business processes to enable preparation of recommendations. 7)Evaluate, implement and operationalize security controls, define metrics for measure performance and establish a framework for continuous monitoring and improvement and Play substantive role in internal and external client relationship and communication

8)Interact with CxOs to define the roadmap for GRC strategy.

9Help build Cyber Transformation practice by getting involved in areas beyond engagement delivery such as pre-sales, RFP response, solution designing, competency development and Go to market strategies

10)Create or help create though leadership content in the emerging areas of Cyber Strategy and Risk Transformation .


Immediate Joiners

Read more
MindTickle
at MindTickle
1 video
11 recruiters
Namrata Priya
Posted by Namrata Priya
Pune
5 - 14 yrs
₹10L - ₹35L / yr
Data security
Information security
Privacy
data privacy
GDPR
+2 more

Job Brief:

 

You'll be joining Mindtickle’s InfoSec and Compliance team, which is responsible for various functions related to Security, Privacy, and Compliance around Mindtickle's rapidly growing cloud platform. You'll play a crucial role in all our compliance & information security initiatives, including but not limited to those arising from regulations (e.g., GDPR, CCPA, UK DPA 2018, FINRA), audit requirements (e.g., SOC 2, HIPAA), and customer/ prospects requests (typically large enterprises).

 

As Data Privacy & Compliance Manager, you will champion the highest data privacy standards and drive forward compliance across all of Mindtickle. Crucial to this role will be an expert knowledge of international data protection laws and a proactive and pragmatic approach towards data privacy and compliance. 

 

Key Responsibilities:

  • Act as the single point of contact for all privacy-related topics, including communication with customers and prospects, including RFPs, emails, or privacy calls

  • Closely working with the internal legal team and external legal counsel to support the review of third parties/customer data processing addendums (DPAs), standard contractual clauses, contracts, and other data protection agreements

  • Maintain the data protection terms agreed with customers in a contract management software

  • Perform due diligence of new third parties and periodic risk review of existing third parties, including processes around sub-processors

  • Support in other industry compliance projects such as ADA, Section 508, WCAG, FINRA, 21 CFR Part 11, etc.

  • Lead the assessment of new legislation or other regulatory changes (GDPR, CCPA, UK DPA 2018, LGPD, PIPEDA, Swiss FDAP) and make recommendations as necessary to ensure that risks are mitigated as well as ongoing compliance

  • To work flexibly and collaboratively across all teams in the organization while driving privacy & compliance-related projects, including sales, customer success, product, and engineering

  • Own internal and external privacy audit projects, including planning, scoping, need analysis, ongoing project management, and communications with all relevant stakeholders

  • Onboard privacy solutions, design, build and deploy data privacy programs on the solutions to ensure compliance with privacy requirements

  • Maintain Records of Processing Activities (ROPA) and ensure Privacy By Design for new features/changes in the platform

  • Undertake all other reasonable and related tasks associated with this role

Desired Qualification:

  • 5-10 years of experience in data privacy and compliance, with exposure to cloud software platforms

  • Extensive experience in data protection and knowledge of relevant legislation, including GDPR, Standard Contractual Clauses, Transfer Impact Assessment, CCPA, UK DPA 2018, LGPD, PIPEDA, Swiss FDAP, etc.

  • Certifications such as CIPP/E, CIPP/US, CIPM, CIPT, etc., are preferred

  • Specialist knowledge in a relevant area, e.g., data security and individual rights requests

  • Excellent communication, interpersonal, project management, and issue resolution skills

  • Excellent analytical skills, organizational skills, ingenuity, and the ability to work as part of a team

  • Experience in managing privacy audits and risk management processes

  • Demonstrated ability to learn quickly, take the initiative, and drive complex projects

 

Read more
Saas Based Tech Company
Agency job
via Merito by Gaurav Bhosle
Delhi, Gurugram, Noida, Ghaziabad, Faridabad
5 - 7 yrs
₹7L - ₹12L / yr
Linux/Unix
Linux administration
skill iconAmazon Web Services (AWS)
Firewall
MySQL

What will you do?

  • Act as senior level escalation point for technical remediation of incidents and service requests.
  • Work as L2 resource in AWS Cloud infrastructure and system administration team providing technical support and resolving issues
  • Troubleshoot technical issues faced which could be related to external interfaces, networking, application and Ubuntu configuration, IIS Configuration, Linux Servers etc.
  • Resolving urgent and immediate requests by support team in a vibrant and demanding environment.
  • Test upgrades and patches from development team prior to client rollout
  • Document the Interface testing and other details, update and complete all handovers.
  • Coordinate directly with on-site IT, vendors, off-site helpdesks over email or phone calls to complete technical assignments.
  • Do audit of new implemented properties for initial few weeks and identify the repeated issues reported by property.

 

Technical Competencies you’ll possess:

 

  • Strong Linux and Windows Administration skills
  • In depth knowledge of the windows servers & Linux servers.
  • Good understanding of AWS Cloud Infrastructure, Networking, Firewall, Infrastructure, SQL and IIS Configuration, Ubuntu Configurations and MySQL.
  • Working knowledge of interfaces and integrations of systems.
  • Enhanced troubleshooting skills.
  • Possess a good understanding of Internet based technologies including DNS, Security, IP Routing,- SSH, FTP, HTTP/HTTPS, Email Routing, etc.

 

Read more
Angel One
at Angel One
4 recruiters
Andleeb Mujeeb
Posted by Andleeb Mujeeb
Remote only
12 - 15 yrs
₹30L - ₹35L / yr
Network Security
Routing & Switching
Cisco Certified Network Associate (CCNA)
Operations
Firewall
+2 more

Position description:

  • Manage Network admin operations
  • Responsible for Configuration and installation of various network devices and services (e.g. routers, switches, load balancers (Radware), firewalls (Juniper, Fortinet, Cyberoam), network access control
  • Ensure network maintenance and system upgrades
  • Accountable for – Network Performance and ensure system availability and reliability
  • Work within established configuration and change management policies to ensure awareness, approval, and success of changes made to the network infrastructure
  • Proactive forecasting of Network capacity and utilization.
  • Would handle issues like Production outages.
  • Would handle incident and projects
  • Good problem-solving skills
  • Team mentoring and timely project delivery.

 

Primary Responsibilities:

  • To ensure availability and uptime of On-premise and cloud network

 

Reporting Team

  • Reporting Designation: Head - Site Reliability Engineering (ABL_SS_362)
  • Reporting Department: Site Reliability Engineering (24777)

Required Skills:

  • Well versed with network architecture and complex network design
  • Well versed with firewalls, UTM features, IDS/IPS, WAF (Web Application Firewall), SSL Offloading
  • Good hands-on with Layer 2 and Layer 3 topologies
  • The key focus in Enforcing policy and regulatory compliance by maintaining the organization firewall infrastructure
Read more
Yext
at Yext
3 recruiters
Yash Rathod
Posted by Yash Rathod
Hyderabad
5 - 10 yrs
₹5L - ₹15L / yr
IT security
Information security
Security Information and Event Management (SIEM)
Scripting language
skill iconAmazon Web Services (AWS)
+1 more

Responsibilities:

The Senior Information Security Engineer is responsible for the implementation, execution and maintenance of technology solutions to mitigate risk, to protect the IT and Engineering environments by reducing the probability of, and to minimize the effects of, damage caused by malware, malicious activities and security events.

The individual will help protect the company by deploying, tuning, and managing security tools across the computing environment, as well as provide security incident response cycle support. They should have a passion and skills for identifying the latest cyber threats. The individual will:



Basic Qualifications

  • Working knowledge of infrastructure-as-code and CI/CD pipelines tools (i.e. Jenkins, Teamcity, CircleCI etc..)
  • Lead and participate in major day-to-day operational aspects of the security engineering team including improvement of current security controls while constantly identifying areas of needed improvement
  • Deep hands-on security experience with cloud providers, such as AWS, GCP, Azure
  • Understanding of automated security testing approaches and tools
  • Experience with proactive integration of security into the development process
  • Lead continuous improvement efforts of out security tools and systems (Concertation on SIEM, IDS, EDR Tools)
  • Work with our customers (Security Operations, Incident Response, and Product teams) to incorporate high quality security alerting into their operational workflows
  • Improve overall security practitioner efficiency through process automation
  • Foster and promote collaboration among all members of the IT, Infrastructure, and Risk Management Departments.


Minimum Qualifications/Requirements

  • BS or MS in Computer Science or related field
  • Minimum 7+ years of cybersecurity experience
  • Must have previous experience performing threat hunting and incident response duties using SIEM tools, cybersecurity management consoles, and ticketing systems
  • Experience in deployment, development, and maintenance of SIEM
  • Experience writing and using Ansible server administration scripts, and create simple Python, BASH, or Powershell scripts to automate cybersecurity functions
  • Scripting experience to automate security operations, alerting, and compliance checks, CI/CD design, deployment, and management
  • Experience with managing endpoint response and detection infrastructure and endpoints at the enterprise level, including performing upgrades to the back end application and deploying new agent versions to endpoints
  • Understanding the investigative process and performing triage for cybersecurity incidents
  • Experience maintaining industry leading security technologies or infrastructure systems in complex technical IT operations environment
  • Must be detail-oriented and organized with ability to handle competing demands while meeting deadlines
  • Experience in authentication protocols and frameworks to include OAuth, and AWS IAM
  • Proactive and motivated; team player with a positive can-do attitude
  • Strong analytical/problem-solving skills and cross-functional knowledge across multiple IT operational and security disciplines
  • Ability to communicate technical concepts to a broad range of technical and non-technical staff
  • Must possess a high degree of integrity, be trustworthy, and have the ability to lead and inspire change
Read more
Japan, Tokyo, Anywhere
3 - 10 yrs
¥500K - ¥1500K / yr
Network
LAN
WAN
Firewall

