50+ Cyber Security Jobs in India
Apply to 50+ Cyber Security Jobs on CutShort.io. Find your next job, effortlessly. Browse Cyber Security Jobs and apply today!
Key Responsibilities:
1. Threat Research: Work on researching emerging cyber threats specifically. You will monitor threat actor activities, study their tactics, techniques, and procedures (TTPs), and help identify potential risks.
2. Alert Triage and Incident Analysis: Support the analysis of security alerts generated by our in-house platform. You will work alongside the team to identify critical issues and provide timely
intelligence to help mitigate threats.
3. Data Collection and OSINT: Assist in gathering and analyzing data using Open Source Intelligence (OSINT) methodologies. You will help collect relevant information to support ongoing threat investigations.
4. Report Preparation: Contribute to the preparation of threat intelligence reports for internal and external stakeholders. You will learn how to convey complex technical information in a clear and
actionable manner.
5. SOP Development: Collaborate with the team to develop and refine Standard Operating Procedures (SOPs) for systematic threat analysis. Your input will help ensure that our procedures are efficient and scalable.
6. Cross-functional Collaboration: Work closely with various teams, including product development and data acquisition, to support the integration of new intelligence sources and improve the effectiveness of our threat intelligence platform.
Key Qualifications:
Educational Background: Currently pursuing or recently completed a degree in Cybersecurity, Computer Science, Information Technology, or a related field.
Basic Knowledge of Cybersecurity: A foundational understanding of cybersecurity concepts, including web application security, threat analysis, and vulnerability assessment.
Familiarity with OSINT: Basic knowledge of Open Source Intelligence (OSINT) tools and methodologies for data collection.
Technical Skills: Familiarity with scripting languages such as Python, Ruby, or GO is a plus.
Experience with automation and data analysis tools will be advantageous.
Communication Skills: Strong written and verbal communication skills, with the ability to learn how to convey technical findings effectively.
Problem-Solving and Adaptability: A proactive attitude with strong problem-solving skills. You should be comfortable learning in a fast-paced and dynamic environment.
Additional Skills:
Interest in Cybersecurity Challenges: Participation in bug bounty programs, Capture The Flag (CTF) challenges, or cybersecurity competitions is a plus.
Willingness to Learn: A keen interest in developing skills in threat intelligence, threat actor profiling, and behavioral analysis.
About the Company:
StepSecurity provides an industry-leading CI/CD security platform, trusted by over 4,000 open-source repositories, including those from Google, Microsoft, Amazon, and DataDog. Several enterprise customers also rely on StepSecurity to secure their CI/CD pipelines and infrastructure.
About the Role:
A key part of this role is to reach all relevant security and DevOps engineers and make them aware of StepSecurity and our value prop. Creating in depth tutorials on using the product (which can be fairly technical) and writing blogs about different aspects of CI/CD security will be few of the key things you will be working on. For context, checkout our current blogs here https://www.stepsecurity.io/blogs
We believe creating content which people care about is fundamentally about telling good stories. Stories of what we stand for as a company, where StepSecurity stands as a product, how users can benefit from it, how we build the product. Everything is a story waiting to be told.
What Will You Be Doing?
- Create blog articles and tutorials about different features of the product and how users can utilize them.
- Develop SEO-optimized content to capture traffic from Google.
- Maintain StepSecurity technical documentation: StepSecurity Docs.
- Update READMEs for StepSecurity’s open-source repositories.
- Create video tutorials or documentation on common issues faced by users.
- Identify gaps in our current content and create material to address them.
Possible Content Types
- Blog posts
- Technical documentation
- Case studies on how our current users are utilizing StepSecurity
- Tutorials to explain how users can achieve specific use cases
Who Would Be a Good Fit?
- 2+ years of experience as a software developer, with an interest in explaining deep technical concepts in simple language.
- Prior experience as a technical writer.
- Knowledge of CI/CD, security, and DevOps is required.
- Interest in developing a career in technical marketing, developer advocacy, or product management.
- A flair for writing and a growth mindset.
About the Interview
Our process involves a short initial exploratory chat, followed by 2 to 3 interviews/discussions. The aim is for both sides to learn more about each other. The process includes:
- A written assignment where you will be asked to write a tutorial on a technical topic.
- A discussion over a call with the founders.
Essential Duties and Responsibilities:
Job Description:
- It’s a Client facing role with a proven experience into security or backup solution sales.
- Meet Monthly/ Quarterly/Yearly target of customer meetings and sales target.
- Identify and close deals into SMB/Enterprise segment.
- Manage a healthy relationship with the OEMs.
- Must have a good understanding of IT Security solutions (Endpoint/Networking/Data Security, DLP, Backup, NGF, MDM, Helpdesk, Asset etc) or backup solutions (server backup, desktop/ laptop backup, replication)
- Sell data security and data backup solutions to corporate customers of Jaipur and Mumbai.
Skill Requirements:
Good communication skills.
Mandatory Requirement
At least 2 years’ experience of selling data security or data backup solutions to corporate customers of Jaipur from Jaipur and from Mumbai to Mumbai
Education and/or Work Experience Requirements:
- At least 2 years’ experience of selling data security or data backup solutions to corporate customers of Jaipur from Jaipur and from Mumbai to Mumbai.
- Must be able to work under pressure and meet deadlines, while maintaining a positive attitude and providing exemplary customer service.
- Ability to work independently and to carry out assignments to completion within parameters of instructions given.
Job Requirements:
Minimum Experience: 2 years
Working Days: 6 days Monday to Saturday (3rd Saturday off)
Salary: As per market standards plus incentives
Plus mobile
Dear Applicants,
We are looking for a spontaneous Business Development Manager with minimum 5 year of experience who is passionate about technology to oversee our brand’s presence. You should be able to approach and acquire new clients. Besides, you should also be able to maintain long-term business relations with the existing clients.
Job Description
We are currently seeking a dynamic and results-oriented business Development Executive to join our company. As the business Development manager, you will be responsible for driving sales growth and expanding our customer base in the cybersecurity industry.
Responsibilities
- Pitch to a variety of stakeholders – Advisory Board Members, CEO, CTO, IT Managers, Information Security Heads, CISO.
- Develop and execute sales strategies to achieve company targets and objectives.
- Identify and engage with potential clients, including business owners, managers, and decision-makers, to understand their cybersecurity needs and present our solutions.
- Build and maintain strong relationships with existing clients, ensuring customer satisfaction and repeat business.
- Lead the entire sales process, from prospecting and lead generation to contract negotiation and closing deals.
- Collaborate with cross-functional teams, including cybersecurity professionals and technical experts, to develop and deliver compelling sales presentations and proposals.
- Stay up-to-date with industry trends, competitor activities, and emerging technologies in the cybersecurity space.
- Track sales activities, pipeline, and performance metrics, providing regular reports to the management team.
- Continuously improve sales processes and identify opportunities for business growth.
- Represent the company at industry conferences, trade shows, and networking events to showcase our services and establish new business relationships.
Candidate Skills
- Proven track record of achieving sales targets and driving revenue growth in the
- cybersecurity or IT industry.
- Strong understanding of cybersecurity principles and trends, with the ability to effectively communicate technical concepts to non-technical clients.
- Excellent communication and interpersonal skills, with the ability to build rapport and establish trust with clients.
- Self-motivated and goal-oriented, with a proactive approach to identifying and pursuing new business opportunities.
- Ability to work independently and as part of a team, with strong organizational and time management skills.
- Prior experience in selling cybersecurity training and services is highly desirable.
- Bachelor’s degree in business, marketing, or a related field is preferred.
Qualifications
- Candidate must have a degree in the field of business administration.
- Any vendor natural business development training and certification will be preferred.
Benefits
- Lead a high-performing sales team, shaping strategies, and driving revenue growth.
- Represent cutting-edge IT products and solutions, staying at the forefront of industry
- trends.
- Opportunities for career advancement within the organization as you demonstrate success.
- Opportunities to build a strong professional network in the IT industry through Conferences, events, and meetings.
Fynd is India’s largest omnichannel platform and multi-platform tech company with expertise in retail tech and products in AI, ML, big data ops, gaming+crypto, image editing and learning space. Founded in 2012 by 3 IIT Bombay alumni: Farooq Adam, Harsh Shah and Sreeraman MG. We are headquartered in Mumbai and have 1000+ brands under management, more than 10k stores and servicing 23k + pin codes.
We're looking for an SDE I/ SDE II- DevSecOps to join our Engineering Team. The team builds products for 10M+ Fynd users and internal teams. Our team consists of generalist engineers who work on building modern websites (SPA & Isomorphic), mobile apps for Android & iOS, REST APIs and servers, internal tools, and infrastructure for all our users.
What will you do at Fynd?
- Build a Culture around Security Engineering at Fynd</li><li>Ensure that a healthy security posture is maintained by continuously assessing/monitoring perimeter as well as internal security posture.
- Identify, integrate, monitor, and improve InfoSec controls by understanding business processes.
- Drive a DevSecOps culture in the organization by implementing shift left security culture.
- Conduct security reviews, auditing, penetration testing, risk assessments, vulnerability assessments, threat modeling.
- Install, configure, manage, and maintain mission-critical enterprise applications such as AV, patching, SIEM, DLP, log management and other technical controls. Troubleshoot security system and related issues
- Should have good understanding in working on CSPM
- Should have good understanding in different Services of AWS & GCP, Also need someone who should know DNS.
- Improve Cloud, Application ,Kafka, Database security posture and Kubernetes security using CI/CD Understand by regular gap assessment, Provide support in detection and mitigation of cyber security vulnerability and incidents for Cloud
- Run security automation tools for periodic scans - SAST, DAST, Infrastructure scanning, Compliance check
- Adhere to OWASP guidelines and bring the OWASP maturity model at organisation level.
- Strong understanding of network concepts including TCP/IP, HTTP and TLS, DDoS detection/prevention, and network and host anomaly detection through both automated (NIDS/HIDS) and manual means.
- A good knack for automating infrastructure security as much as possible
Some specific requirements
- Need to have a professional experience of at least 3-4 years acquired in monitoring and improving DevSec Ops tools and processes
- Extensive knowledge in assurance tools such as Fortify, OWASP ZAP, Sonarqube, Open source automation tools and their integrations into CI/CD cycles.
- Understanding of Zero Trust policy and its implementation.
- Identify security weakness across multiple programming languages like Python, Node JS, Java, Go, Javascript, HTML etc
- Participate in incident handling and other related duties to support the information security function.
- Ability to drive security automation and DevSecOps within engineering life cycle, as well as vulnerability/bug remediation
- Good to have audit experience across compliance certifications like ISO 27001/ISMS/PCI DSS / SoC 2
- Experience in Kubernetes Infra, Cloud deployment technologies - AWS, GCP
Summary:
● We are seeking a highly motivated and experienced Cyber security
● Expert to join our team. You will be responsible
for safeguarding our IT infrastructure, data, and applications from cyber threats.
● You will have a deep understanding of server, endpoint, mail, and infrastructure security and possess strong incident response skills.
● Additionally, you will be well-versed in relevant regulations and how to navigate them during data breaches.
Responsibilities:
● Implement and maintain comprehensive security controls for servers, endpoints, mail, and infrastructure.
● Conduct regular vulnerability assessments and penetration testing.
● Monitor security logs and SIEM systems for suspicious activity.
● Investigate and respond to security incidents, including data breaches.
● Develop and implement incident response plans and procedures.
● Stay up-to-date on the latest cyber threats and vulnerabilities.
● Provide security awareness training to employees.
● Advise on and implement security best practices throughout the organization.
● Understand and comply with relevant data privacy and security regulations (e.g., HIPAA, GDPR, PCI DSS).
● Work collaboratively with IT, business units, and legal teams.
Grow Your Staff is looking for an Account Executive-Cybersecurity for an AppSec firm in Israel. The position is a full-time, remote opportunity.
The role will have excellent growth opportunities. You will work directly with the team based in Israel.
Experience required: 3-5 years
CTC: 8-14 LPA
Location: Remote
Time: 9:00 am- 6:00 pm (Monday-Friday)
Industry: Cybersecurity
Responsibilities
- Understand the specific needs of your customers and align our solutions with their cybersecurity challenges.
- Engage with C-level executives to establish strategic plans and objectives.
- Coordinate with technical teams to deliver tailored demonstrations and detailed presentations that align with client needs.
- Drive business development efforts through effective lead generation and networking.
- Stay abreast of industry trends and competitive landscape to serve clients better and provide a strategic advantage.
Qualifications
- Bachelor’s degree in Business Administration, Marketing, Computer Science, or a related field.
- Proven experience as an Account Executive, Sales Engineer or relevant role in a startup in the cybersecurity industry.
- Advanced degrees or cybersecurity certifications (e.g., CISSP, CISM) are a plus.
- Experience in working with cross-functional teams (e.g., Sales, Product Development, Marketing).
- Strong analytical and problem-solving skills with a strategic approach to achieving sales goals.
PLOT NO 1253, ROAD NO 63, JUBILEE HILLS, Hyderabad, Telangana, 500033
Life is Short! Work Somewhere Awesome.
Mercer Talent Enterprise is hiring experienced Senior IT Security Professional.
Key Responsibilities
- Monitor, report, and protect the safety of the company data, and adherence the local and international security compliances
- Analyse security logs and alerts to identify and investigate threats.
- Conduct periodic vulnerability assessments and penetration testing to proactively identify weaknesses.
- Continually enhance the security posture of the company by frequent review and implementing measures.
- Lead and perform security control gap assessments against industry standards and security regulatory requirements to evaluate control design and operating effectiveness
- Stay up to date on the latest security threats and vulnerabilities
- Define, draft and communicate potential security control improvement opportunities and paths to address based on requirements and industry experience,
- Support regulatory examinations across EU, UAE, KSA, US. and international regulatory regimes in partnership with Security and other GRC functions by reviewing and evaluating requests, coordinating with stakeholders to collect and QA artifacts, and track outcomes of regulatory examinations performed,
- Partner with Security Risk and Security Policy functions to ensure that security controls are reflected properly in our Security Risk Review, Security Policy requirements, and other governance processes,
- Support Security Compliance, Information Security, and Engineering stakeholders in identifying and executing on continuous control monitoring opportunities,
- Work closely with control owners and internal and external auditors on control operation and related documentation
- Communicate progress, escalations, and issue resolutions to management and team stakeholders
- Create procedural documentation, including training materials that support how we support control owners in risk to control analysis, control narratives, and how we operate as a Security Compliance team in the form of runbooks for new processes.
Required Experience or Skills
- 4+ years of security, IT compliance (internal or external audit) or equivalent experience
- 2-4 years of technical cyber security experience, with hands-on experience in vulnerability assessment and/or incident response (e.g., SOC Analyst, etc.).
- A bachelor degree in Cyber Security, Information Systems, or a combination of education and experience.
- Security+ certification or GIAC/SANS certifications highly desired
- Knowledge and practical experience with policy and regulatory mandates such as COBIT, SOC1/SOC2, CSA-CCM, ISO27001/27002/27031, GDPR, CCPA, PCI-DSS and NIST Risk Management Framework and associated standards such as sp800-34, sp800-53, FedRAMP, CMMC, etc.;
- Prior consulting experience in Cybersecurity
- Prior experience working closely with auditors and/or external regulators
- Experience with compliance initiatives from start to finish
- Experience sourcing, interpreting, and reporting on data via data visualization tools
- Outstanding written and spoken communication skills
- Ability to effectively and autonomously accomplish outcomes across cross-functional teams in ambiguous situations with light supervision
You'll get:
- Competitive salary with health benefits
- An extremely energising, dynamic and fast paced entrepreneurial working culture and environment
- An opportunity to travel to international locations where our clients may be based
- Latest laptop, devices and technologies for your needs
- Unique and supportive opportunities to progress in your career
- On-going team and professional development
Where:
India - Remote
at Versatile Commerce LLP
Position Overview:
We are seeking a highly skilled and motivated Identity and Access Management (IAM) Developer/IAM Engineer to join our dynamic team. The successful candidate will be responsible for designing, implementing, and maintaining robust IAM solutions that ensure secure access to our systems and applications. This role involves collaborating with various teams to understand their requirements and deliver scalable and efficient IAM systems.
Key Responsibilities:
- The technical developer must comprehend and implement customization based on specifications in business requirement documents or sprint tasks.
- They should review the solution with the business analyst before presenting it to external stakeholders or deploying it to any production environment.
- All customizations, fixes and tests are correctly documented with all related scenarios, evidence and stored in the corresponding folders/ tools.
- All deployments must adhere to application factory guidelines and be validated by team members.
- Developers are responsible for productive system deployments using the ‘4 eyes principle’, ensuring dual verification. Accurately and methodically complete all required information in predefined templates for cutover plans, system testing, UAT, change requests, and application team communications as instructed.
- Comprehend existing template content, make necessary updates, ensure team alignment, and address issues before submitting to the application team for review.
- Maintain frequent communication with team members to report progress, ensure alignment, and promptly address any issues or blockers encountered.
- Prepare and internally review test data for demo/ UAT sessions with the application team, ensure sessions are recorded and structured logically, and assess all feedback received for potential integration.
- Assess feasibility, develop configurations, prepare test data, conduct demo and UAT sessions, create production deployment documents, submit change requests, execute go-live, and facilitate handover to Operations.
Required Qualifications:
- Have a minimum of 2 years of hands-on experience with the identity product (Saviynt EIC 23.x/24.x)
- Possess comprehensive understanding of Saviynt IGA architecture, with practical experience in application onboarding, workflow implementation, Segregation of Duties (SOD), certifications, and custom jar development.
- Know and have experience working in agile environments (Scrum), being capable of following the existing protocols and ceremonies that will be part of the day-to-day basis.
- JSON working knowledge.
- Build SQL queries when required (MySQL 8.0 as backend)
- Knowledge of APIs (SOAP, REST)
- Capable of using tools to consume APIs like Postman or SOAP UI
- Basic knowledge on directory services and applications like Active Directory, Azure AD, Exchange (online/ on-prem)
at Gipfel & Schnell Consultings Pvt Ltd
Senior Security Architect
The Security Architect leads the design and development of innovative security architectures for protecting data deployed into different types of cloud and cloud/hybrid systems. This position will directly contribute to the overall global enterprise cloud architecture and lead the security vision and strategy around cloud-based applications, across all types (including Infrastructure, Platform, and Software as a Service (IaaS/PaaS/SaaS).
Job Description
The Security Architect will serve as the central point of contact for other Technology teams within the Organization for all matters related to cloud security.
The successful candidate possesses the excellent interpersonal and communication skills required to partner with other leaders across the business to identify opportunities and risks and develop and deliver solutions that support business strategies and protect the intellectual property globally.
Expertise – Collaborate with Application Owners, Technical Owners, Platform Leads, and Information Security teams, to architect and design cloud security solutions.
Knowledge of cloud security services such as Azure and AWS is essential
Delivery – Complete architecture assessments across projects, prove use of security solutions to support new distributed computing solutions that span private cloud and public cloud services.
Security Technology Strategy – Work with engineering, service and business teams to create technology roadmaps.
Responsibilities Include
• Design and develop security architectures for cloud and cloud/hybrid based systems. Possess a firm understanding of the offerings within both Amazon Web Services (AWS) and the Microsoft Azure platforms. Based on business requirements, design and implement cloud-native architecture and design that will allow those requirements to be met with a minimal degree of risk and with appropriate security controls present.
• Represent the Corporate Information Security Office in development and implementation of the overall global enterprise cloud architecture.
• Act as the ambassador and senior technical representative for Information Security while engaging with other senior technical leaders throughout the Organization in design and implementation of cloud and cloud/hybrid based implementations and solutions.
• Work with Engineering, Infrastructure Services, and Application Development organizations to choose appropriate technology solutions and facilitates complete integration. Develops standards in partnership with Engineering, Infrastructure Services, and Application Development.
• Lead training and technical forums, serve as both a formal and informal mentor, and execute other initiatives designed to share knowledge across Security and Technology groups.
• Identify, recommend, coordinate, and/or conduct informal/formal training sessions to deliver timely knowledge to support teams regarding technologies, processes or tools.
• Develop and execute strategies to increase Cloud Security knowledge throughout the enterprise, as well as developing and mentoring more-junior security analysts and engineers.
• 5-8 years of experience with Security Architect and/or Engineering.
• 3-5 years of experience with Cloud platforms such as Microsoft Azure and Amazon Web Services (AWS).
• Experience architecting solutions within Microsoft Azure, Amazon Web Services (AWS) and, preferably, other cloud providers.
• Experience with assessment, development, implementation, optimization, and documentation of a comprehensive and broad set of security technologies and processes (secure software development (Application Security), data protection, cryptography, key management, identity and access management (IAM), network security) within SaaS, IaaS, PaaS, and other cloud environments.
• Working knowledge of common and industry standard cloud-native/cloud-friendly authentication mechanisms (OAuth, OpenID, etc).
• Experience with deployment orchestration, automation, and security configuration management preferred.
• Experience with service-oriented architecture for cloud-based services.
• Experience working with cloud security and governance tools, cloud access security brokers (CASBs), and server virtualization technologies.
• Experience with enterprise applications (architecture, development, support, and troubleshooting).
• Experience performing threat modeling and design reviews to assess security implications and requirements for introduction of new technologies.
• Experience representing technical viewpoints to diverse audiences and in making timely and prudent technical risk decisions.
• Experience with enterprise architecture and working as part of a cross-functional team to implement solutions.
• Strong interpersonal and communication skills; ability to work in a team environment
• Ability to work independently with minimal direction; self-starter/self-motivated
• Detailed understanding of SSL/TLS protocols and certificate-based solutions
• Technical writing experience
Preferred Qualifications
• Minimum of 15 years of formal education - Graduate / Postgraduate in Computer Science / Information Technology Professional work experience between 10-15 and at least 6-8 years as a Security Architect / Junior Security Architect
• Working Experience with distributed team preferred.
• Relevant industry certifications such as CISSP, CISM, or CCSP
A BIT ABOUT US
Appknox is one of the top Mobile Application security companies recognized by Gartner and G2. A profitable B2B SaaS startup headquartered in Singapore & working from Bengaluru.
The primary goal of Appknox is to help businesses and mobile developers secure their mobile applications with a focus on delivery speed and high-quality security audits.
Appknox has helped secure mobile apps at Fortune 500 companies with Major brands spread across regions like India, South-East Asia, Middle-East, US, and expanding rapidly. We have secured 300+ Enterprises globally.
We are a 40+ incredibly passionate team working to make an impact and helping some of the biggest companies globally. We work in a highly collaborative, very fast-paced work environment. If you have what it takes to be part of the team, we are excited and let’s speak further.
The Opportunity
The Sales team @ Appknox is one of the most active and agile teams in the organisation. With multiple channels to penetrate the global markets, the team is a right mix of dynamic ,aggressive and experienced professionals added with a go getter attitude. The team interacts with the CXOs and leadership teams of global firms and has closed high value deals including Fortune 500 / 100 Enterprises. This role provides the candidate with an opportunity to own, learn and grow along with the organization scaling new heights in both professional and personal grounds.
What An Ideal Candidate Would Look Like:
- 4-5 years of experience in End to End Enterprise sales in a SaaS company/IT company.
- The candidate will be resourceful enough to set-up processes and working methods, strategic enough to provide thought leadership and execution oriented enough to build a robust pipeline
- Highly Proactive, Open to Feedback and has growth mindset
- Willing to generate pipeline on their own and works closely with the SDR team sharing best practices and regional intel
- Relevant experience in a cyber security company building a strong sales pipeline is good to have
Requirements:
- Advanced skill set for gathering requirements, writing SOWs, documenting RFI/RFPs, and submitting commercial proposals
- Understands and drives BANT/MEDDPICC/MEDDICC on deals
- Has experience with Outbound and is willing to drive his/her pipeline
- Expertise in working on executive presentations and other sales and marketing-focused automation tools is a plus.
- Has worked on a HubSpot/Salesforce CRM at his previous organization and also has a good idea about CRM Hygiene.
- Excellent written and verbal communication skills, including the ability to persuade, influence, negotiate, and make formal presentations in meetings and training environments
- Open to working in shift timings, if required
Key Responsibilities:
- Drive end-to-end sales cycles, including lead generation, sales presentations, technology demonstrations, commercial proposal submissions, contract negotiations, and revenue generation.
- Develop a consulting and a trusted advisory relationship with client stakeholders and executive sponsors.
- Proactively assess, clarify, and validate client needs on an ongoing basis and convert client needs into enterprise contracts to meet sales quota/target
- Work cross-functionally with the the business development, marketing, delivery, and finance teams to ensure the timely and successful delivery of solutions that meet client needs and objectives.
- Analyze the latest marketing trends using CRM and analytics tools, tracking competitors' activities and providing valuable inputs for fine-tuning marketing strategies.
- Go the extra mile to make it an excellent experience for the client and build a great organization with a get-things-done attitude
Interview Process:
Round 1: Profile Evaluation by HR
Round 2: Assignment (Call script)
Round 3: Interview with Head of Sales
Round 4: Assignment Demo of call script product
Round 5: Expectation Setting
Round 6: Salary negotiation/work culture fit by HR
Compensation:
As per Industry Standards
Why Join Us:
- Responsibility: If you enjoy challenging work and pushing your boundaries, this is the right place for you.
- Great Salary & Equity: We keep up with the market standards & provide pay packages considering updated standards. Also, as Appknox continues to grow, you’ll have a great opportunity to earn more & grow with us. Moreover, we also provide equity options for our top performers.
- Holistic Growth: We foster a culture of continuous learning and take a much more holistic approach to training and developing our assets: the employees. We shall also support you all on that journey of yours.
- Transparency: Being part of a start-up is an amazing experience, one of the reasons being the open communication and transparency at multiple levels. Working with Appknox will give you the opportunity to experience it all firsthand.
- Health insurance and Cult live: We offer health insurance coverage up to 5 lacs for you and your family, including your parents. Cult live membership for all team members who are looking at fitness.
Position Title : Regional Sales Manager (Senior )
CTC : 8-10 LAP
Experience : 5-8year
Location : Thane, Pune
Working Mode : (WFO)
Primary Skills : Cyber Securities Sales (Filed Sales)
Qualification : MBA (Marketing )
Responsibilities:
- Tenaciously prospecting, qualifying, and capturing leads as sales opportunities through prospecting via phone, Internet, and social media platforms.
- Responsible for generation of business in the assigned vertical from existing accounts and generation of new accounts.
- Prepare detailed proposals/quotes as per customer requirements and adhere to standards in preparing such documents.
- Maintain good & long-term trusting relationships with the OEMs and existing clients
- Creatively following up on inbound leads to further peak prospects' interests, orders and timely collections of AR.
- Identify client needs and suggest appropriate products/services, and set up meetings/calls with them.
- Maintain knowledge and awareness of competitors’ products, pricing, discount structures and overall strengths and weaknesses
- Proactively seek new business opportunities
- Achieve set targets in terms of revenue, profitability & other result areas for the given period.
- Maintain data and information analysis to assist in decision making & compliance to ISO norms.
Requirements:
- Proven work experience for 3-6 years as a Business Development Specialist, Sales Account Manager, or similar role in technology or cybersecurity
- Exposure to the entire sales journey i.e., starting with prospecting and culminating in closure / revenue.
- Track record of achieving sales quotas.
- Ability to be flexible and work in a rapidly changing, collaborative, fast-paced environment.
- Experience working in CRM and Office product suites.
- Understanding of sales performance metrics.
- Excellent communication and negotiation skills.
- Ability to deliver engaging presentations.
- BS degree in Business Administration or relevant field.
- The ability to work with a variety of personalities
- Ability to research, utilize and leverage social media and the internet to qualify leads, and drive opportunity and revenue.
- Provide cybersecurity consulting services to various clients of Crossbow Labs.
• Conduct interviews with clients, review client documents for compliance, write compliance reports, and prepare and deliver briefings.
• Travel to client locations to assess and validate physical and technical controls necessary to maintain compliance.
• Review network architecture, hardening of multiple operating systems, malware protection, IDS/IPS, IT controls, network and system monitoring, and protection methods.
• Work closely with clients to assess their IT security posture, identify weaknesses and vulnerabilities in relation to the PCI-DSS security framework, ISO, and other compliance standards.
• Develop compliance procedures and documentation for the PCI program.
• Conduct training sessions for clients and internal teams on PCI DSS and other cybersecurity standards and regulations.
Skills and Competencies:
• Strong technical understanding of networks, servers, workstations, and applications.
• Proficiency in the PCI DSS v3.2.1 and PCI DSS v4.0 security standard.
• Good comprehension of the ISO 27001 standard.
• Ability to conduct Risk Management, Business Continuity Planning (BCP), and Disaster Recovery (DR) reviews.
• Capability to perform network architecture reviews.
• Capability to perform system configuration reviews for operating systems (Windows & Linux), servers, databases, routers/switches, and firewalls.
• Ability to conduct firewall/network rules reviews.
• Ability to conduct application architecture reviews, review application security controls, and perform application code reviews.
• Familiarity with cloud-based hosting solutions such as Microsoft Azure and AWS.
• Strong team collaboration skills and client relationship management.
• Excellent oral and written communication skills.
• Ability to work both independently and in collaborative environments to meet delivery obligations.
• Commitment to continuous learning and staying updated with current news and trends in the cybersecurity space.
Education Qualification
BCA / B.Tech / B.Sc – Computers Science / B.Sc - Information Security / M.Sc – Information Security.
Certifications (Preferred)
PCI QSA / ISO 27001 / CISSP / CISM / CISA
BD Software Distribution Pvt. Ltd. is a leading Value Added Distributor (VAD) in the Indian market, offering industry-leading consumer, SMB, and Enterprise-level solutions. We are the Country Partner for top brands in the cybersecurity industry, including Bitdefender. With a strong partner network and technical expertise, we provide comprehensive protection against malware and cyber threats to government organizations, businesses, and consumers. With over 750,000 users in India, we are committed to helping achieve cyber peace.
Job Overview
We are seeking a Renewal Specialist to join our team at BD Software Distribution Pvt. Ltd. This role involves managing the renewal process for our software solutions and ensuring customer satisfaction. The ideal candidate should have 1 to 3 years of experience in a similar role, strong communication skills, and a customer-centric approach. This is a full-time position based in Navi Mumbai, Maharashtra, India.
Qualifications and Skills
1 to 3 years of experience in a Renewal Specialist or similar role
Strong understanding of software solutions and the renewal process
Excellent communication and interpersonal skills
Customer-centric approach with a focus on delivering high-quality service
Ability to build and maintain relationships with customers
Strong problem-solving and negotiation skills
Ability to work collaboratively in a cross-functional team environment
Proficiency in CRM software and MS Office
Attention to detail and strong organizational skills
Roles and Responsibilities
Manage the renewal process for software solutions, ensuring timely renewals and customer satisfaction
Develop and maintain strong relationships with customers, understanding their needs and addressing any inquiries or issues
Provide product knowledge and recommendations to customers, ensuring they are maximizing the value of our solutions
Collaborate with internal teams, including Sales and Support, to achieve renewal targets and resolve customer concerns
Track and monitor customer accounts, identifying opportunities for upselling and cross-selling
Prepare and present reports on renewal activities, highlighting trends, challenges, and opportunities
Stay up-to-date with industry trends and competitive landscape to contribute to product enhancements and market positioning
Maintain accurate and updated customer information in the CRM system
**Job Description:**
1. We are looking for at least 3 to 6 years of experience and have infosec certifications CISSP ,Data Security ,CISA,Cloud security,Security montioring&incident response,ECSA, or relevant proven experience in Setting up ,executing Infosec processes for organisations using policies and technologies.
2. Must have understanding and experience in SaaS technology and setting & enhancing up infosec policies and controls to secure cloud infra,data of saas ,IT infra, Code practices. with respect to NIST,SOC2,ISO 27000 series,CIS, MITRE,GDPR,OWASP,SANS frameworks.
3. Specialized on GRC (to carry required compliance certifications one by one needed for SaaS )as well as able to do ground work with respect to technical Setup, execution of the infosec related controls & activities such as Vulnerability assessment, SIEM & incident response, Cloud security, Data security in SaaS with respect insider data theft and outsider exploitation, code security ,pen testing and able to present it to management etc.
Job Position | Product Lead Architect
Hiring Mode | Full Time / Permanent
Job Location | Gurgaon
JOB DESCRIPTION
Key Responsibilities:
- Lead the development of solutions in Cybersecurity, specializing in Cloud-Firewalls, SIEM/SOAR, and Network and Security Operations..
- Make architectural and design decisions for the project.
- Guide team members in technical matters and supervise system modifications.
- Establish project specifications and technical direction.
- Delegate tasks, issue feedback, evaluate risks, and resolve conflicts.
- Continuously improve knowledge and skills by researching new technologies and sharing knowledge with the team.
- Mentor junior team members and work with legacy software
Qualifications and Experience:
- Bachelor's degree in computer science, IT, software development, or a related field. Degree in cybersecurity is an added advantage.
- Extensive industry experience, preferably with a background in networking.
- Prefer candidate swith Start-up background.
- Experience working with Agile methodologies.
Key Skills and Technologies:
- Proficiency in PHP, Python, and AWS
- Knowledge of Node.js and Go
- Strong technical design background
- Excellent communication skills, both verbal and written
- Ability to mentor and guide team members
Location: Abu Dhabi, United Arab Emirates (UAE)
Nationality: Any
Desired Experience: 10+ years
Job Description :
To guide and advise customers on building SOC-related services from scratch or assist in improving existing services. To assess the maturity and capability of services in scope and propose improvements. Closely working with other SOC teams, and assisting them in achieving their goals. To work closely with the rest of the Advisory team and exchange knowledge and experience.
What You’ll Do
- Deliver high-level strategy and executive advisory services.
- Lead client engagements in security advisory at the highest strategic level.
- Establish and align business principles and objectives to the long-term security operational vision by applying tactical guidance for various information security operating models.
- Perform SOC maturity assessments and build precise roadmaps based on the goals and objectives of the organization.
- Provide clients with guidance during the Initial Operating Capability (IOC) through full operational capability (FOC) covering key aspects of SOC domains such as business, process, governance, technology, people, and services.
- Create and build on the concept of operations (ConOps) in the pre-work stages that strategically prepare the client for the successful implementation of security technology and operations.
- Assist clients with recommendations in different advisory stages, such as creating security operations strategy (SOC Charter), developing training programs, assisting with use case framework implementation, developing standard operating procedures, and applying service/integrated frameworks.
- Possess the ability to identify the client's problems and use common consulting management skills such as facilitation, gap analysis, interviewing, and engaging in multiple workshops with key stakeholders.
- Collaborate with clients to define services and build technology strategies as part of the build, plan, and design phases of security operations.
- Perform as a subject matter expert (SME) in strategy conversations with C-level panels to provide exceptional IT/OT/Cloud/Physical security, compliance, regulations, and industry best practices that promote the overall mission and vision of the organization.
- Maintain a good understanding of security trends and methods for pinpointing cyber and physical security solutions that fit the client's business, financial, and technological objectives.
- Identify, build, and create cyber solutions to address security issues, perform security operations content reviews, draw conclusions, and develop strategic guidance.
- Assess and develop the current security operation effectiveness by reviewing operating procedures, workflows, policies, frameworks, and operational reporting.
- Consistently contribute towards industry-specific offerings/professional security forums/internal departmental blogs/publications/develop thought leadership.
- Contribute to the proposal process for SOC Advisory services while collaborating with other internal group members to solidify the sales pitch approach.
What you bring to the table
- 10+ years of extensive IT Security / IT Consultancy/client-facing roles related to SOC/Security operations projects (Cybersecurity Managers, IT Security Engineers, Security Analysts, Senior/Principal Security Analysts)
- Experience in SOC strategy, roadmap and documentation development, adapted to client organization (Services catalog, Security Incident Response management plan, playbooks)
- Possess the ability to support the vision and mission of any organization's security program.
- Retained proficiency in delivering high-quality and high-level strategic and advisory services.
- Possesses certifications related to enterprise information security frameworks and/or compliance, regulation-type frameworks.
- Experience in understanding complex activities and relationships quickly, assessing business and delivery risks, and communicating them effectively.
Benefits
- Schooling
- Flight & visa allowance for self and family
- Mobile Allowance
- Insurance for self & Family
- Life Insurance for self
Contract Review and Lifecycle management is no longer a niche idea. It is one of the fastest growing sectors within legal operations automation with a market size of $10B growing at 15% YoY. InkPaper helps corporations and law firms optimize their contract workflow and lifecycle management by providing workflow automation, process transparency, efficiency, and speed. Automation and Blockchain have the power to transform legal contracts as we know of today; if you are interested in being part of that journey, keep reading!
InkPaper.AI is looking for passionate DevOps Engineer who can drive and build next generation AI-powered products in Legal Technology: Document Workflow Management and E-signature platforms. You will be a part of the product engineering team based out of Gurugram, India working closely with our team in Austin, USA.
If you are a highly skilled DevOps Engineer with expertise in GCP, Azure, AWS ecosystems, and Cybersecurity, and you are passionate about designing and maintaining secure cloud infrastructure, we would love to hear from you. Join our team and play a critical role in driving our success while ensuring the highest standards of security.
Responsibilities:
- Solid experience in building enterprise-level cloud solutions on one of the big-3(AWS/Azure/GCP)
- Collaborate with development teams to automate software delivery pipelines, utilizing CI/CD tools and technologies.
- Responsible for configuring and overseeing cloud services, including virtual machines, containers, serverless functions, databases, and networking components, ensuring their effective management and operation.
- Responsible for implementing robust monitoring, logging, and alerting solutions to ensure optimal system health and performance
- Develop and maintain documentation for infrastructure, deployment processes, and security procedures.
- Troubleshoot and resolve infrastructure and deployment issues, ensuring system availability and reliability.
- Conduct regular security assessments, vulnerability scans, and penetration tests to identify and address potential threats.
- Implement security controls and best practices to protect systems, data, and applications in compliance with industry standards and regulations
- Stay updated on emerging trends and technologies in DevOps, cloud, and cybersecurity. Recommend improvements to enhance system efficiency and security.
An ideal candidate would credibly demonstrate various aspects of the InkPaper Culture code –
- We solve for the customer
- We practice good judgment
- We are action-oriented
- We value deep work over shallow work
- We reward work over words
- We value character over only skills
- We believe the best perk is amazing peers
- We favor autonomy
- We value contrarian ideas
- We strive for long-term impact
You Have:
- B.Tech in Computer Science.
- 2 to 4 years of relevant experience in DevOps.
- Proficiency in GCP, Azure, AWS ecosystems, and Cybersecurity
- Experience with: CI/CD automation, cloud service configuration, monitoring, troubleshooting, security implementation.
- Familiarity with Blockchain will be an edge.
- Excellent verbal communication skills.
- Good problem-solving skills.
- Attention to detail
At InkPaper, we hire people who will help us change the future of legal services. Even if you do not think you check off every bullet point on this list, we still encourage you to apply! We value both current experience and future potential.
Benefits
- Hybrid environment to work from our Gurgaon Office and from the comfort of your home.
- Great compensation package!
- Tools you need on us!
- Our insurance plan offers medical, dental, vision, short- and long-term disability coverage, plus supplemental for all employees and dependents
- 15 planned leaves + 10 Casual Leaves + Company holidays as per government norms
InkPaper is committed to creating a welcoming and inclusive workplace for everyone. We value and celebrate our differences because those differences are what make our team shine. We hire great people from diverse backgrounds, not just because it is the right thing to do, but because it makes us stronger. We are an equal opportunity employer and does not discriminate against candidates based on race, ethnicity, religion, sex, gender, sexual orientation, gender identity, or disability
Location: Gurugram or remote
Experience:- Overall 10 to 12 years of experience of which atleast 5 to 7 years’ experience should be in Information Security. Mandatory is 5 to 7 years’ experience in Information security and with one full end to end implementation experience.
Base location: - Bengaluru - Must
Requirements: -
- Mandatory - ISO 27001:2013 lead implementor certified
- Mandatory - ISO 27001:2013 lead auditor certified (but if it is a good candidate, we can still consider)
- Good to have – CISA, CISM, Risk management certification, Privacy certifications.
- Mandatory - Atleast one end to end implementation experience of ISO 27001 standard. The candidate should have a good implementation knowledge of ISO 27001, ISO 27002 standards and is required to implement the ISO requirements and run the ISMS program for multiple countries.
- This immediate requirement is for implementing the ISMS program for our Canadian office location. The candidate should be willing to work from Bengaluru in EST time zone during this implementation phase whenever required.
- Good documentation skills.
- Develop, implement, maintain, review and continually improve Information Security policies.
- Good understanding and knowledge of applicable legal and regulatory requirements as relevant to information security.
- Manage and maintain a risk register / risk database along with risk treatment plans.
- Good understanding of physical and environmental security.
- Conduct Internal Audits based ISO 27001 standards and Personal Data Protection policies. A good experience in independently conducting Internal and supplier audit with respect to information security.
- Provide training to the employees on Privacy & Information Security Management System on regular intervals.
- The greater part of the job involves interacting with people, interviewing them / auditing, Preparing audit reports, discussing / persuading / influencing.
- Mandatory: Good verbal and written communication skills. Eye for details.
- Good presentation skills.
- Since this is a trusted role, candidates must be willing to undergo extensive background checks to verify their identity, character, qualifications, skills and experience.
· Maximum 5 years of Information Technology/Technology Operations/Information Security experience required.
· Minimum 3 years of experience in Cybersecurity, Identity & Access Management, Role Based Access Control, and Identity Governance is mandatory.
· Knowledge on User Life Cycle Management, Access provisioning, Access administration is must.
· Experience with technologies such as Role-Based Active Control (RBAC) and Attribute Based Access Control (ABAC) is required.
· Experience in User Access Re-certification activities is mandatory.
· Working knowledge on Active Directory is must.
· Working experience on any IAM tool (SailPoint/Okta/OneIdentity/Varonis/MIM) would be added advantage.
· Knowledge on Identity and Access Management role/processes/tools is must.
· Prior experience in processing IAM requests (Add/Modify/Delete) is must.
· Experienced in Incident management & Change Management processes.
· Knowledge of and the ability to adhere to SAS and SOX audit requirements pertaining to Identity & Access Management job requirements.
· Experience with work-flow management tools such as ServiceNow.
· Leveraging creative thinking and problem solving skills, individual initiative, and utilizing MS Office (Word, Excel, Access, and PowerPoint).
· Understanding personal and team roles; contributing to a positive working environment by building solid relationships with team members; proactively seeking guidance, clarification and feedback.
· Identifying and addressing business needs: building relationships with Stake Holders; developing an awareness of Firm services; communicating with the business/stake holders in an organized and knowledgeable manner; delivering clear requests for information; demonstrating flexibility in prioritizing and completing tasks; and communicating potential conflicts to a supervisor
· Experience performing user administration tasks for various in-house and third-party applications.
· Analyzing, prioritizing, and resolving faults to resolution. Resolve tickets according to SLAs and escalation procedures.
· Strong analytical, problem solving and organizational skills. Be proactive, dynamic, and flexible.
· Good Communication skills, able to articulate well with business and stakeholders.
· Education Qualification : Any graduate/post graduate with Computer Science background.
Responsibilities:
- Identify and research new business opportunities and potential clients.
- Support the implementation of business development and marketing strategies.
- Conduct market research to understand trends, competitors, and customer needs.
- Generate leads through various channels, including email, phone, social media, and events.
- Collaborate with sales and marketing teams to create engaging content and promotional materials.
- Attend business meetings, conferences, and events to network with potential clients.
- Maintain accurate records of business development and marketing activities.
- Provide regular progress reports and updates to the team.
- Stay up-to-date with industry trends and best practices.
Qualifications:
- Pursuing or recently completed a degree in Business, Marketing, Sales, or a related field.
- Ability to work independently and within a team in a fast-paced environment.
- Strong organizational skills with the ability to prioritize and manage multiple tasks.
- Proficient in Microsoft Office Suite; familiarity with CRM software is a plus.
We are seeking a highly skilled and experienced Subject Matter Expert (SME) to join our team and provide valuable insights and analysis on our cybersecurity training content and competitors. Our business vertical focuses on delivering automated cybersecurity training through a software platform to over 1 million employees of our 150+ global customers. We cater to various industries and diverse backgrounds, with different levels of technical expertise. Thus, we create a diversified variety of content to cater to the training requirements of different user groups and personas. The SME's role will be pivotal in ensuring efficient and effective cybersecurity awareness training by creating high-quality content.
Responsibilities:
● Review and evaluate cybersecurity awareness content to ensure accuracy, relevance, and effectiveness.
● Write industry-specific technical content to cater to the diversified audience.
● Provide feedback and recommendations to improve content quality and alignment with industry standards.
● Conduct competitive analysis to identify industry trends, best practices, and potential gaps in our offerings.
● Analyze global competitor strategies and offerings to identify strengths, weaknesses, and opportunities that benefit our customers.
● Stay up-to-date with the latest cybersecurity trends and industry developments to ensure our offerings remain competitive.
● Collaborate with cross-functional teams to ensure content is aligned with marketing and sales strategies.
● Identify and refine complex security problems in a simplified and layman way.
Qualifications:
● Bachelor's degree or certifications in cybersecurity, computer science, or a related field.
● Minimum of 3-5 years of experience in cybersecurity content writing and competitive analysis.
● Strong knowledge of cybersecurity concepts and best practices.
● Experience with analyzing competitor strategies and offerings.
● Excellent communication and collaboration skills.
● Strong analytical and critical thinking skills.
● Self-motivated and able to work independently.
● Ability to adapt to changing priorities and deadlines.
If you are a cybersecurity professional with a passion for creating high-quality content and analyzing the cybersecurity industry's latest trends and developments, we encourage you to apply. Join our team and help us deliver top-notch cybersecurity awareness training to our global customers.
at Celebal Technologies Pvt Ltd
Job Responsibilities:
· Assist the Security Manager in developing and implementing security policies and procedures.
· Conduct regular security risk assessments and audits.
· Monitor security systems, including firewalls, intrusion detection systems, and access controls.
· Respond to security incidents and provide recommendations for remediation.
· Assist in managing user access and authentication.
· Provide security awareness training to employees.
· Maintain and improve endpoint security solutions (e.g. antivirus, endpoint detection and response).
· Collaborate with other departments to ensure security is integrated into all aspects of the organization's operations.
· Stay up to date on the latest security threats and industry trends.
Qualifications and skills:
· Bachelor’s degree in computer science, Information Security, or a related field.
· 4-5 years of experience in security-related roles.
· Knowledge of security systems and protocols.
· Familiarity with risk management frameworks.
· Knowledge of compliance regulations and standards.
· Excellent communication and interpersonal skills.
· Strong analytical and problem-solving skills.
· Ability to work independently and as part of a team.
· Attention to detail and accuracy.
Role : Full-Time Individual Contributor (IC)
Reporting to : Solution Architect / Program Manager
Education : BTech/ BE / MCA / MSc Computer Science
Industry : Product Engineering Services or Enterprise Software Companies
About Us
CLOUDSUFI is a Silicon Valley-based specialist Data Engineering & Cloud Technologies player with top-tier clients, favorable revenue mix, strong financial performance, and robust management. We pride ourselves in helping in the Data Discovery, Insights and Monetization for organizations. We offer quality of work, opportunities to learn new platforms/technologies that will help young engineers put themselves ahead in their careers compared to their peers in the IT Services industry. CLOUDSUFI is a Data Science and Product Engineering company building Products/Solutions for Technology and Enterprise industries leveraging the advent of Cloud Hyper Scalers and AI/ML, NLP technologies. The organization is built to scale with strong external/ internal tech capabilities and governance standards. Started in 2019, CLOUDUSUFI is a family of 250 members working towards a common goal of making the enterprise data dance. To know more, please visit https://cloudsufi.com
ABOUT THE ROLE
InfoSec Engineers will participate in all phases of a typical DevOps pipeline: plan, code, build, test, release, and deploy. He/she will be scanning our networks, applications, and containers (images). In addition to the Vulnerability Management platform, this individual will support and/or serve as a backup for AWS WAF, Guard Duty, PagerDuty, and CloudFlair security platforms.
This Includes: ● Work independently with vendors and collaborate with colleagues ● -Experience on monitoring and operation of AWS cloud infrastructure ● -Experience with AWS automation tools Terraform ● -Analyzing, Troubleshooting and resolving issues with the cloud monitoring tools as Datadog and Cloudflare ● -The ability and skill to train other people in procedural and technical topics ● -Strong communication and collaboration skills
ABOUT YOU ● 3+ years’ experience with Tenable.io platform ● 3+ years’ experience with AWS orchestration via Terraform script ● 3+ years’ experience with CloudWatch/CloudTrail/Guard Duty ● 3+ years’ experience with AWS WAF ● 3+ years’ experience with CloudFlare ● 2+ years’ experience with DataDog ● Experience with PagerDuty ● Ability to make nuanced threat assessments ● Experience with the NIST family of Information Security-related publications including 800-37, 800-30, and 800-53 ● Significant experience with PCI, SOC2, SOX, HIPAA, or other compliance regimes Salary: Best as per Industry Standards
Company Introduction :
My Next Developer is a global network of top talent in business, design, and technology that enables companies to scale their teams, on-demand.
We take the best elements of virtual teams and combine them with a support structure that encourages innovation, social interaction, and fun. We see no borders, move at a fast pace, and are never afraid to break the mold.
Job Responsibilities
- Ensure security in the development activities.
- Implement risk management techniques and threat modeling.
- Implement infrastructure automation, monitoring and alerts as part of ISO 27001 and SOC 2 certifications.
- Collaborate with internal teams to produce the best security solutions
Minimum requirements :
- Bachelor's/Master's degree in degree in computer science, cybersecurity, engineering, or equivalent degree.
- 3+ years of experience as a DevSecOps engineer.
- Proficiency in back-end technologies such as NodeJs or Python.
- Expertise in using DevOps tools like GitHub, dependency management, and CI/CD.
- Profound knowledge of AWS cloud, DevOps culture and automation tools.
- Fluent in both spoken and written English communication.
- Ability to work full-time (40 hours/week) with a 2-3 hour overlap with European time zone.
- Stay up-to-date on cybersecurity threats and follow the best practices.
- Previous project experience related to ISO 27001 and SOC 2 certifications.
at BD SOFTWARE DISTRIBUTION PVT LTD
Position: Technical Presales Manager
Job type: Full-time/ Permanent
Total Experience: Minimum 4-5 Years
- Maintain, drive, supervise and implement robust technical standards, systems and processes
- Influence technology strategies and decisions with a high level of expertise and knowledge
- Provide direction and support to ensure compliance with relevant legislative specifications and standards
- Lead a team of staff developing products, and addressing training needs when necessary
- Coordinate the regular testing of products to address faults, and provide evaluations to improve them
- Act as a key contact with customers who have technical issues
- Experience in handling technical support Team
- handling the escalated issues and resolving them over the phone/e-mail/remote meeting.
- Addressing end clients and channel partners/system integrators/solution partners/service providers/consultants.
- Conduct product demos and training
- Should be open to work in general shift.
REQUIRED SKILLS :
- Good communication skills, both written and verbal
- Self-motivated with the ability to work under pressure and own initiative
- Problem-solving skills, analytical skills and the ability to make decisions quickly
- Organisational and team leader skills
- Knowledge of process improvement and validation
- Knowledge of regulatory standards relevant to your industry
- The ability to investigate and identify trends
- Good Knowledge of Hardware and Networking concepts
- Good Knowledge of Windows, Linux and Mac OS, Android and iOS
- Good Knowledge of Antivirus, Endpoint security, DLP, MDM, and Remote technologies.
- Should be capable to handle a team of L1 engineers.
- Prepare documents on technical knowledge.
The individual should have all the basic knowledge about cyber laws and current rules and regulations.
Individual must be confident enough and has deep knowledge of cyber law.
Reporting recurrent technical difficulties and other notable incidents to the appropriate member.
Thorough understanding and best practices of legal guidelines partnered with a willingness to follow the procedures.
Excellent communication and interpersonal skills.
Well-organized and committed.
Creative and energetic.
Strong moral values and discipline.
Ensuring that all required equipment remains in perfect condition.
- Develop efficient strategies to protect the system, the networking infrastructure, data, and information systems against potential threats/cyber risks
- Routinely performing threat analysis, system checks, and security tests
- Defining and updating information security criteria and validation procedures
- Effectively discuss to understand safety and security and fix the problems along with different stakeholders
- To be a security representative or point of contact for all technical deliveries, initiatives, and project implementations.
- To develop technical processes and procedures and promote compliance in line with regulations, corporate policies, or standards as per ISO27001
- Assess technical security risks in terms of impact on systems and service confidentiality, integrity, and availability, and report and escalate results of risk assessments.
- Report any real or potential security breaches/vulnerabilities to various stakeholders and provide technical support during incident response
- Monitor security tools to detect security events & incidents Report and escalate any security breaches to the Information Technology Security Officer
- Operate vulnerability scanning and compliance tools to identify system weaknesses
- Represent IT Security matters at technical and business forums.
Desired candidate profile :
- Relevant experience in the information security field
- Relevant experience working with ISO Policies, and GDPR guidelines.
- Strong knowledge of network architecture and security concepts related to routing
- Exceptional attention to detail
- Excellent analytical and problem-solving skills
- Great team player and able to work efficiently with minimal supervision
- Excellent communication skills, both written and verbal, work with the different stakeholders on strengthening the security risks.
- Able to handle and cope with stressful situations and understands the pressures of a start-up environment
About the role
Checking quality is one of the most important tasks at Anakin. Our clients are pricing their products based on our data, and minor errors on our end can lead to our client's losses of millions of dollars. You would work with multiple tools and with people across various departments to ensure the accuracy of the data being crawled. You would setup manual and automated processes and make sure they run to ensure the highest possible data quality.
You are the engineer other engineers can count on. You embrace every problem with enthusiasm. You remove hurdles, are a self-starter, team player. You have the hunger to venture into unknown areas and make the system work.
Your Responsibilities would be to:
- Understand customer web scraping and data requirements; translate these into test approaches that include exploratory manual/visual testing and any additional automated tests deemed appropriate
- Take ownership of the end-to-end QA process in newly-started projects
- Draw conclusions about data quality by producing basic descriptive statistics, summaries, and visualisations
- Proactively suggest and take ownership of improvements to QA processes and methodologies by employing other technologies and tools, including but not limited to: browser add-ons, Excel add-ons, UI-based test automation tools etc.
- Ensure that project requirements are testable; work with project managers and/or clients to clarify ambiguities before QA begins
- Drive innovation and advanced validation and analytics techniques to ensure data quality for Anakin's customers
- Optimize data quality codebases and systems to monitor the Anakin family of app crawlers
- Configure and optimize the automated and manual testing and deployment systems used to check the quality of billions of data points of over 1000+ crawlers across the company
- Analyze data and bugs that require in-depth investigations
- Interface directly with external customers including managing relationships and steering requirements
Basic Qualifications:
- 2+ years of experience as a backend or a full-stack software engineer
- Web scraping experience with Python or Node.js
- 2+ years of experience with AWS services such as EC2, S3, Lambda, etc.
- Should have managed a team of software engineers
- Should be paranoid about data quality
Preferred Skills and Experience:
- Deep experience with network debugging across all OSI layers (Wireshark)
- Knowledge of networks or/and cybersecurity
- Broad understanding of the landscape of software engineering design patterns and principles
- Ability to work quickly and accurately in a highly stressful environment during removing bugs in run-time within minutes
- Excellent communicator, both written and verbal
Additional Requirements:
- Must be available to work extended hours and weekends when needed to meet critical deadlines
- Must have an aversion to politics and BS. Should let his/her work speak for him/her.
- Must be comfortable with uncertainty. In almost all the cases, your job will be to figure it out.
- Must not be bounded to comfort zone. Often, you will need to challenge yourself to go above and beyond.
Italian based MNC, Automotive industry
- Develop efficient strategies to protect the system, the networking infrastructure, data, and information systems against potential threats/cyber risks
- Routinely performing threat analysis, system checks, and security tests
- Defining and updating information security criteria and validation procedures
- Effectively discuss to understand safety and security and fix the problems along with different stakeholders
- To be a security representative or point of contact for all technical deliveries, initiatives, and project implementations.
- To develop technical processes and procedures and promote compliance in line with regulations, corporate policies, or standards as per ISO27001
- Assess technical security risks in terms of impact on systems and service confidentiality, integrity, and availability, and report and escalate results of risk assessments.
- Report any real or potential security breaches/vulnerabilities to various stakeholders and provide technical support during incident response
- Monitor security tools to detect security events & incidents Report and escalate any security breaches to the Information Technology Security Officer
- Operate vulnerability scanning and compliance tools to identify system weaknesses
- Represent IT Security matters at technical and business forums.
Desired candidate profile :
- Relevant experience in the information security field
- Relevant experience working with ISO Policies, and GDPR guidelines.
- Strong knowledge of network architecture and security concepts related to routing
- Exceptional attention to detail
- Excellent analytical and problem-solving skills
- Great team player and able to work efficiently with minimal supervision
- Excellent communication skills, both written and verbal, work with the different stakeholders on strengthening the security risks.
- Able to handle and cope with stressful situations and understands the pressures of a start-up environment
TIKAJ is seeking a passionate person who is ready to kickstart his/her cybersecurity career. Security Analyst is your first step to a brighter future as a cybersecurity expert.
- Respond and take enforcement actions on cyber security incidents
- Monitor user activity, network events, and signals from security tools to identify events.
- Categorize alerts and other anomalous activities that represent real threats.
- Remediate attacks and Triage on general information security tickets.
- Collect data for more analysis, evaluate the attack, identify the root of the attack, and implement required security actions to counter the attack.
- Responsible for investigating and generating reports on information security issues.
We are looking for Candidates
- Who are motivated, self-learning, and team-oriented individuals?
- Have a degree in computer science or a related field.
- Who have beginner to intermediate level experience in Python
- Who has an interest in Cyber security, phishing, cyber laws and enforcement
- Good is written and verbal communication.
Global IT Risk Management Company
- Guiding team member for handling technical challenges
- Conducting training sessions
- Handling user issues and providing corrective solution
- Fixing of the vulnerabilities and Upgrades of new stable version
- Sustenance and maintenance of Archer tool
- Good scripting knowledge
Desired Candidate Profiles:
- Certified RSA Archer Professional, Internal Audit & Controls, Risk (Threat), ISO 27001
- Minimum of 5 years’ experience in the respective field
- Experience of managing a GRC Team
- Strong experience of implementation, commissioning and enhancement of modules of GRC Product
- Strong Understanding of Process workflows, Identifying the manual workflows
- Expertise in configuring GRC tool (Archer)
- Experience with all SDLC activities related to GRC program implementation
Global IT risk management company
i. Technology Graduate with 8+ years of experience in the IT industry & Information Security / Cyber Security
iii. Provide Security Vision & Strategy to the Organization, strategic direction, development, and implementation of information security programs and projects to address risks relevant to the attainment of organizational strategic goals.
iv. Experience in advising leadership team regarding Security Technology Land scape, product issues, and possible improvements
v. Expertise in providing executive roadmaps for continual improvement in teams, technology, and processes, process across various security & DevSecops teams
vi. Experienced in Information Security Risk Management, gap analyses, Audits.
vii. Hands-on Experience in formulating Cyber Security Policies, Design and implementation of Security Technologies, DevSecOps.
viii. Working Knowledge in implementation of Cyber Security Solution in Open Source, OpenStack environment.
ix. Ability to provide strategies to increase the ability to withstand cyber-attacks, as measured by annual sophisticated attack simulations.
x. Experience in upgrading, troubleshooting and tuning of Cyber Security Solutions, SOC Operations.
xi. Thorough understanding and good knowledge latest Cyber Security technologies, Security Architectures, vulnerabilities, security threats.
xii. Expertise in Test-Driven Development and establishing a DevSecOps practice. Multiple product launches under your belt - from design to launch, having played a key role in their success
xiii. Ability to setup PoC for latest security solutions
xiv. Good understanding of Open Source Technologies, Private Cloud Technologies.
At F5, we strive to bring a better digital world to life. Our teams empower organizations across the globe to create, secure, and run applications that enhance how we experience our evolving digital world. We are passionate about cybersecurity, from protecting consumers from fraud to enabling companies to focus on innovation.
Everything we do centers around people. That means we obsess over how to make the lives of our customers, and their customers, better. And it means we prioritize a diverse F5 community where each individual can thrive.
F5 is looking for a Sr. Security Engineer with experience in building, integrating, operating, and maintaining robust security monitoring and auditing systems. F5’s Edge 2.0 platform provides global, scalable, and secure way to deploy applications. In this position, you will build and maintain monitoring and audit systems across the platform that provide necessary visibility and alerts to effectively defend the platform.
Responsibilities:
- Collaborate with software architects, security defenders, Operations, SRE, compliance experts, and business leaders to understand the logical boundaries of the systems and identify the events to monitor, audits to maintain, alerts to tweak, as well as systems to integrate with
- You will continuously hunt for areas and metrics to be added into monitoring systems for better operational visibility, incident response capability, availability, and forensics capability of the overall platform
- You will participate in the definition of processes around change and inventory management and develop solutions to audit the changes
- You will work with other teams within security organization to define communication and alerting protocols for effective and timely actions
- You will participate in defining and executing the Incident Response Plan for the platform and be responsible for providing necessary information during the response and forensics
- Demonstrate technical leadership in multiple domain areas, providing mentorship to other team members
Minimum qualifications:
- BS degree in Computer Science or equivalent with 5+ years of security operation and monitoring experience
- Experience with logging, monitoring, SIEM, dashboarding tools like AWS GuardDuty, Sumo, Grafana, SolarWinds, DataDog, Splunk, etc.
- Working knowledge of at least one Cloud Computing platform (e.g. Amazon AWS, Microsoft Azure, Google Compute etc.)
- Good understanding of how to handle logs from various systems, integrate with systems handling logs and metrics, how to setup and tune alerts based on thresholds and policies
- Hands on experience with computer programming languages and/or scripting languages such as Python, Java, Shell
- Good understanding of complexities and security challenges in large-scale distributed systems
- Working knowledge of Cloud orchestration systems such as Kubernetes, Openstack etc.
- Self-motivated and willing to delve into new areas and take on new challenges in an enthusiastic manner
- Excellent written and verbal communication skills
- Strong interpersonal, team building, and mentoring skills
achelor of Engineering or Technology; or any degree on par;
· 12-15 years of Experience in security and similar areas solution/product development, design, etc
· Minimum 7-8 years of experience in an Enterprise or Cyber Security practice dedicated role
· Experience in Enterprise deployment of security with in depth knowledge of security, implementing security solutions and working closely with global customer accounts.
· Proficient with concepts like SOC, OWASP Top 10 etc
· Understanding of Enterprise Cyber security models like Mitre ATTACK and roadmap modelling.
· Excellent analytical and problem-solving skills to drive product development
· Excellent communicator, whether writing, speaking or presenting
· Experience gathering and analysing data to create useful metrics that support positive change
- Experience in Solutioning IT Services solutions in multi-service areas: Infrastructure Services, Applications Development, Applications Maintenance, Business Process Outsourcing
- Deep experience in three key functional areas: Technical Solutioning, Competitive Analysis, Pricing & Analysis
- 8+ years’ experience in these three functional areas.
- Demonstrated track record of winning deals.
- Knowledge of IT Services vendors in the competitive landscape, with a deep knowledge of 1-2 vendors Solutioning and go to market approach.
- Exceptional data analysis and creative problem-solving skills.
- Self-motivated and entrepreneurial.
- Ability to learn new skills quickly.
- Ability to communicate at the Executive level.
- Deep MS Excel skills.
- BS and/or MS in computer science or equivalent experience.
Desired Skills |
To have skills: · Proven technical expertise in cyber security domains, i.e. endpoint security, application security testing. · Knowledge and experience in public cloud solutions. · Knowledge on network security, networking concepts and architectural implementations. · Knowledge on vulnerability testing and define proper remediation’s. · Shell scripting experience - Shell/Bash/Python. · Working experience of Linux operation.
Desire to have skills: · One or more of the following cyber security certifications: CEH, CISSP, OSCP, SSCP CCSP. · Excellent problem solving, and follow-up skills. · Ability to convey technical security concepts to non-technical audiences. |
Tata communication is into Telecom and networking
- Python with Powershell (who worked in Security related product Development(First Pref)/Networking.
Key Responsibilities
- Collaborate in the design, implementation, and deployment of successful software applications in support of our Threat management platforms.
- Developing backend components to enhance performance and receptiveness, server-side logic, and highly responsive web applications.
- Performance tuning and automation of application.
- Enhancing the functionalities of current software systems.
- Understand system interdependencies and limitations.
- Functionally decompose complex problems into simple, straightforward solutions.
- Rightly estimate the task and take ownership of building production-ready software solutions.
- Collaborate with other teams to implement features based on business rules and visual design.
Minimum qualification & experience
- Engineering graduate.
- 4 years of demonstrated professional experience in delivering and operating large-scale applications.
- Strong software development skills in python including python frameworks like Django, Flask, etc.
- Experience with software development, Web frameworks and database technologies, e.g., REST APIs, and automated scripts.
- Experience with current development technologies, methodologies and workflows including CI/CD, Docker, Git, and Jenkins preferred.
- Experience with microservice development and dockerized application development is a PLUS.
- Strong knowledge of data structures, algorithms, operating systems, and distributed systems fundamentals.
- Working familiarity with networking protocols (TCP/IP, HTTP) and standard network architectures.
- Working familiarity with basic Linux administration.
- https://ind01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcybersecurityguide.org%2Fcareers%2F&data=05%7C01%7Cmadhvi.1%40neweraindia.com%7C71e5f8231a514be638bf08da656eee89%7Cc04e2addbf474beabf38e722114ec31f%7C0%7C0%7C637933824369629597%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=5ezbPi2xWTVZVsmDSzinf6eC37Mr6zWQpfivsSWa1A0%3D&reserved=0" target="_blank">Experience in the cybersecurity field especially with threat intelligence or security orchestration is a plus.
Cogoport Story
Do you prefer to get speeding tickets or parking tickets?
Because at Cogoport we are speeding ahead to do something remarkable for the world. We are trying to solve the Trade Knowledge and Execution Gap, which is currently widening and preventing trade to the tune of $3.4 trillion annually. This Gap has enormous economic as well as human impact and disproportionately hits small and medium businesses globally.
The team at Cogoport is working on developing a new category, the Global Trade Platform, that helps companies discover and connect with appropriate trade partners, optimize shipping and logistics options and costs, and improve cash management and cash flow.
Cogoport is currently in hypergrowth mode. We are proud to have been named an Asia-Pacific High-Growth Company by the Financial Times and an Indian Growth Champion by the Economic Times. We are aiming to reach an annualized revenue of $1 billion (7700 Crores INR) by this summer and are hiring over 500 additional employees. We are currently hiring in Mumbai, Gurgaon, Chennai and Bangalore.
Cogoport Culture: We have two core values at Cogoport—Intrapreneurship and Customer-centricity. If you share these values and are a hard worker who is willing to take risks (and occasionally get a speeding ticket), you can make a huge impact and propel your career in an endless number of directions with Cogoport.
Cogoport Leadership
https://www.linkedin.com/in/purnendushekhar/">https://www.linkedin.com/in/purnendushekhar/
https://www.linkedin.com/in/amitabhshankar/">https://www.linkedin.com/in/amitabhshankar/
Life at Cogoport :It’s rare to be able to join a company that can give you the resources, support and technology you need to break new ground and see your ideas come to life. You’ll be surrounded by some of the smartest engineers and commercial specialists in India and the Asia Pacific Region.
With huge growth and the right entrepreneurial mindset, comes huge opportunities! So, wherever you join us, you’ll be able to dream, deliver better and brighter solutions, and speed ahead with the possibility to propel your career forward in endless directions as our company continues to grow and expand.
For more insights about the company: https://cogoport.com/about">https://cogoport.com/about
Why Cogoport?
International Trade can be complicated at times and every day brings new challenges and opportunities to learn. When we simplify international trade, it empowers and affects every human being on the face of this earth. Seven billion people - one common problem.
As a part of the Talent team at Cogoport, you will get an opportunity to be a part of an industry-wide revolution in the world of shipping and logistics by collaborating with other brilliant minds to resolve real world on-ground challenges. You will have a direct impact on the revenue and profitability growth for the organization.
Areas of Impact for you
- Ownership of product delivery, devops, cybersecurity, performance, impeccable software quality, and configuration.
- Hands-on management with deep-dive into the details of software design, implementation and debugging.
- Attract, hire, retain, motivate and mentor the team..
- Guide your teams in developing roadmaps and systems to drive product growth, then identify, plan, and execute projects to support that growth.
- Leadership role in the driving technical architecture, specifically leveraging micro-services.
- Manage multiple projects across a wide breadth of technologies, coordinate dependencies, and interactions with the internal teams and external partners.
- Collaborate with stakeholders from across functions to keep the development team in sync with all functions and overall business objectives.
- Set up, create and manage strong best practices/architecture to ensure reliable, secure, bug-free, and performant software is released on-time.
Desirable Skills and Experience
- Bachelor or Masters in Computer Science with 8-10 years of total work experience in a software product company with at least 3-4 years of experience in managing projects and leading teams.
- Experience owning highly-available and scalable software systems
- Strong technical background with proven record of individual technical accomplishments
- Excellent organizational and communication skills.
- Ability to make quick decisions in high pressure environments.
- Demonstrated negotiation, influencing and problem-solving skills with attention to detail.
- Ability to handle multiple competing priorities in a fast-paced environment
- Understanding of team dynamics, have the ability to inspire highly-talented engineers and develop team-level leaders
- Experience with Agile development.
Cogoport is an equal opportunity employer. We are a welcoming place for everyone, and we do our best to make sure all people feel supported and respected at work.
• Product & Technical Presentation – Customers / Partners
• Pre-Sales Support (DEMO and POC).
• RFP’s evaluation, Solutioning & Response.
• Handling Technical Queries and Troubleshooting for existing and new Customers.
• Keep up-to-date on competitive solutions, products, and services.
• OEM – Technical relation.
• Building Business with Team
Product services company
o Tools:
CrowdStrike Falcon Sensor - Or similar AV engine
Cisco Umbrella Web Filtering – Or similar Web Proxy Filter
Cisco FTD Intrusion Prevention – Or similar IPS/IDS
O365 Email Protection (Spam, Phishing) - Or similar
Phish Insight (Phishing Campaigns) - Or similar phish campaign technology
Nessus Professional – Or similar vulnerability scanning tool
Cisco NGFW – Or similar FW technology
o Technologies:
Cloud (AWS IaaS, O365 SaaS),
On Premis (Windows 90%, Linux 10%)
o Processes:
Computer security incident response
Security reviews and assessments
Vulnerability management Penetration tests
Manage Level 3 security incidents and requests
Ensures compliance with corporate policies and procedures
Research new ways to improve existing technical security controls
Project SME and Lead for security related projects
Conduct Risk assessments and assist in remediation activities
Assist in internal and external audit activities
Required Experience and Skills:
Bachelor's degree in Information Security, Computer Science or Engineering
Minimum of 3 years in security engineering
Knowledge in cloud ecosystems security - Amazon AWS, Microsoft O365
Ability to work well in an international team (US or EU time zone)
English spoken and written on at least B2 level
Understanding of security monitoring and identification concepts
Assessing and understanding the impact, severity and urgency of issues
Cybersecurity Certifications an advantage but not essential: CEH, C|HFI, CISSP, CISA, CISM
Expertise across a variety of security products including those listed in requirements above
Security (AM/Executive)
• To design the security infrastructure / policies for the organisation, implement & monitor the same
• To ensure security compliance with respect to recommendations received from government agencies like CEA, NCIIPC
• Design, review, implement & monitor IT security related controls as part of Internal
• Controls, IFC, ERM
• ISMS certification (ISO 27001) for IT systems; this will include preparation and periodic review of policies and SOPs, regular trainings and maintaining records in prescribed formats
• Conducting internal security audit and generating reports by deploying VA tools
• Periodic security/VAPT audits and implementation of the findings
• IT security related new initiatives like - Security Operations Centre (SOC), Security Information and Event Management (SIEM), cloud security, EMM-enterprise mobility management
• Creating IT Security awareness within the organisation
● Should have 6+ years of experience as a software developer
● Good experience with Nodejs & Express js.
● Good with MySQL
● Experience with Linux Scripting
● Experience with elastic search and Logstash
● Experience with cyber security
● Great interpersonal and communication skills candidate can work independently
● Agile project methodology experience preferred.
● Excellent communication skills.
● Critical thinker and good problem-solver.
● Good time-management skills
● Great interpersonal skills
Working Timings: 3:00 pm to 12:00 am (midnight)IST
Qualifications & Responsibilities
Year of Experience : 3- 8 yrs
Location : Bangalore, Delhi, Mumbai, Pune
Work on ISO 27001 & NIST based Information Security Management System implementation and sustenance.
- Responsible for SOX (IT Security Controls) and track the monthly/quarterly/annual control reports and drive effectiveness of SOX controls.
- Work on Business Continuity Planning, IT Disaster Recovery as per ISO27001 & NIST requirements
- Assess information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk
- Conduct Information Systems audits covering IT infrastructure assets
- Working knowledge in security domains such as: security governance policies and procedures, risk management, compliance, access control, network security, security architecture, security incident response, disaster recovery, business continuity management, privacy and data protection
- Experience in leveraging industry standards and frameworks such as ISO/IEC 27001, NIST CSF/800-171, etc.
- Possesses certifications such as ISO27001 LA. CISSP, CISA certification- preferred
Why NCG?
WHO WE ARE DRIVES WHAT WE DO!
We Don't build the organization; we create an everlasting family. Our people express a sense of winning together when times are good and sticking together when times are tough.
Are you a Doer or Achiever?
Well, at NCG, our doors are Open for Doers and Achievers alike. We are a Cult where we create, innovate, learn and Contribute in a comfortable, transparent, and fair environment.
Joining NCG means contributing to a shared ambition for reliable work culture, tackling extraordinary technological challenges in multicultural teams, preserving your work/life balance, and more!
- Work on inhouse projects on our award-winning Data Security Platform in Enterprise Environments
- Ensuring that the customer expectations are met within the committed timeframes.
- Only Freshers and Immediate Joiners
Key Responsibility Areas:
Operate a hands-on role involving penetration testing and vulnerability assessment activities of complex Web applications, operating systems, wired and wireless networks, and mobile applications/devices Delivering targeted and intelligence led security penetration testing through a robust testing methodology and process Craft and develop scripts, frameworks, tools, and the methods required for facilitating and executing sophisticated charges, emulating malicious actor behavior sought at avoiding detection Conduct security assessments on a wide variety of technologies and implementations Develop and maintain security testing plans Maintain and evolve a mature set of security penetration testing and internal Red Team processes covering all areas of technology Automate penetration and other security testing on networks, systems and applications Develop meaningful metrics to reflect the true posture of the environment allowing the organization to make educated decisions based on risk Produce actionable, threat-based, reports on security testing results Act as a source of direction, training, and guidance for less experienced staff Consult with application developers, systems administrators, and management to demonstrate security testing results, explain the threat presented by the results, and consult on remediation Communicate security issues to a wide variety of internal and external “customers” to include technical teams, executives, risk groups, vendors and regulators Foster and maintain relationships with key stakeholders and business partners
Required Skills:
2 to 6 years of experience in information security with web application and network penetration testing experience Fluent in common cyber security domains such as cloud security, access control, encryption, identify management, security operations, application security, penetration tests, endpoint security, vulnerability management, threat intelligence Strong understanding of OWASP top 10.
Experience or knowledge of IT security risk assessments and gap analysis In-depth knowledge of application development processes and at least one programing or scripting language (e.g., Java, Scala, C#, Ruby, Perl, Python, PowerShell) Hands on experience with testing frameworks such as the PTES and OWASP Experience of functional testing, UI/UX testing and manual testing, Load, Performance testing across multiple browsers and devices Hands-on experience in designing and writing test automation scripts using test automation frameworks and knowledge on API Testing Applicable knowledge of Windows client/server, Unix/Linux systems, Mac OS X, VMware/Xen, and cloud technologies such as AWS, Azure, or Google Cloud
Qualification: Masters/Bachelor’s Degree
IT services provider based out of the US
Job description – Information Security (Network)
Roles and Responsibilities
Company will provide a professional opportunity to work in a dynamic environment where you will have the ability to develop process and Cyber security based skills
Work profile of individual
- As part of the company cyber security consulting team, individual’s primary role would be to work with ISO 27k projects IT audits, ITGC audits, SSAE, SOC audits, IT Process Audit, Systems Audit, Gap assessment TPRM, GDPR, Infosec, GRC , ISMS , Cyber Security, SOX ITGC on customer engagements
- Will address all aspects of security like physical, logical, data, access etc and review Information Security policy and suggest / recommend necessary changes to the same on customer engagements
- Will be an active participant in internal / third party system security reviews and audits on customer engagements
- Will perform internal audits on all aspects of IT and ensure compliance with the prescribed security norms on customer engagements and will be responsible for tracking the open audit findings and closure of the same
- Will be responsible for implementation of new projects under Information Security Domain
- Will be able to manage document tracking and updating - policies, processes, procedures, templates etc.
- Will assist in development of proposals by owning parts of the proposal document and by giving inputs in solution design based on areas of expertise.
- Will engage with clients and(or) application development teams for implementation of cyber security & data privacy by design and data protection controls.
- Will support the clients with ongoing design, implementation and maintenance of the data privacy framework for managing data protection risk including responding to legislation, devising and owning policies and training.
- Will demonstrate ability to clearly and concisely communicate the privacy implications of technology and implementation.
Team work
- Individual would be responsible for contributing to a strong team environment and promoting a positive working relationship with their colleagues.
- Individual would predominately work with off-shore engagement teams and relevant teams on presale and cyber security delivery.
- Communication, written and verbal, with these teams would be expected.
- Team members would be required to apply learning from trainings and on the job experience to work requests and support continuous process improvement.
- Team members would be required to handle multiple tasks at the same time.
- Detailed focus when performing work and good project management skills when managing workload and maintaining timelines will be necessary.
Desired Candidate Profile
- Bachelors
- Certifications (ISO 27001/ ISO 31000/ CISA/ CISSP/ CSX or equivalent and other relevant qualification/certification
- Experience : 3-5 years
Knowledge Required:
- Strong knowledge of information security concepts, risk and controls concepts. Strong understanding of security principals: audit, policies, guidelines, and compliance.
- Good understanding of infrastructure (data centre, network end user computing) security / cloud security / managed security services / security operations centre / compliance risk management and ITGC controls
- Good understanding of technical security like network security, operating system, encryption, use of tools and technologies for various processes like logical access control, network security, security monitoring etc.
- Sound knowledge of Internal Controls and Compliance. Must be able to recommend controls around people, process, and technology.
- Sound knowledge on IT controls (especially IT risks). Good experience with control assessment, check the effectiveness of the implemented controls and recommend mitigation / improvements.
- Good knowledge on Privacy, Governance and reporting
- Experience with the Microsoft Office suite of products (i.e. Word, Excel, PowerPoint, Visio, etc.),
- Strong verbal and written communication skills Knowledge / experience in fields of ITGC audits, Internal Audit, External Audit / Statutory Audit projects
- Candidates should exhibit good client service skill collateral's with a strong focus on building relationships.
Additional Responsibilities:
- Ability to assist in value-creating strategies and models that enable clients to innovate, drive growth and increase their business profitability
- Good knowledge on software configuration management systems and license Management systems
- Awareness of latest technologies and Industry trends
- Logical thinking and problem solving skills along with an ability to collaborate
- Understanding of the financial processes for various types of projects and the various pricing models available
- Ability to assess the current processes, identify improvement areas and suggest the technology solutions
- One or two industry domain knowledge
- Client Interfacing skills
- Project and Team management
IT services provider based out of the US
Job description- Information Security(Financial)
Roles and Responsibilities
HTC Global Security Delivery Centre will provide a professional opportunity to work in a dynamic environment where you will have the ability to develop process and Cyber security based skills
Work profile of individual
- As part of the companyC Global cyber security consulting team, individual’s primary role would be to be a part of ISO 27k projects IT audits, ITGC audits, SSAE, SOC audits, IT Process Audit, Systems Audit, Gap assessment TPRM, GDPR, Infosec, GRC , ISMS, Cyber Security, SOX ITGC on customer engagements
- Will address all aspects of security like physical, logical, data, access etc and review Information Security policy and suggest / recommend necessary changes to the same on customer engagements
- Will be an active participant in internal / third party system security reviews and audits on customer engagements.
- Will perform internal audits on all aspects of IT and ensure compliance with the prescribed security norms on customer engagements and will be responsible for tracking the open audit findings and closure of the same
- Will be able to manage document tracking and updating - policies, processes, procedures, templates etc.
- Will assist in developing proposals by owning parts of the proposal document and by giving inputs in solution design based on areas of expertise.
- Will demonstrate ability to clearly and concisely communicate the privacy implications of technology and implementation.
Team work
- Individual would be responsible for contributing to a strong team environment and promoting a positive working relationship with their colleagues.
- Individual would predominately work with off-shore engagement teams and relevant HTC Territory teams on presale and cyber security delivery.
- Communication, written and verbal, with these teams would be expected.
- Team members would be required to apply learning from trainings and on the job experience to work requests and support continuous process improvement.
- Team members would be required to handle multiple tasks at the same time.
- Detailed focus when performing work and good project management skills when managing workload and maintaining timelines will be necessary.
Desired Candidate Profile
- Bachelors
- Certifications (ISO 27001/ ISO 31000/ or equivalent and other relevant qualification/certification
- Experience : 3-5 years
Knowledge Required:
- Strong knowledge of information security concepts, risk and controls concepts. Strong understanding of security principals: audit, policies, guidelines, and compliance.
- Understanding of infrastructure (data centre, network end user computing) security / cloud security / managed security services / security operations centre / compliance risk management and ITGC controls
- Sound knowledge of Internal financial Controls and Compliance. Must be able to recommend controls around people, process, and technology.
- Sound knowledge of General Leger / Balance Sheet / Journal Entry / Budgeting / Financial fraud
- Sound knowledge on business controls and process controls. Good experience with control assessment, check the effectiveness of the implemented controls and recommend mitigation / improvements.
- Experience with the Microsoft Office suite of products (i.e. Word, Excel, PowerPoint, Visio, etc.),
- Strong verbal and written communication skills Knowledge / experience in fields of ITGC audits, Internal Audit, External Audit / Statutory Audit projects
- Candidates should exhibit good client service skill collateral's with a strong focus on building relationships.
Additional Responsibilities:
- Ability to develop value-creating strategies and models that enable clients to innovate, drive growth and increase their business profitability
- Good knowledge on software configuration management systems and license Management systems
- Awareness of latest technologies and Industry trends
- Logical thinking and problem solving skills along with an ability to collaborate
- Understanding of the financial processes for various types of projects and the various pricing models available
- Ability to assess the current processes, identify improvement areas and suggest the technology solutions
- One or two industry domain knowledge
- Client Interfacing skills
- Project and Team management