33+ Information security Jobs in India
Apply to 33+ Information security Jobs on CutShort.io. Find your next job, effortlessly. Browse Information security Jobs and apply today!
In this role, you will:
• Troubleshoot Complex / escalated network issues
• Participate in Major Incident Management conference calls and associated bridge-lines
• Work on tickets escalated from Tier 2 Support
• Work on incidents in accordance with Integrated Operations Manage Incident Process Configuring of network devices (on back of break fix)
• Work with Advanced technology functions (priority support) / Cisco TAC
• Work like an SME for the entire network infra of the bank suporting technologies like routing/switching/F5/Firewalls/Proxies.
• Mentor / train tier-1 / tier-2
• Open Change controls and emergency break-fix Change Records
• Engage Cisco (NOC and HTTS) Support
• Work on Sniffer/ Infinistream capture
• troubleshoot issues related to Firewalls/Load Balancers/Proxy appliances
• Work with vendors / vendor escalations (on complex issues)
• Functionally aligned to the manager and work closely
Desired Qualifications:
Must Have Banking experience
• 6+ years of network support experience in NOC Operations or similar environment.
• Excellent understanding on Routing & Switching concepts (RIP / OSPF / BGP)
• Ability to quickly analyze and troubleshoot data and voice network outages. Resolve Large admin/Enterprise issues for the bank.
• Extensive hands on experience in all Cisco Routers / Switches / Wireless devices; Cisco / Checkpoint Firewalls, F5 Load Balancers, IP subnetting, Layer 2-4 stack understanding, VoIP, QoS, MPLS, SDWAN
• Experience on Arista hardware is a plus.
• Excellent Customer Service Skills and communication skills.
• Ansible knowledge is a plus
• Mandatory - CCNA and (At least one CCNP Level Test Completed, CCNA Specialties, F5, MCSE)
at PortOne
PortOne is re−imagining payments in Korea and other international markets. We are a Series B funded startup backed by prominent VC firms Softbank and Hanwa Capital
PortOne provides a unified API for merchants to integrate with and manage all of the payment options available in Korea and SEA Markets - Thailand, Singapore, Indonesia etc. It's currently used by 2000+ companies and processing multi-billion dollars in annualized volume. We are building a team to take this product to international markets, and looking for engineers with a passion for fintech and digital payments.
Culture and Values at PortOne
- You will be joining a team that stands for Making a difference.
- You will be joining a culture that identifies more with Sports Teams rather than a 9 to 5 workplace.
- This will be remote role that allows you flexibility to save time on commute
- Your will have peers who are/have
- Highly Self Driven with A sense of purpose
- High Energy Levels - Building stuff is your sport
- Ownership - Solve customer problems end to end - Customer is your Boss
- Hunger to learn - Highly motivated to keep developing new tech skill sets
Who you are ?
* You are an athlete and Devops/DevSecOps is your sport.
* Your passion drives you to learn and build stuff and not because your manager tells you to.
* Your work ethic is that of an athlete preparing for your next marathon. Your sport drives you and you like being in the zone.
* You are NOT a clockwatcher renting out your time, and NOT have an attitude of "I will do only what is asked for"
* Enjoys solving problems and delight users both internally and externally
* Take pride in working on projects to successful completion involving a wide variety of technologies and systems
* Posses strong & effective communication skills and the ability to present complex ideas in a clear & concise way
* Responsible, self-directed, forward thinker, and operates with focus, discipline and minimal supervision
* A team player with a strong work ethic
Experience
* 2+ year of experience working as a Devops/DevSecOps Engineer
* BE in Computer Science or equivalent combination of technical education and work experience
* Must have actively managed infrastructure components & devops for high quality and high scale products
* Proficient knowledge and experience on infra concepts - Networking/Load Balancing/High Availability
* Experience on designing and configuring infra in cloud service providers - AWS / GCP / AZURE
* Knowledge on Secure Infrastructure practices and designs
* Experience with DevOps, DevSecOps, Release Engineering, and Automation
* Experience with Agile development incorporating TDD / CI / CD practices
Hands on Skills
* Proficient in atleast one high level Programming Language: Go / Java / C
* Proficient in scripting - bash scripting etc - to build/glue together devops/datapipeline workflows
* Proficient in Cloud Services - AWS / GCP / AZURE
* Hands on experience on CI/CD & relevant tools - Jenkins / Travis / Gitops / SonarQube / JUnit / Mock frameworks
* Hands on experience on Kubenetes ecosystem & container based deployments - Kubernetes / Docker / Helm Charts / Vault / Packer / lstio / Flyway
* Hands on experience on Infra as code frameworks - Terraform / Crossplane / Ansible
* Version Control & Code Quality: Git / Github / Bitbucket / SonarQube
* Experience on Monitoring Tools: Elasticsearch / Logstash / Kibana / Prometheus / Grafana / Datadog / Nagios
* Experience with RDBMS Databases & Caching services: Postgres / MySql / Redis / CDN
* Experience with Data Pipelines/Worflow tools: Airflow / Kafka / Flink / Pub-Sub
* DevSecOps - Cloud Security Assessment, Best Practices & Automation
* DevSecOps - Vulnerabiltiy Assessments/Penetration Testing for Web, Network and Mobile applications
* Preferrable to have Devops/Infra Experience for products in Payments/Fintech domain - Payment Gateways/Bank integrations etc
What will you do ?
Devops
* Provisioning the infrastructure using Crossplane/Terraform/Cloudformation scripts.
* Creating and Managing the AWS EC2, RDS, EKS, S3, VPC, KMS and IAM services, EKS clusters & RDS Databases.
* Monitor the infra to prevent outages/downtimes and honor our infra SLAs
* Deploy and manage new infra components.
* Update and Migrate the clusters and services.
* Reducing the cloud cost by enabling/scheduling for less utilized instances.
* Collaborate with stakeholders across the organization such as experts in - product, design, engineering
* Uphold best practices in Devops/DevSecOps and Infra management with attention to security best practices
DevSecOps
* Cloud Security Assessment & Automation
* Modify existing infra to adhere to security best practices
* Perform Threat Modelling of Web/Mobile applications
* Integrate security testing tools (SAST, DAST) in to CI/CD pipelines
* Incident management and remediation - Monitoring security incidents, recovery from and remediation of the issues
* Perform frequent Vulnerabiltiy Assessments/Penetration Testing for Web, Network and Mobile applications
* Ensure the environment is compliant to CIS, NIST, PCI etc.
Here are examples of apps/features you will be supporting as a Devops/DevSecOps Engineer
* Intuitive, easy-to-use APIs for payment process.
* Integrations with local payment gateways in international markets.
* Dashboard to manage gateways and transactions.
* Analytics platform to provide insights
- Solid experience in designing, implementing, and securing cloud environments, including services such as EC2, S3, RDS, IAM, VPC, and CloudTrail.
- Strong understanding of DevOps methodologies and experience with CI/CD pipelines and tools (e.g., Jenkins, GitHub, SonarQube).
- In-depth knowledge of cloud security best practices, industry standards, and compliance frameworks (e.g., NIST, CIS, ISO 27001).
- Proficiency in scripting languages such as Python, Bash, Groovy.
- Experience with Infrastructure-as-Code (IaC) tools like AWS CloudFormation or Terraform.
- Familiarity with security scanning and monitoring tools, such as AWS Security Hub, GuardDuty, Inspector, or third-party solutions.
- Strong understanding of network security concepts, including firewalls, VPNs, and secure network architectures.
- Knowledge of secure coding practices and experience with application security testing tools (e.g., SAST, DAST, fuzzing, and secure coding patterns).
- Excellent problem-solving skills and ability to work collaboratively in a team-oriented environment.
- Participate in incident handling and other related duties to support the information security function.
- The ability to learn and apply new concepts quickly
- Strong written and oral communication skills
We are looking for a motivated Information Security who is a self-starter, has an eye for detail, is analytical in approach, loves solving problems, and someone who can take initiatives to build and improve the company’s information security, identify risks and act on the required changes quickly.
What you will do:
- Develop efficient strategies to protect the system, the networking infrastructure, data, and information systems against potential threats/cyber risks
- Routinely performing threat analysis, system checks, and security tests
- Defining and updating information security criteria and validation procedures
- Effectively discuss to understand safety and security and fix the problems along with different stakeholders
- To be a security representative or point of contact for all technical deliveries, initiatives, and project implementations.
- To develop technical processes and procedures and promote compliance in line with regulations, corporate policies, or standards as per ISO27001
- Assess technical security risks in terms of impact to systems and service confidentiality, integrity, and availability, and report and escalate results of risk assessments.
- Report any real or potential security breaches/vulnerabilities to various stakeholders and provide technical support during incident response
- Monitor security tools to detect security events & incidents Report and escalate any security breaches to the Information Technology Security Officer
- Operate vulnerability scanning and compliance tools to identify system weaknesses
- Represent IT Security matters at technical and business forums
Requirements:
- 3-5 years of relevant experience in the information security field.
- Team handling/Mentoring experience
- Relevant experience working with ISO Policies, GDPR guidelines.
- Strong knowledge of network architecture and security concepts related to routing
- Exceptional attention to detail
- Excellent analytical and problem-solving skills
- Great team player and able to work efficiently with minimal supervision
- Excellent communication skills, both written and verbal, work with the different stakeholders on strengthening the security risks
- Able to handle and cope with stressful situations and understands the pressures of a start-up environment.
Experience:- Overall 10 to 12 years of experience of which atleast 5 to 7 years’ experience should be in Information Security. Mandatory is 5 to 7 years’ experience in Information security and with one full end to end implementation experience.
Base location: - Bengaluru - Must
Requirements: -
- Mandatory - ISO 27001:2013 lead implementor certified
- Mandatory - ISO 27001:2013 lead auditor certified (but if it is a good candidate, we can still consider)
- Good to have – CISA, CISM, Risk management certification, Privacy certifications.
- Mandatory - Atleast one end to end implementation experience of ISO 27001 standard. The candidate should have a good implementation knowledge of ISO 27001, ISO 27002 standards and is required to implement the ISO requirements and run the ISMS program for multiple countries.
- This immediate requirement is for implementing the ISMS program for our Canadian office location. The candidate should be willing to work from Bengaluru in EST time zone during this implementation phase whenever required.
- Good documentation skills.
- Develop, implement, maintain, review and continually improve Information Security policies.
- Good understanding and knowledge of applicable legal and regulatory requirements as relevant to information security.
- Manage and maintain a risk register / risk database along with risk treatment plans.
- Good understanding of physical and environmental security.
- Conduct Internal Audits based ISO 27001 standards and Personal Data Protection policies. A good experience in independently conducting Internal and supplier audit with respect to information security.
- Provide training to the employees on Privacy & Information Security Management System on regular intervals.
- The greater part of the job involves interacting with people, interviewing them / auditing, Preparing audit reports, discussing / persuading / influencing.
- Mandatory: Good verbal and written communication skills. Eye for details.
- Good presentation skills.
- Since this is a trusted role, candidates must be willing to undergo extensive background checks to verify their identity, character, qualifications, skills and experience.
at Upswing Financial Technologies Private Limited
At Upswing, we are committed to building a robust, scalable & secure API platform to power the world of Open Finance.
We are a passionate and self-driven team of thinkers who aspire to build the rails to connect the legacy financial sector with financial innovators through a simple and powerful banking-as-a-service (BaaS) platform.
We are looking for motivated engineers who will be working in a highly creative and cutting-edge technology environment to build a world-class financial services suite.
About the role
As part of the DevSecOps team at Upswing, you will get to work on building state-of-the-art infrastructure for the future. You will also be –
- Managing security aspects of the Cloud Infrastructure
- Designing and Implementing Security measures, Incident Response guidelines
- Conducting Security Awareness Training
- Developing SIEM tooling and pipelines end to end for vulnerability/security/incident reporting
- Developing automation and performing routine VAPT for Network and Applications
- Integrating with 3rd party vendors for the services required to improve security posture
- Mentoring people across the teams to enable best practices
What will you do if you join us?
- Engage in a lot of cross-team collaboration to independently drive forward DevSecOps practices across the org
- Take Ownership of existing, ongoing, and future DevSecOps initiatives
- Plan and Engage in Architecture discussions to bring in different angles (especially security angles) to the table
- Build Automation stack and tools for security pipeline
- Integrate different security measures and pipelines with the SIEM tool
- Conducting routine VAPT using manual and automated workflows, generating and maintaining the report for the same
- Introduce and Implement best practices across teams for a great security posture in the org
You should have
- Curiosity for on-the-job learning and experimenting with new technologies and ideas
- A strong background in Linux environment
- Proven experience in Architecting networks with security first implementation
- Experience with VAPT tooling for Networks and Applications is required
- Strong experience in Cloud technologies, multi-cloud environments, and best practices in Cloud
- Experience with at least one scripting language (Ruby/Python/Groovy)
- Experience in Terraform is highly desirable but not mandatory
- Some experience with Kubernetes, and Docker is required
- Understanding Java web applications and monitoring them for security vulnerabilities would be a plus
- Any other DevSecOps-related experience will be considered
· Maximum 5 years of Information Technology/Technology Operations/Information Security experience required.
· Minimum 3 years of experience in Cybersecurity, Identity & Access Management, Role Based Access Control, and Identity Governance is mandatory.
· Knowledge on User Life Cycle Management, Access provisioning, Access administration is must.
· Experience with technologies such as Role-Based Active Control (RBAC) and Attribute Based Access Control (ABAC) is required.
· Experience in User Access Re-certification activities is mandatory.
· Working knowledge on Active Directory is must.
· Working experience on any IAM tool (SailPoint/Okta/OneIdentity/Varonis/MIM) would be added advantage.
· Knowledge on Identity and Access Management role/processes/tools is must.
· Prior experience in processing IAM requests (Add/Modify/Delete) is must.
· Experienced in Incident management & Change Management processes.
· Knowledge of and the ability to adhere to SAS and SOX audit requirements pertaining to Identity & Access Management job requirements.
· Experience with work-flow management tools such as ServiceNow.
· Leveraging creative thinking and problem solving skills, individual initiative, and utilizing MS Office (Word, Excel, Access, and PowerPoint).
· Understanding personal and team roles; contributing to a positive working environment by building solid relationships with team members; proactively seeking guidance, clarification and feedback.
· Identifying and addressing business needs: building relationships with Stake Holders; developing an awareness of Firm services; communicating with the business/stake holders in an organized and knowledgeable manner; delivering clear requests for information; demonstrating flexibility in prioritizing and completing tasks; and communicating potential conflicts to a supervisor
· Experience performing user administration tasks for various in-house and third-party applications.
· Analyzing, prioritizing, and resolving faults to resolution. Resolve tickets according to SLAs and escalation procedures.
· Strong analytical, problem solving and organizational skills. Be proactive, dynamic, and flexible.
· Good Communication skills, able to articulate well with business and stakeholders.
· Education Qualification : Any graduate/post graduate with Computer Science background.
Roles and responsibilities:
- Audit the current Information Security system and procedures and do a Gap analysis
- Identify immediate potential Information Security Risks and manage remediation tasks through to closure
- Create an Information Security Compliance Roadmap and execute end-to-end compliance initiatives by that roadmap
- Design high-quality test plans and direct Data/Information security control test activities
- Continuously improve Octro Data/Information security control framework
- Maintain handbook pages and procedures related to Information security compliance
- Identify opportunities for Information security compliance control automation, execute them and then maintain
- Provide actionable and constructive advisement to cross-functional teams, including driving remediation activities for high and select moderate-risk Observations across all Octro departments
- Design, develop, and deploy scripts to automate continuous control monitoring, administrative tasks and metric reporting for all security compliance programs
- Direct and support external audits as and when necessary
Requirements
- A minimum of 6-8 years' experience working with Data/Information Security Compliance programs
- Detailed knowledge of common information security management frameworks, regulatory requirements and applicable standards such as: ISO, SOC 2, GDPR, PCI etc.
About Octro Inc :
We are one of the fastest-growing mobile gaming companies around, a technology-driven organization at heart, and take pride in the platforms we create.
Founded in 2006 with a mission to create productivity applications for Mobile Devices. After pioneering one of the first mobile Voice-over-IP infrastructures called OctroTalk, the company ventured into building mobile gaming platforms. Sequoia Capital has invested in Octro. The funding was announced in June 2014.
- Participate and collaborate with the users, business analyst, quality assurance/quality control analyst in the gathering of user requirements and specifications.
- Analyze technical and business requirements and translate these into basic and detailed technical design.
- Participate and conduct feasibility study, research and development, prototyping and proof of concept (PoC) in implementing new/existing systems, solutions and processes.
- Participate in the technical and project documentation such as but not limited to functional, system and technical design, requirements and specifications.
- Develop, customize, enhance, fix and maintain codes, applications and systems.
- Create test scenarios and data and conduct or participate in non-functional and functional testing (e.g., unit testing, system testing, integration testing, etc.).
- Document, analyze and report test results.
- Develop and review codes, programs and configurations to verify consistency and conformance with established programming and industry standards, guidelines, policies and practices.
- Conduct incident and problem analysis, data gathering, investigation and resolution of issues, and provide technical consultancy, assistance and support.
- Deliver the required systems/applications/solutions on time and based on agreed budget and specifications.
- Identify, assess and recommend opportunities for application and process improvement.
- Prepare reports, manuals and other documentation on the status, operation and maintenance of software.
- Provide regular and effective progress updates to the project manager/team lead/supervisor/immediate manager.
- Actively participate in and lead the peer review and status meeting to communicate progress and escalate risks and roadblocks.
- Prepare training materials and provide assistance in conducting the training to users or other members of the team.
- Responsible for the information security by protecting confidential information from unauthorized access, ensuring the integrity of the information and information system, taking appropriate measures to manage security risks and following and complying with the laws, legislations and terms of contracts.
- Perform other duties as assigned, if necessary.
- Develop efficient strategies to protect the system, the networking infrastructure, data, and information systems against potential threats/cyber risks
- Routinely performing threat analysis, system checks, and security tests
- Defining and updating information security criteria and validation procedures
- Effectively discuss to understand safety and security and fix the problems along with different stakeholders
- To be a security representative or point of contact for all technical deliveries, initiatives, and project implementations.
- To develop technical processes and procedures and promote compliance in line with regulations, corporate policies, or standards as per ISO27001
- Assess technical security risks in terms of impact on systems and service confidentiality, integrity, and availability, and report and escalate results of risk assessments.
- Report any real or potential security breaches/vulnerabilities to various stakeholders and provide technical support during incident response
- Monitor security tools to detect security events & incidents Report and escalate any security breaches to the Information Technology Security Officer
- Operate vulnerability scanning and compliance tools to identify system weaknesses
- Represent IT Security matters at technical and business forums.
Desired candidate profile :
- Relevant experience in the information security field
- Relevant experience working with ISO Policies, and GDPR guidelines.
- Strong knowledge of network architecture and security concepts related to routing
- Exceptional attention to detail
- Excellent analytical and problem-solving skills
- Great team player and able to work efficiently with minimal supervision
- Excellent communication skills, both written and verbal, work with the different stakeholders on strengthening the security risks.
- Able to handle and cope with stressful situations and understands the pressures of a start-up environment
Job Brief:
You'll be joining Mindtickle’s InfoSec and Compliance team, which is responsible for various functions related to Security, Privacy, and Compliance around Mindtickle's rapidly growing cloud platform. You'll play a crucial role in all our compliance & information security initiatives, including but not limited to those arising from regulations (e.g., GDPR, CCPA, UK DPA 2018, FINRA), audit requirements (e.g., SOC 2, HIPAA), and customer/ prospects requests (typically large enterprises).
As Data Privacy & Compliance Manager, you will champion the highest data privacy standards and drive forward compliance across all of Mindtickle. Crucial to this role will be an expert knowledge of international data protection laws and a proactive and pragmatic approach towards data privacy and compliance.
Key Responsibilities:
-
Act as the single point of contact for all privacy-related topics, including communication with customers and prospects, including RFPs, emails, or privacy calls
-
Closely working with the internal legal team and external legal counsel to support the review of third parties/customer data processing addendums (DPAs), standard contractual clauses, contracts, and other data protection agreements
-
Maintain the data protection terms agreed with customers in a contract management software
-
Perform due diligence of new third parties and periodic risk review of existing third parties, including processes around sub-processors
-
Support in other industry compliance projects such as ADA, Section 508, WCAG, FINRA, 21 CFR Part 11, etc.
-
Lead the assessment of new legislation or other regulatory changes (GDPR, CCPA, UK DPA 2018, LGPD, PIPEDA, Swiss FDAP) and make recommendations as necessary to ensure that risks are mitigated as well as ongoing compliance
-
To work flexibly and collaboratively across all teams in the organization while driving privacy & compliance-related projects, including sales, customer success, product, and engineering
-
Own internal and external privacy audit projects, including planning, scoping, need analysis, ongoing project management, and communications with all relevant stakeholders
-
Onboard privacy solutions, design, build and deploy data privacy programs on the solutions to ensure compliance with privacy requirements
-
Maintain Records of Processing Activities (ROPA) and ensure Privacy By Design for new features/changes in the platform
-
Undertake all other reasonable and related tasks associated with this role
Desired Qualification:
-
5-10 years of experience in data privacy and compliance, with exposure to cloud software platforms
-
Extensive experience in data protection and knowledge of relevant legislation, including GDPR, Standard Contractual Clauses, Transfer Impact Assessment, CCPA, UK DPA 2018, LGPD, PIPEDA, Swiss FDAP, etc.
-
Certifications such as CIPP/E, CIPP/US, CIPM, CIPT, etc., are preferred
-
Specialist knowledge in a relevant area, e.g., data security and individual rights requests
-
Excellent communication, interpersonal, project management, and issue resolution skills
-
Excellent analytical skills, organizational skills, ingenuity, and the ability to work as part of a team
-
Experience in managing privacy audits and risk management processes
-
Demonstrated ability to learn quickly, take the initiative, and drive complex projects
Hiring for Lead Auditor (QMS / ISMS) role.
Job description Below :
- Preparation Dept. Objective reports.
- Preparation of Internal Audit Schedule & Coordination /opening meeting and closing meeting.
- Follow up for Internal Audit closing of Observations.
- Preparation of Management review meeting Input & Output reports.
- Coordination Certification Audit and Surveillance (TUV-SUD) Audit for ISO 9001:2015 and ISO 27001:2013.
- Follow up for closing of Observations.
- To update QMS & ISMS Manual, Procedures, Policies, Risk Assessment Plan, SOA & Formats.
- Internal Audit of ISO - QMS & ISMS standards.
- Develop efficient strategies to protect the system, the networking infrastructure, data, and information systems against potential threats/cyber risks
- Routinely performing threat analysis, system checks, and security tests
- Defining and updating information security criteria and validation procedures
- Effectively discuss to understand safety and security and fix the problems along with different stakeholders
- To be a security representative or point of contact for all technical deliveries, initiatives, and project implementations.
- To develop technical processes and procedures and promote compliance in line with regulations, corporate policies, or standards as per ISO27001
- Assess technical security risks in terms of impact on systems and service confidentiality, integrity, and availability, and report and escalate results of risk assessments.
- Report any real or potential security breaches/vulnerabilities to various stakeholders and provide technical support during incident response
- Monitor security tools to detect security events & incidents Report and escalate any security breaches to the Information Technology Security Officer
- Operate vulnerability scanning and compliance tools to identify system weaknesses
- Represent IT Security matters at technical and business forums.
Desired candidate profile :
- Relevant experience in the information security field
- Relevant experience working with ISO Policies, and GDPR guidelines.
- Strong knowledge of network architecture and security concepts related to routing
- Exceptional attention to detail
- Excellent analytical and problem-solving skills
- Great team player and able to work efficiently with minimal supervision
- Excellent communication skills, both written and verbal, work with the different stakeholders on strengthening the security risks.
- Able to handle and cope with stressful situations and understands the pressures of a start-up environment
Global IT risk management company
i. Technology Graduate with 8+ years of experience in the IT industry & Information Security / Cyber Security
iii. Provide Security Vision & Strategy to the Organization, strategic direction, development, and implementation of information security programs and projects to address risks relevant to the attainment of organizational strategic goals.
iv. Experience in advising leadership team regarding Security Technology Land scape, product issues, and possible improvements
v. Expertise in providing executive roadmaps for continual improvement in teams, technology, and processes, process across various security & DevSecops teams
vi. Experienced in Information Security Risk Management, gap analyses, Audits.
vii. Hands-on Experience in formulating Cyber Security Policies, Design and implementation of Security Technologies, DevSecOps.
viii. Working Knowledge in implementation of Cyber Security Solution in Open Source, OpenStack environment.
ix. Ability to provide strategies to increase the ability to withstand cyber-attacks, as measured by annual sophisticated attack simulations.
x. Experience in upgrading, troubleshooting and tuning of Cyber Security Solutions, SOC Operations.
xi. Thorough understanding and good knowledge latest Cyber Security technologies, Security Architectures, vulnerabilities, security threats.
xii. Expertise in Test-Driven Development and establishing a DevSecOps practice. Multiple product launches under your belt - from design to launch, having played a key role in their success
xiii. Ability to setup PoC for latest security solutions
xiv. Good understanding of Open Source Technologies, Private Cloud Technologies.
Rapidly growing fintech SaaS firm that propels business grow
What are we looking for?
An enthusiastic individual with the following skills. Please do not hesitate to apply if you do not match all of it. We are open to promising candidates who are passionate about their work and are team players.
Key Responsibilities & expectations from the candidate
- Must have strong experience in Information Security Management system(ISMS), creation of policy, procedures and implementation.
- Operates as a key contributor to the RFP, Third-Party Risk assessment, cloud security assessment etc.
- Lead the strategic and tactical development of information security framework, risk management and new compliance initiatives
- Subject matter expertise in ISO 27001, SOC2, CCPA, CPRA, GDPR, PCI DSS and HIPAA.
- Must have a strong experience in the documentation process and reviewing MSA, SCC, SLA & DPA.
- Good knowledge of BCP/DR, Incident response, VA/PT and Audit methodologies of various compliance frameworks.
- Good knowledge of Access management, Network, Application Security, Encryption, Backup, Physical Security, ISMS Training & Awareness etc..
- Ability to deal with the customers and vendors on Security and privacy matters.
- Knowledge of Core IT processes, SDLC, network infrastructure will be useful.
Personal Attributes
- Good written, oral, and interpersonal communication skills.
- Ability to conduct research into IT security issues
- Ability to present ideas in business-friendly and user-friendly language.
- Ability to effectively prioritize and execute tasks in a high-pressure environment.
- Highly self-motivated and hardworking.
Qualification and certification
- Bachelor’s/master's degree in Security, Computer Science, Management Information Systems, Engineering or related field.
- Should be at least ISO 27001 lead auditor or lead implementer.
- 3+ years of related work experience in information security governance, risk and compliance (GRC) or relevant compliance roles in the SaaS industry.
What can you look for?
A wholesome opportunity in a fast-paced environment that will enable you to juggle between concepts, yet maintain the quality of content, interact, and share your ideas and have loads of learning while at work. Work with a team of highly talented young professionals and enjoy the benefits of being here.
We are
It is a rapidly growing fintech SaaS firm that propels business growth while focusing on human motivation. Backed by Giift and Apis Partners Growth Fund II, Company offers a suite of three products - Plum, Empuls, and Compass. Company works with more than 2000 clients across 10+ countries and over 2.5 million users. Headquartered in Bengaluru, Company is a 300+ strong team with four global offices in San Francisco, Dublin, Singapore, New Delhi.
Way forward
We look forward to connecting with you. As you may take time to review this opportunity, we will wait for a reasonable time of around 3-5 days before we screen the collected applications and start lining up job discussions with the hiring manager. We however assure you that we will attempt to maintain a reasonable time window for successfully closing this requirement. The candidates will be kept informed and updated on the feedback and application status.
Rapidly growing fintech SaaS firm that propels business grow
What are we looking for?
An enthusiastic individual with the following skills. Please do not hesitate to apply if you do not match all of it. We are open to promising candidates who are passionate about their work and are team players.
Key Responsibilities & expectations from the candidate
- Must have strong experience in Information Security Management system(ISMS), creation of policy, procedures and implementation.
- Operates as a key contributor to the RFP, Third-Party Risk assessment, cloud security assessment etc.
- Lead the strategic and tactical development of information security framework, risk management and new compliance initiatives
- Subject matter expertise in ISO 27001, SOC2, CCPA, CPRA, GDPR, PCI DSS and HIPAA.
- Must have a strong experience in the documentation process and reviewing MSA, SCC, SLA & DPA.
- Good knowledge of BCP/DR, Incident response, VA/PT and Audit methodologies of various compliance frameworks.
- Good knowledge of Access management, Network, Application Security, Encryption, Backup, Physical Security, ISMS Training & Awareness etc..
- Ability to deal with the customers and vendors on Security and privacy matters.
- Knowledge of Core IT processes, SDLC, network infrastructure will be useful.
Personal Attributes
- Good written, oral, and interpersonal communication skills.
- Ability to conduct research into IT security issues
- Ability to present ideas in business-friendly and user-friendly language.
- Ability to effectively prioritize and execute tasks in a high-pressure environment.
- Highly self-motivated and hardworking.
Qualification and certification
- Bachelor’s/master's degree in Security, Computer Science, Management Information Systems, Engineering or related field.
- Should be at least ISO 27001 lead auditor or lead implementer.
- 3+ years of related work experience in information security governance, risk and compliance (GRC) or relevant compliance roles in the SaaS industry.
What can you look for?
A wholesome opportunity in a fast-paced environment that will enable you to juggle between concepts, yet maintain the quality of content, interact, and share your ideas and have loads of learning while at work. Work with a team of highly talented young professionals and enjoy the benefits of being at Xoxoday.
We are
Xoxoday is a rapidly growing fintech SaaS firm that propels business growth while focusing on human motivation. Backed by Giift and Apis Partners Growth Fund II, Xoxoday offers a suite of three products - Plum, Empuls, and Compass. Xoxoday works with more than 2000 clients across 10+ countries and over 2.5 million users. Headquartered in Bengaluru, Xoxoday is a 300+ strong team with four global offices in San Francisco, Dublin, Singapore, New Delhi.
Way forward
We look forward to connecting with you. As you may take time to review this opportunity, we will wait for a reasonable time of around 3-5 days before we screen the collected applications and start lining up job discussions with the hiring manager. We however assure you that we will attempt to maintain a reasonable time window for successfully closing this requirement. The candidates will be kept informed and updated on the feedback and application status.
Desired Skills |
To have skills: · Proven technical expertise in cyber security domains, i.e. endpoint security, application security testing. · Knowledge and experience in public cloud solutions. · Knowledge on network security, networking concepts and architectural implementations. · Knowledge on vulnerability testing and define proper remediation’s. · Shell scripting experience - Shell/Bash/Python. · Working experience of Linux operation.
Desire to have skills: · One or more of the following cyber security certifications: CEH, CISSP, OSCP, SSCP CCSP. · Excellent problem solving, and follow-up skills. · Ability to convey technical security concepts to non-technical audiences. |
Disruptive Digital Healthcare Platform
What you will do:
- Working closely with the external auditors to achieve common goals
- Conducting Enabling Service Audit (HR, Admin, IT) once in 6 months for the verification of ISMS & QMS Standards
- Performing ISMS and Internal Audit
- Being part of the external Audits (ISMS, QMS & CMMI)
- Managing of implementation of ISMS
Desired Candidate Profile
What you need to have:- Strong communication and team building skills with proficiency at grasping new technical concepts quickly and utilizing the same in a productive manner
- Experience in ISO27001, Internal Audits, CMMI
Responsibilities:
The Senior Information Security Engineer is responsible for the implementation, execution and maintenance of technology solutions to mitigate risk, to protect the IT and Engineering environments by reducing the probability of, and to minimize the effects of, damage caused by malware, malicious activities and security events.
The individual will help protect the company by deploying, tuning, and managing security tools across the computing environment, as well as provide security incident response cycle support. They should have a passion and skills for identifying the latest cyber threats. The individual will:
Basic Qualifications
- Working knowledge of infrastructure-as-code and CI/CD pipelines tools (i.e. Jenkins, Teamcity, CircleCI etc..)
- Lead and participate in major day-to-day operational aspects of the security engineering team including improvement of current security controls while constantly identifying areas of needed improvement
- Deep hands-on security experience with cloud providers, such as AWS, GCP, Azure
- Understanding of automated security testing approaches and tools
- Experience with proactive integration of security into the development process
- Lead continuous improvement efforts of out security tools and systems (Concertation on SIEM, IDS, EDR Tools)
- Work with our customers (Security Operations, Incident Response, and Product teams) to incorporate high quality security alerting into their operational workflows
- Improve overall security practitioner efficiency through process automation
- Foster and promote collaboration among all members of the IT, Infrastructure, and Risk Management Departments.
Minimum Qualifications/Requirements
- BS or MS in Computer Science or related field
- Minimum 7+ years of cybersecurity experience
- Must have previous experience performing threat hunting and incident response duties using SIEM tools, cybersecurity management consoles, and ticketing systems
- Experience in deployment, development, and maintenance of SIEM
- Experience writing and using Ansible server administration scripts, and create simple Python, BASH, or Powershell scripts to automate cybersecurity functions
- Scripting experience to automate security operations, alerting, and compliance checks, CI/CD design, deployment, and management
- Experience with managing endpoint response and detection infrastructure and endpoints at the enterprise level, including performing upgrades to the back end application and deploying new agent versions to endpoints
- Understanding the investigative process and performing triage for cybersecurity incidents
- Experience maintaining industry leading security technologies or infrastructure systems in complex technical IT operations environment
- Must be detail-oriented and organized with ability to handle competing demands while meeting deadlines
- Experience in authentication protocols and frameworks to include OAuth, and AWS IAM
- Proactive and motivated; team player with a positive can-do attitude
- Strong analytical/problem-solving skills and cross-functional knowledge across multiple IT operational and security disciplines
- Ability to communicate technical concepts to a broad range of technical and non-technical staff
- Must possess a high degree of integrity, be trustworthy, and have the ability to lead and inspire change
- Threat and vulnerability analysis.
- Investigating, documenting, and reporting on any information security (InfoSec) issues as well as emerging trends.
- Analysis and response to previously unknown hardware and software vulnerabilities.
- Preparing disaster recovery plans.
SOC analysts are considered the last line of defense and they usually work as part of a large security team, working alongside security managers and cybersecurity engineers. Typically, SOC analysts report to the company’s chief information security officer (CISO).
SOC analysts need to be detail oriented because they are responsible for monitoring many aspects simultaneously. They need to watch the protected network and respond to threats and events. The level of responsibility typically depends on the size of the organization.
Qualifications & Responsibilities
Year of Experience : 3- 8 yrs
Location : Bangalore, Delhi, Mumbai, Pune
Work on ISO 27001 & NIST based Information Security Management System implementation and sustenance.
- Responsible for SOX (IT Security Controls) and track the monthly/quarterly/annual control reports and drive effectiveness of SOX controls.
- Work on Business Continuity Planning, IT Disaster Recovery as per ISO27001 & NIST requirements
- Assess information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk
- Conduct Information Systems audits covering IT infrastructure assets
- Working knowledge in security domains such as: security governance policies and procedures, risk management, compliance, access control, network security, security architecture, security incident response, disaster recovery, business continuity management, privacy and data protection
- Experience in leveraging industry standards and frameworks such as ISO/IEC 27001, NIST CSF/800-171, etc.
- Possesses certifications such as ISO27001 LA. CISSP, CISA certification- preferred
Why NCG?
WHO WE ARE DRIVES WHAT WE DO!
We Don't build the organization; we create an everlasting family. Our people express a sense of winning together when times are good and sticking together when times are tough.
Are you a Doer or Achiever?
Well, at NCG, our doors are Open for Doers and Achievers alike. We are a Cult where we create, innovate, learn and Contribute in a comfortable, transparent, and fair environment.
Joining NCG means contributing to a shared ambition for reliable work culture, tackling extraordinary technological challenges in multicultural teams, preserving your work/life balance, and more!
The Role
We are looking foran Information Security Analyst – Compliance to primarily strengthen our practice towards compliances such as HIPAA, HITRUST,etc. and ensure highest levels of security around sensitive data.
- Identifying new risks and performing risk assessments.
- Performing continuous gap analysis.
- Auditing the applications, configurations, and internal practices against standards such as HIPAA, HITRUST etc.
- Providing advice and implementing forward-thinking information security policies, procedures, and standards.
- Assisting several teams (internal and external) with best practicesand security consultations.
- Supporting with other information security activities as assigned.
- Ensuring the organizational compliance during audits and certification efforts.
Requirements:
- Demonstrated experience in implementing and maintaining security standards such as HIPAA, HITRUST, SOC2, ISO 27001 etc.
- Ability to understand and interpret legal, regulatory, and contractual compliance requirements.
- Experience in InfoSec policy creation and documentation.
- Ability to understand technology and pertaining risks.
- Knowledge on IT, Servers, SDLC, Database, etc.
- Experience working with / securing cloud-based applications is an add-on.
- 2+ years of experience.
- Excellent written and verbal communication skills.
- Relevant Security Certifications will be a good add-on.
Information Security Specialist
Notice Period: 45 days / Immediate Joining
Banyan Data Services (BDS) is a US-based data-focused Company that specializes in comprehensive data solutions and services, headquartered in San Jose, California, USA.
We are looking Information Security Specialist who has the expertise and deep knowledge of Information security regulations, compliance, and SIEM tools, and the ability to develop, describe and implement Security Baselines and Policies.
It's a once-in-a-lifetime opportunity to join our rocket ship startup run by a world-class executive team. We are looking for candidates that aspire to be a part of the cutting-edge solutions and services we offer that address next-gen data evolution challenges.
Key Qualifications
· Design, deploy, and support Information Security Solutions provided by BDS
· Assist clients to carry out the IT Risk Management assessment on both on-prem and cloud platforms
· Provide subject matter expertise on IT security compliances during the security audits to meet various security governances.
· Research and strategic analysis of existing, and evolving all IT and data security technologies
· Establish baselines to define required security controls for all infrastructure components and application stack
· Follow latest vulnerabilities and threats intelligence updates across a wide range of technologies and make recommendations for improvements in the security baselines.
· Overseeing security event monitoring, understand the impact, and coordinate remediation efforts
· Create and optimize the SIEM rules to adjust the specification of alerts in responding to incident follow up
· Must be able to work a flexible schedule during off-hours
Key Skills & Qualification
· Minimum of 4 years relevant work experience in information/cyber security, audit, and compliance
· Certifications in any of technical security specialty (e.g., CISA, CISSP, CISM)
· Experience in managing SIEM products like Arcsight, Qradar, Sumo Logic, RSA NetWitness Suite, ELK, Splunk
· Exposure of the security audit tools on public cloud platforms
· Solid understanding of the underlying LINUX/UNIX and Windows OS security architecture
· Certified Ethical Hacker would be a plus
· Handling of Security audits is a must
· Proven interpersonal skills while contributing to team effort by accomplishing related results
· Passion for learning new technologies and the ability to do so quickly.
http://www.banyandata.com" target="_blank">www.banyandata.com
this It company is hiring for this profile
NOTE- we are looking for hose who can join immediately or within notic period of 15-20days.
location_;Hyderabad
(wfh till pandemic)
JOB DESCRIPTION
• Job Scope
o Analyse incident in our security devices, conducting investigation and finding the
root cause of incidents.
o Managing endpoint detection security system
o Managing, configuration and fine tuning of on-prem firewall and WAF
o Provide and advise IT team on security and IT related issues such as network
configuration, firewall configuration, etc
o Ensuring all utilized cloud services are secured and the configuration comply to best
practices benchmark
o Communicate risk and recommendations to mitigate risk to the senior
administration by communicating in non-technical format
o Assists other department to ensure regulatory compliance to any necessary
compliance
• Minimum Requirements
o At least 2 years of experiences in managing endpoint detection system, WAF and
FW.
o Hands on experience on cloud environment preferably Microsoft Azure.
o Bachelor’s degree of any IT related courses.
o Strong understanding of incident detection and response process and procedure
o Strong knowledge in networking and in operating system such as
Linux/Unix/Windows
We are seeking a Security Program Manager to effectively drive Privacy & Security Programs in collaboration with cross functional teams. You will partner with engineering leadership, product management and development teams to deliver more secure products.
Roles & Responsibilities:
- Work with multiple stakeholders across various departments such as IT, Engineering, Business, Legal, Finance etc to implement controls defined in policies and processes.
- Manage projects with security and audit requirements with internal and external teams and serve as a liaison among all stakeholders.
- Managing penetration tests and security reviews for core applications and APIs.
- Identify, create and guide on privacy and security requirements considering applicable Data Protection Laws and implement them across software modules developed at Netmeds.
- Brainstorm with engineering teams to figure out how privacy and security controls can be applied to Netmeds tech stack.
- Coordination with Infra Teams and Dev Teams on DB and application hardening, standardization of server images / containerization.
- Assess vendors' security posture before onboarding them and after they qualify, review their security posture at a set frequency.
- Manage auditors and ensure compliance for ISO 27001 and other data privacy audits.
- Answer questions or resolve issues reported by the external security researchers & bug bounty hunters.
- Investigate privacy breaches.
- Educate employees on data privacy & security.
- Prioritize security requirements based on their severity of impact and product roadmap.
- Maintain a balance of security and business values across the organisation.
Required Skills:
- Web Application Security, Mobile Application Security, Web Application Firewall, DAST, SAST, Cloud Security (AWS), Docker Security, Manual Penetration Testing.
- Good hands-on experience in handling tools such as vulnerability scanners, Burp suite, patch management, web filtering & WAF.
- Familiar with cloud hosting technologies (ex. AWS, Azure). Understanding of IAM, RBAC, NACLs, and KMS.
- Experience in Log Management, Security Event Correlation, SIEM.
- Must have strong interpersonal skills and should be able to communicate complex ideas seamlessly in written and verbal communication.
Good to Have Skills:
- Online Fraud Prevention.
- Bug Bounty experience.
- Security Operations Center (SOC) management.
- Experience with Amazon AWS services (EC2, S3, VPC, RDS, Cloud watch).
- Experience / Knowledge on tools like Fortify and Nessus.
- Experience in handling logging tools on docker container images (ex. Fluentd).
at openDr Business Services Pvt Ltd
As an IT Infrastructure Architects design and implement information systems that support an enterprise infrastructure. You will provide the necessary technical infrastructure for the development of new and existing infrastructure technologies and system requirements.
Improve efficiency and streamline operations. enhance design specs, create technical documentation, implement control concepts and deliver expected outcomes. Collect performance data to monitor systems resource usage and failures rates and provide solutions and recommend changes. ensure scalability and anticipate capacity growth through careful planning and awareness of industry, business and client’s growth trends. Design activities rely on accurate data, sensible KPIs and performance metrics to improve processes and bridge gaps
Primary Responsibilities:
Conducting research on emerging and existing technologies. Recommend system alternative technologies and infrastructure development efforts that increase infrastructure flexibility, reliability, stability, scalability, resilience, availability, performance and cost effectiveness. All collective research efforts will contribute to the creation of architectural road maps that leverage software and cloud technologies. Research customer interaction, policy adherence, enterprise processes. May act as the subject matter expert of architectural virtualization.
Needs to guide in execution of Incident, Change, Release, Problem, Performance, and Availability Management
Security of all infrastructure is of paramount importance and is periodically audited, monitored and updated in keeping up with latest threats and risks.
Identifying best practices for future implementation. Architects provide feedback to the enterprise and incorporate all gathered information into future integration plans.
Provides DevOps thought leadership and mentoring in both advisory and delivery contexts, focusing on the requirements of Technology and Business and how these are best served by continuous improvements to our delivery approach
Required Technical skills and Experience
- Over 10+ years of experience as IT Infrastructure Architect
- Bachelor / Masters Degree in Computer Science, Information Technology or related field
- Must have experience in Infrastructure architecting on AWS/ Azure/ Google cloud.
- Should have a very good understanding of Cloud Native services (IaaS, PaaS, SaaS) platforms for application deployment and scalability in a cost effective manner, addresses scalability, availability, service continuity (DR), performance and security requirements. auto-scaling and self-healing.
- Has hands on experience with cloud orchestration using Kubernetes or apache Mesos on marathon would be an advantage
- Evangelizing microservices-based architectures using containerized applications; help to drive strategy and implementation of cloud native infrastructure
- Sound Knowledge of RDBMS, preferably with MYSQL Mongo, Elasticsearch, Redis. Working knowledge of, CDN/WAF
- Proven expertise on Linux, and DevOps tools such as Git, Jenkings, maven, Bamboo Docker, Puppet, Ansible,Kubernetes,terraform. Elastic Beanstalk, Openshift
- Infrastructure security (VPC, tunneling, API management, Governance) and networking security solutions like routing, switching, Firewalls etc.
- Good debugging skills on Linux, Apache, Nginx, PHP, MYSQL and cloud-based application and administration of RHEL, CentOS/Ubuntu
- Experience in Cloud scale APM and Monitoring Tools such as ELK ,Splunk, Nagios, Graffana, XMON Datadog, Dynatrace, Appdynamics, Cloud Monitoring.
- Troubleshoot and debug environment and infrastructure problems found in the production and non-production environments.
- Implements security improvements by assessing current situations; evaluating trends; anticipating requirements.
- Determines security violations and inefficiencies by conducting periodic audits.
- Upgrades system by implementing and maintaining security controls.
- Must have knowledge of leading storage backup solutions.
- Experience with one or more Unix shell scripting languages (Bash, C-Shell)
- Team mentoring and support for ramping up new engineers
- Provide leadership in planning, defining requirements, scoping efforts, and setting appropriate milestones
- Using a data-driven process/mindset, author technical content to support the incident response process (e.g. postmortem/root cause analysis) and develop interim solutions to prevent or quickly resolve issues/problems the next time.
- Experience with networking technologies (routing, switching, IP addressing, DNS, Load balancers, etc.) Knowledge of : - File systems, NFS, CIFS, iSCSI - IPv4 networking, including TCP/IP, SMTP/POP/ IMAP, HTTP/S, LDAP – DNS
- Ability to work independently while tackling complex problems
- Passionate to palm ownership and responsibility of the systems - 24x7
at Open Finanacial Technologies
What you’ll be doing:
- Establish, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program
- Work directly with the business units to facilitate risk assessment and risk management processes
- Develop and enhance an information security management framework
- Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services
- Provide leadership to the enterprise's information security organization
- Partner with business stakeholders across the company to raise awareness of risk management concerns
- Assist with the overall business technology planning, providing a current knowledge and future vision of technology and systems
- Conduct regular internal audits in compliance with applicable legal and contractual requirements, ISO 27001 and PCI DSS requirements and companies internal requirements
- Conduct regular Management reviews and update the management on information security aspects. The MRMs shall also focus on drawing Management attentions to the key areas for required management actions.
- CISO is also responsible to ensure customer audits as well as re-certification and surveillance audits and successful.
- Coordinate with relevant stakeholders to address the NC closures.
- CISO shall ensure the information incidents are responded and resolved on time to ensure compliance with legal and contractual requirements.
What you’ll bring along:
- Degree in business administration or a technology-related field required.
- Professional security management certification
- Minimum of 5 years of experience in a combination of risk management, information security and IT jobs
- Knowledge of common information security management frameworks, such as ISO/IEC 27001, and PCI DSS.
- Excellent written and verbal communication skills and high level of personal integrity
- Innovative thinking and leadership with an ability to lead and motivate cross-functional, interdisciplinary teams
- Experience with contract and vendor negotiations and management including managed services.
- Specific experience in Agile (scaled) software development or other best in class development practices.
- Experience with Cloud computing/Elastic computing across virtualized environments.
Our ideal candidate is someone who is an exceptional JS developer with significant experience on React and Node. You should be able to build and support complex applications single-handedly with a keen eye towards UX, design, security and performance. Additionally you will need to have a basic understanding of microservices, API integrations to aid in achieving our vision of building the most robust and scalable integration platform in the B2B Retail + Food verticals. You will be responsible for architecture, design and implementation of the entire system to support thousands of customers globally. Our stack is primarily built around Node, PHP, React, Angular, Mongo, PHP and advanced Infra and DevOps tools such as Kubernetes, Grafana, Prometheus, ELK and more.
Mentoring should come naturally to you, as well as finding the right balance towards process and documentation.
Highlights:
1) You will be working on interesting technical challenges in a product centric and open-source driven environment.
2) You will help set a very high bar on code quality with a focus on test driven development and writing highly performant, fault tolerant and secure code.
3) You will take ownership of product features from conception to implementation, testing deployment and support.
4) A lot of freedom on when and where you work from - just get stuff done.
5) You will open source as much as possible, and blog about cool things that you learnt and built.
6) You will help define who we become as a company.
7) You will get stock options in line with silicon valley standards.
Caveats:
1) We have a strict no-divas rule. There are a lot of smart engineers on the team but no one with an attitude / superiority complex.
2) If you think writing tests for your code, writing docs, doing customer support etc are not your cup of tea, this isn't the right role for you.
3) Similarly, if you're viewing this just as a 20-40% increment opportunity over your current compensation, this isn't the right role or company for you.
This role can be the growth opportunity of a lifetime for anyone who has been operating as a backend lead and wants to grow into a fullstack CTO. Check out the links below if you'd like to learn more about us. We encourage people from underrepresented groups to apply.
1) Why ShoppinPal? - https://www.youtube.com/watch?v=cE7DgtwA0ws" target="_blank">https://www.youtube.com/watch?v=cE7DgtwA0ws
2) Our hiring philosophy and process http://techstory.in/building-startup-team/" target="_blank">http://techstory.in/building-startup-team/
3) Our culture- https://www.shoppinpal.com/culture">https://www.shoppinpal.com/culture
· Self-driven individuals with 4 to 7 years of relevant information security experience.
· Should have adequate experience in dealing with disparate teams.
· Previous experience on medium and large platforms, with multiples technologies/vendor.
· Worked under high pressure situations (priority incidents/urgent delivery)
Essential Requirements:
· Hands on experience on NGFW such Cisco, Juniper, CheckPoint, F5/ASM
· Hands on experience on IDS/IPS management, Web Proxy, Application Firewalls; Load Balancers.
· Hands on vulnerability scanning experience.
· Hands on NAC management , Cisco ISE, RSA SecureID experience.
· Knowledge of Information security standards, policies, controls and structures prevalent in the industry.
· Strong technical understanding of network fundamentals(Routing, Switching) and common Internet protocols( HTTP, SNMP, TLS, DNS etc.)
· Experience in regular operational/health check of platforms and applications.
· Experience in writing Operational documents such as system operating guides.
Desirable Requirements:
· Previous working experiences with managing SIEM platform.
· Previous experience in security monitoring and incident response.
· Sound understanding of IT Service Management disciplines in line with IT industry standards and best practices, e.g. ITIL
· Routing, Switching knowledge
· Unix, Windows Operating system knowledge
Blue Yonder (formerly JDA Software, Inc.) is the leading su
- ELK (Elasticsearch, Logstash Kibana) Administration and Implementation.
- Experience on implementing the Syslog NG on Unix/Linux Platform.
- Experiance in Information/Cyber Security
at iNurture education solution pvt ltd
Professor:
To drive the campus academic operations in close coordination with,
a) Head of Departments. b) Faculty members c) Students
To create an 'IT centre of excellence' at the campus.
Should have driven the academic function of IT dept.
Should have experience of handling the academic operations
Associate / Assistant Professor:
Adhering to university time line (other the new courses)
To ensure coverage of Syllabus as per university standards
Learning Outcome
Examination Result ( Includes both Internal & Main Exams)
Knowledge Improvement Program
Innovation & Development
Technical Skills:
- General: C++, Java, OS, RDBMS, Software Engg, Data Structure etc
- Niche technologies like Cloud, Mobility, Information security, Data Science, IoT and Artificial Intelligence to name a few
Behavioural Competencies:
- Strong Leadership Qualities
- Excellent Communication skills
- Strong interpersonal skills to work with diverse teams
- Strong Presentation Skills
Qualification: B.Tech, M.Tech & Ph.D - Completed / Pursuing
Year of Exp:
- Professor: Min 12+ years of exp post PG and 5 years post Ph.D
- Associate Professor: Min 10+ years of exp post PG and 3 years post Ph.D
- Assistant Professor: 2+ years exp
How you match
Skills
-
MatchTeaching
-
No matchData Privacy
-
No matchInternet of Things (IoT)
-
No matchArtificial Intelligence (AI)
-
No matchCurriculum
-
No matchNetwork Security
-
No matchPresentation Skills
-
No matchInformation Security
-
No matchRDBMS
-
No matchInterpersonal Skills.
1. Monitor the quality of results of the automated system in the detection of attacks,
intrusions, and unusual, unauthorized or illegal activities.
2. Build and maintain scripts that collect cyber threats data from external sources as well as
from the in-house analytics engine, data quality inspection, and dataset creation for ML
with manual annotation.
3. Assist Data Scientists & Machine Learning Engineers in developing systems that
automate risk assessment/mitigation workflows.
4. Keep up to date with the latest security and technology developments.
5. Research and evaluate emerging cybersecurity threats and ways to manage them.
Required skills
1. Attention to details and a quality first mindset.
2. Knowledge of current hacking techniques, vulnerabilities, and security analysis
techniques.
3. Basic programming experience, and the ability to automate tasks.
4. Manual code review or source code analysis experience.
Note: We are a startup, you will have much more responsibilities.
Benefits
1. A competitive salary.
2. Health Insurance.
3. An awesome team that will challenge and respect you.
4. Lunch, Unlimited snacks and drinks.
5. Top notch office in the heart of Bangalore City.