REQUIRED CITIZENSHIP / WORK PERMIT / VISA STATUS:
Should be currently based in Japan with Valid work visa

MUST HAVES:

Experience Required:

  • LAN/Wireless LAN based skills(over 3 years experiences)
  • Firewall based skill (over 3 years experiences)
  • Server based skill (over 3 years experiences)
  • WAN/Internet based skills (over 3 years experiences)

*

  • Required General Skills:
  • Fluent in Japanese(both written & verbal) and English(reading & written)

Job role :

  • · WAN, LAN, Wireless LAN, Firewall, ServerWork Contents;
  • · Support Design and Implementation
  • · Create documentation or basic design and detail design
  • · Join required meeting(Internal, External)
  • · Management Change(Create and close change record)
  • · Test(Unit, Integrated) in on-site
  • · Create the result of test document
  • · Create change procedure
  • · Installation equipment in on- site
  • · Support soft MACD from remote site
  • · Create operation manual
  • · Support problem management
  • · Support inventory management
  • · Support configuration hencmanagement
  • · Support reporting
  • · Cisco Router/Switch/FW (MPLS, BGP, OSPF, STP, VLAN, QoS, VRF)
  • · Juniper Router/Switch(SRX/EX/QFX)
  • · Server (Linux,)
  • · Wireless (CAPWAN)
Read more
Virtual Engineering Services Pvt Ltd
Abha Sachdeva
Posted by Abha Sachdeva
NCR (Delhi | Gurgaon | Noida)
3 - 5 yrs
₹4L - ₹8L / yr
OWASP
Vulnerability assessment
Web application security
Penetration testing
IT security
+11 more

IT Security Specialist

 

 

Roles and Responsibilities

  • Extensive experience of 2-5 years in Vulnerability Assessment and Penetration testing, Web Application security.
  • An Experience in performing web application security assessments using hands on techniques for identifying SQL injections, XSS, CSRF, authentication/authorization, OWASP top 10 issues.
  • Must have working experience in OWASP Top 10 Vulnerabilities Testing in Web applications.
  • Create policy and standards for developers and testers to secure programming in the organization. (secure code review, static application security testing.
  • Experience on both commercial and open source tools Cenzic Hailstorm, Burpsuite, AppScan, WebInspect, Appspider, sqlmap, OWASP ZAP. Assessing cloud security risk (AWS and Azure) and recommending appropriate security controls.
  • Ability to interact with project teams to understand the security requirements and come up with solutions
  • Extensive knowledge of managing Web Application Firewall (Product) including rules management and product administration
  • Strong understanding of networking concept.

 

Desired Candidate Profile

 

  • Excellent knowledge of Microsoft Windows operating environments and with special attention to security and hardening issues.
  • Able to work independently with minimal supervision.
  • Good knowledge of secure software development standard, process, techniques, cloud security policies and tools.
  • Keep stakeholders updated with communications and weekly reporting.
  • Collaborate with Security Platform and Services teams to build and integrate existing security solutions.
  • Excellent communication skills - written, verbal, presentation and interpersonal.
  • Willing to learn new skills and implement new technologies.
  • Should come with bachelor’s degree in engineering, mathematics or master’s in computer application / programing.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Read more
Why apply to jobs via Cutshort
people_solving_puzzle
Personalized job matches
Stop wasting time. Get matched with jobs that meet your skills, aspirations and preferences.
people_verifying_people
Verified hiring teams
See actual hiring teams, find common social connections or connect with them directly. No 3rd party agencies here.
ai_chip
Move faster with AI
We use AI to get you faster responses, recommendations and unmatched user experience.
21,01,133
Matches delivered
37,12,187
Network size
15,000
Companies hiring
Did not find a job you were looking for?
icon
Search for relevant jobs from 10000+ companies such as Google, Amazon & Uber actively hiring on Cutshort.
companies logo
companies logo
companies logo
companies logo
companies logo
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos