Cutshort logo
Cyber Security Jobs in Hyderabad

7+ Cyber Security Jobs in Hyderabad | Cyber Security Job openings in Hyderabad

Apply to 7+ Cyber Security Jobs in Hyderabad on CutShort.io. Explore the latest Cyber Security Job opportunities across top companies like Google, Amazon & Adobe.

icon
Versatile Commerce LLP

at Versatile Commerce LLP

2 candid answers
Bhavana Sidda
Posted by Bhavana Sidda
Hyderabad
5 - 7 yrs
₹12L - ₹18L / yr
Saviynt
SailPoint
Cyber Security
SOD
SOAP
+4 more

Position Overview:

We are seeking a highly skilled and motivated Identity and Access Management (IAM) Developer/IAM Engineer to join our dynamic team. The successful candidate will be responsible for designing, implementing, and maintaining robust IAM solutions that ensure secure access to our systems and applications. This role involves collaborating with various teams to understand their requirements and deliver scalable and efficient IAM systems.

Key Responsibilities:

  • The technical developer must comprehend and implement customization based on specifications in business requirement documents or sprint tasks.
  • They should review the solution with the business analyst before presenting it to external stakeholders or deploying it to any production environment.
  • All customizations, fixes and tests are correctly documented with all related scenarios, evidence and stored in the corresponding folders/ tools.
  • All deployments must adhere to application factory guidelines and be validated by team members.
  • Developers are responsible for productive system deployments using the ‘4 eyes principle’, ensuring dual verification. Accurately and methodically complete all required information in predefined templates for cutover plans, system testing, UAT, change requests, and application team communications as instructed.
  • Comprehend existing template content, make necessary updates, ensure team alignment, and address issues before submitting to the application team for review.
  • Maintain frequent communication with team members to report progress, ensure alignment, and promptly address any issues or blockers encountered.
  • Prepare and internally review test data for demo/ UAT sessions with the application team, ensure sessions are recorded and structured logically, and assess all feedback received for potential integration.
  • Assess feasibility, develop configurations, prepare test data, conduct demo and UAT sessions, create production deployment documents, submit change requests, execute go-live, and facilitate handover to Operations.

Required Qualifications:

  • Have a minimum of 2 years of hands-on experience with the identity product (Saviynt EIC 23.x/24.x)
  • Possess comprehensive understanding of Saviynt IGA architecture, with practical experience in application onboarding, workflow implementation, Segregation of Duties (SOD), certifications, and custom jar development.
  • Know and have experience working in agile environments (Scrum), being capable of following the existing protocols and ceremonies that will be part of the day-to-day basis.
  • JSON working knowledge.
  • Build SQL queries when required (MySQL 8.0 as backend)
  • Knowledge of APIs (SOAP, REST)
  • Capable of using tools to consume APIs like Postman or SOAP UI
  • Basic knowledge on directory services and applications like Active Directory, Azure AD, Exchange (online/ on-prem)
Read more
Gipfel & Schnell Consultings Pvt Ltd
TanmayaKumar Pattanaik
Posted by TanmayaKumar Pattanaik
Bengaluru (Bangalore), Mumbai, Delhi, Gurugram, Noida, Pune, Hyderabad, Chennai
12 - 20 yrs
Best in industry
Firewall
cloud security
Cyber Security
Security awareness
Network Security
+1 more

Senior Security Architect


The Security Architect leads the design and development of innovative security architectures for protecting data deployed into different types of cloud and cloud/hybrid systems. This position will directly contribute to the overall global enterprise cloud architecture and lead the security vision and strategy around cloud-based applications, across all types (including Infrastructure, Platform, and Software as a Service (IaaS/PaaS/SaaS).

Job Description

The Security Architect will serve as the central point of contact for other Technology teams within the Organization for all matters related to cloud security.

The successful candidate possesses the excellent interpersonal and communication skills required to partner with other leaders across the business to identify opportunities and risks and develop and deliver solutions that support business strategies and protect the intellectual property globally.

Expertise – Collaborate with Application Owners, Technical Owners, Platform Leads, and Information Security teams, to architect and design cloud security solutions.

Knowledge of cloud security services such as Azure and AWS is essential

Delivery – Complete architecture assessments across projects, prove use of security solutions to support new distributed computing solutions that span private cloud and public cloud services.


Security Technology Strategy – Work with engineering, service and business teams to create technology roadmaps.


Responsibilities Include

• Design and develop security architectures for cloud and cloud/hybrid based systems. Possess a firm understanding of the offerings within both Amazon Web Services (AWS) and the Microsoft Azure platforms. Based on business requirements, design and implement cloud-native architecture and design that will allow those requirements to be met with a minimal degree of risk and with appropriate security controls present.

• Represent the Corporate Information Security Office in development and implementation of the overall global enterprise cloud architecture.

• Act as the ambassador and senior technical representative for Information Security while engaging with other senior technical leaders throughout the Organization in design and implementation of cloud and cloud/hybrid based implementations and solutions.

• Work with Engineering, Infrastructure Services, and Application Development organizations to choose appropriate technology solutions and facilitates complete integration. Develops standards in partnership with Engineering, Infrastructure Services, and Application Development.

• Lead training and technical forums, serve as both a formal and informal mentor, and execute other initiatives designed to share knowledge across Security and Technology groups.

• Identify, recommend, coordinate, and/or conduct informal/formal training sessions to deliver timely knowledge to support teams regarding technologies, processes or tools.

• Develop and execute strategies to increase Cloud Security knowledge throughout the enterprise, as well as developing and mentoring more-junior security analysts and engineers.

• 5-8 years of experience with Security Architect and/or Engineering.

• 3-5 years of experience with Cloud platforms such as Microsoft Azure and Amazon Web Services (AWS).

• Experience architecting solutions within Microsoft Azure, Amazon Web Services (AWS) and, preferably, other cloud providers.

• Experience with assessment, development, implementation, optimization, and documentation of a comprehensive and broad set of security technologies and processes (secure software development (Application Security), data protection, cryptography, key management, identity and access management (IAM), network security) within SaaS, IaaS, PaaS, and other cloud environments.

• Working knowledge of common and industry standard cloud-native/cloud-friendly authentication mechanisms (OAuth, OpenID, etc).

• Experience with deployment orchestration, automation, and security configuration management preferred.

• Experience with service-oriented architecture for cloud-based services.

• Experience working with cloud security and governance tools, cloud access security brokers (CASBs), and server virtualization technologies.

• Experience with enterprise applications (architecture, development, support, and troubleshooting).

• Experience performing threat modeling and design reviews to assess security implications and requirements for introduction of new technologies.

• Experience representing technical viewpoints to diverse audiences and in making timely and prudent technical risk decisions.

• Experience with enterprise architecture and working as part of a cross-functional team to implement solutions.

• Strong interpersonal and communication skills; ability to work in a team environment

• Ability to work independently with minimal direction; self-starter/self-motivated

• Detailed understanding of SSL/TLS protocols and certificate-based solutions

• Technical writing experience

Preferred Qualifications


• Minimum of 15 years of formal education - Graduate / Postgraduate in Computer Science / Information Technology Professional work experience between 10-15 and at least 6-8 years as a Security Architect / Junior Security Architect

• Working Experience with distributed team preferred.

• Relevant industry certifications such as CISSP, CISM, or CCSP

Read more
FrugalTesting

at FrugalTesting

1 video
2 recruiters
Bharti Garg
Posted by Bharti Garg
Hyderabad
3 - 6 yrs
₹8L - ₹10L / yr
Cyber Security

**Job Description:**

1. We are looking for at least 3 to 6 years of experience and have infosec certifications CISSP ,Data Security ,CISA,Cloud security,Security montioring&incident response,ECSA, or relevant proven experience in Setting up ,executing Infosec processes for organisations using policies and technologies.

2. Must have understanding and experience in SaaS technology and setting & enhancing up infosec policies and controls to secure cloud infra,data of saas ,IT infra, Code practices. with respect to NIST,SOC2,ISO 27000 series,CIS, MITRE,GDPR,OWASP,SANS frameworks.

3. Specialized on GRC (to carry required compliance certifications one by one needed for SaaS )as well as able to do ground work with respect to technical Setup, execution of the infosec related controls & activities such as Vulnerability assessment, SIEM & incident response, Cloud security, Data security in SaaS with respect insider data theft and outsider exploitation, code security ,pen testing and able to present it to management etc.

Read more
OSBIndia Private Limited
Ashwini Mamidi
Posted by Ashwini Mamidi
Hyderabad
3 - 5 yrs
₹5L - ₹9L / yr
Identity management
Access control
SailPoint
Information security
Cyber Security
+1 more

 

·        Maximum 5 years of Information Technology/Technology Operations/Information Security experience required.

·        Minimum 3 years of experience in Cybersecurity, Identity & Access Management, Role Based Access Control, and Identity Governance is mandatory.

·        Knowledge on User Life Cycle Management, Access provisioning, Access administration is must.

·        Experience with technologies such as Role-Based Active Control (RBAC) and Attribute Based Access Control (ABAC) is required.

·        Experience in User Access Re-certification activities is mandatory.

·        Working knowledge on Active Directory is must.

·        Working experience on any IAM tool (SailPoint/Okta/OneIdentity/Varonis/MIM) would be added advantage.

·        Knowledge on Identity and Access Management role/processes/tools is must.

·        Prior experience in processing IAM requests (Add/Modify/Delete) is must.

·        Experienced in Incident management & Change Management processes.

·        Knowledge of and the ability to adhere to SAS and SOX audit requirements pertaining to Identity & Access Management job requirements.

·        Experience with work-flow management tools such as ServiceNow.

·        Leveraging creative thinking and problem solving skills, individual initiative, and utilizing MS Office (Word, Excel, Access, and PowerPoint).

·        Understanding personal and team roles; contributing to a positive working environment by building solid relationships with team members; proactively seeking guidance, clarification and feedback.

·        Identifying and addressing business needs: building relationships with Stake Holders; developing an awareness of Firm services; communicating with the business/stake holders in an organized and knowledgeable manner; delivering clear requests for information; demonstrating flexibility in prioritizing and completing tasks; and communicating potential conflicts to a supervisor

·        Experience performing user administration tasks for various in-house and third-party applications.

·        Analyzing, prioritizing, and resolving faults to resolution. Resolve tickets according to SLAs and escalation procedures.

·        Strong analytical, problem solving and organizational skills. Be proactive, dynamic, and flexible.

·        Good Communication skills, able to articulate well with business and stakeholders.

 

·        Education Qualification : Any graduate/post graduate with Computer Science background.

 

 

Read more
A digital cyber security company presence across Globe.

A digital cyber security company presence across Globe.

Agency job
via Jobdost by Sathish Kumar
Remote, Hyderabad
8 - 12 yrs
₹35L - ₹50L / yr
Web application security
Network Security
Cyber Security
IT security
Security
+7 more

Job Summary:  

The Incident Response (IR) Lead manages a team of experts with diverse skill setsincluding Security Operations Center (SOC), Forensics, and technical Subject Matter Expert (SME) advisory. The IR Lead is specifically tasked with managing all aspects of an Incident Response engagement to include incident validation, monitoring, containment, log analysis, system forensic analysis, and reporting. The Incident Response Lead is also responsible for building the relationship with the client and client’s counsel and ensuring the engagement’s objectives and expectations are met and executed successfully as documented in the statement of work. You will leverage a solid foundation of technical expertise in Cybersecurity, Incident Response, and Digital Forensics to successfully execute your responsibilities.

 

ROLES AND RESPONSIBILITIES

· Accurately collects information from the client concerning the incident to include but not be limited to the client’s environment, size, technology, and security threats. In addition, the IR Lead is responsible for capturing all client’s expectations and objectives throughout the engagement to ensure successful delivery.

· The main point of contact manages and participates in all communications with the client and the client’s counsel during the engagement. The IR Lead sets the cadence for communications.

· Management and Coordination of all technical efforts for the IR engagement to drive the process forward through; tool deployment, ransomware decryption, restoration, and recovery efforts, system rebuilds, system, application, and network administration tasks.

· Coordinates with the Ransom Specialist when ransom negotiations are needed. Ensures updates regarding ransom status are delivered to the client and counsel in a timely fashion.

· Manages and coordinates the onsite efforts with the Onsite Lead or team ensuring they understand and can execute the objectives for the onsite work. Additional responsibilities with onsite efforts include ensuring communications are frequent and getting the daily onsite update communicating these back to the IR Director and/or IR Ops Associate for their Tiger Team.

· Ensures the Forensic Lead is coordinating the collection of data necessary for the investigation.

· Ensures SentinelOne is deployed on time and adding value.

· Communicates with sales when appropriate for SentinelOne, provide client contact.

· Communicates in tandem with the Forensic Lead pertinent findings to the client during the investigation.

· Follows up with the SOC Lead on SentinelOne alerts and encourages/coordinates client participation with the product.

· Accountable for final report review, ensuring the report is accurate, professional, and meets the objective of client counsel.

· Other duties as assigned.

DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties, and skills required personnel so classified.

 

 Role Description : Skills & Knowledge

1. Experience leading scoping calls

2. Strong background and practical hands-on experience with Windows or Linux System and Network Administration, Security DevOps, Incident Response and Digital Forensics, or Security Engineering

3. Practical experience performing in a functional role including but not limited to one or more of the following disciplines: computer forensics, Incident Response, data analytics, Security Operations, and Engineering, Digital Investigations

4. Possesses strong verbal and written communication skills

JOB REQUIREMENTS

· Bachelor's degree in Computer Science, Computer Engineering, Information Assurance, Forensic Sciences, or related technical field; Graduate degree preferred

· 10+ years experience leading full-cycle incident response investigations and communicating with the client/counsel/carriers

· Must be eligible to work in the US without sponsorship

WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodations may be made to enable people with disabilities to perform the essential functions of this job.

 

PHYSICAL DEMANDS

· No physical exertion is required.

· Travel within or outside of the state.

· Light work: Exerting up to 20 pounds of force occasionally, and/or up-to 10 pounds of force as frequently as needed to move objects.

Read more
US based company

US based company

Agency job
via MNR Solutions by Geetanjali Kumari
Hyderabad
7 - 13 yrs
₹20L - ₹30L / yr
skill iconAmazon Web Services (AWS)
Cyber Security
Penetration testing
Threat modeling
Computer Security
+1 more

Job Responsibilities:

 

Experience: 8 Yrs to 12 Yrs

 

  1. Hands-on expertise on performing Application pen testing (Mobile(Android, IOS),networking, web application pen testing),
  2. Should worked on IOT,AWS,Application Penetration Testing, Reverse Engineering, source code review, CI/CD Pipeline
  3. have done any submission on Bug crowd or Bug Bounty.
  4. have developed tools or scripts for web pen test on GitHub.
  5. Certified on OSCP
  6. Threat Modeling
  7. Network scan in stealth mode or simple scan using Nmap and Burp suite

 

Implement security measures which monitor and protect sensitive data and systems from infiltration and cyber-attacks.

 

Developing different ways to solve the existing threats and security issues.

 

Configuring and implementing intrusion detection systems and firewalls.

 

Security product development, testing, and implementation.

 

Responsible for security technology research, penetration testing, and vulnerability scanning.

 

Please follow the below inputs.

 

The shift will starts from 03:00 PM to 12 AM (fixed for few months),

 

 

OSCP certification(Not mandatory, preferable)

 

Below are the primary key skills:

 

Total Application Security Experience:

Total Security Architecture Experience:

IOT(optional)

MOBILE

WEB

AWS(Mandatory)

NETWORKING

THREAT MODELS

 

 

Read more
Leading Management Consulting Multinational Company

Leading Management Consulting Multinational Company

Agency job
Bengaluru (Bangalore), Hyderabad
3 - 5 yrs
₹8L - ₹12L / yr
GRC
ServiceNow
Risk Management
Vendor Management
Audit management
+3 more
• Lead development teams in implementation of GRC solutions within ServiceNow platform including: • Policy & Compliance Management • Risk Management • Vendor Management • Audit Management • Perform fit-gap analysis to identify fitment of defined business to the technical capabilities of the ServiceNow platform. Identify level of effort required in customizing the solution to meet the requirements which have been identified as gaps. • Participate in the functional requirement & design workshops and assist in the development of the functional requirements and technical design documents • Coordinate technical tasks and work effort • Act as an escalation point of contact for technical issues and support • Lead the team in the development, unit testing, defect fixing and deployment of update sets. • Assist the project manager in ensuring overall quality of deliverables, alignment to SDLC best practices
Read more
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Why apply via Cutshort?
Connect with actual hiring teams and get their fast response. No spam.
Find more jobs
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort