Cutshort logo
It security jobs

17+ IT security Jobs in India

Apply to 17+ IT security Jobs on CutShort.io. Find your next job, effortlessly. Browse IT security Jobs and apply today!

icon
Varutra Consulting

at Varutra Consulting

1 recruiter
Sebastian Jelki
Posted by Sebastian Jelki
Pune, Hyderabad
10 - 15 yrs
Best in industry
Team leadership
VAPT
SOC,
Security audit
IT security

Position : India Practice Head We are seeking an experience and Dynamic individual to lead our Cyber Security services in India. As India Practice Head you will be responsible for driving business growth, managing client relationships, and delivering exceptional cyber security services to our clients. 

You will work closely with leadership team

to develop and execute the strategic plan for the India Practice. 

Key Responsibilities: 

  • Lead the Cyber security services practice in India including business development, client relationships management, service delivery and offshore business execution coming from US 
  • Develop and execute the strategic plan for the India practice in alignment with the global cybersecurity services strategy.  
  • Build and maintain strong relationships with key clients and stakeholders, ensuring their needs are met and exceeded.  
  • Drive business growth through the development of new services offerings, market analysis, and competitive intelligence.  
  • Manage and mentor a team of cybersecurity professionals, providing guidance and support to ensure quality service delivery.  
  • Ensure compliance with relevant laws, regulations, and industry standards in India.  

 

Requirements:  

  • Bachelor's or Master's degree in Computer Science, Information Technology, or related field.  
  • At least 15 years of experience in cybersecurity services, with a proven track record of successful business development and client relationship management.  
  • Strong knowledge of cybersecurity frameworks and standards, such as ISO 27001, NIST, and PCI DSS, CERT-In 
  • Experience in managing Departments and mentoring a team of cybersecurity professionals.  
  • Excellent communication and interpersonal skills, with the ability to build and maintain strong relationships with clients and stakeholders.  
  • Strong leadership skills, with a proven track record of building and leading high-performance teams. Experience in managing cyber security services for mid-enterprises. 
  • Ability to research and evaluate potential solutions to determine suitability for the organization’s needs. Capability to work in a fast-paced environment and manage multiple projects simultaneously. 
  • Keep up to date with the latest cybersecurity trends and technologies. 
  • If you are a driven and experienced cybersecurity professional with a passion for leading and growing a practice, we encourage you to apply for this exciting opportunity. 


Read more
Appknox

at Appknox

1 video
9 recruiters
Amrita Panigrahy
Posted by Amrita Panigrahy
Remote only
2 - 4 yrs
Best in industry
Penetration testing
IT security
Software security
Web application security
Mobile security

A BIT ABOUT US

Appknox is one of the top Mobile Application security companies recognized by Gartner and G2. A profitable B2B SaaS startup headquartered in Singapore & working from Bengaluru.

The primary goal of Appknox is to help businesses and mobile developers secure their mobile applications with a focus on delivery speed and high-quality security audits.

Appknox has helped secure mobile apps at Fortune 500 companies with Major brands spread across regions like India, South-East Asia, Middle-East, US, and expanding rapidly. We have secured 300+ Enterprises globally.

We are a 40+ incredibly passionate team working to make an impact and help some of the biggest companies globally. We work in a highly collaborative, very fast-paced work environment. If you have what it takes to be part of the team, we are excited, and let’s speak further.


The Opportunity

To join the security team engaging with multiple clients, helping them with end-to-end security audits, also researching new topics and vulnerabilities to be added to the scanner, present research at conferences.


What An Ideal Candidate Would Look Like: 

  • Skills - Application Penetration Testing, experience with IoT testing, source code audits.
  • Technology Stack: Python
  • Responsibilities: Engage with clients for scoping call, perform security audits, and remediation call with clients to patch the issues, research on new technologies/vulnerabilities


Minimum Requirements

  • Should have at least 2 years of experience in security or show something that proves experience doesn’t matter
  • Must be comfortable with tools like burp suite, 
  • Strong Analytical Skills
  • Strong grasp of fundamentals of information security
  • Strong Grasp of Web and API Pen-Testing
  • Self-taught learner willing to read and keep up-to-date on technological changes and how they could be used
  • Can accurately define an issue and create detailed Proof-of-concept and write-up of the findings.
  • Provide appropriate remediation and mitigations of the identified vulnerabilities.

 

Responsibilities

  • Security assessment of web applications.
  • Develop and interpret security standards and guides
  • Automation of security test cases
  • Understand and explain the results with impact on business and compliance status
  • Continuously learning and training on the latest tools and techniques

 

 Work Expectations

Within 1 month

Training on processes, security workflow

Within 3 months

Pentesting Web, Mobile and API endpoints

Within 6 months

Research and publish whitepapers, contribute to the Appknox Web Scanner


Personality traits we admire:-

  • A confident and dynamic working persona, which can bring fun to the team, and a sense of humor, is an added advantage.
  • Great attitude to ask questions, learn and suggest process improvements.
  • Has attention to detail and helps identify edge cases.
  • Highly motivated and coming up with fresh ideas and perspectives to help us move towards our goals faster.
  • Follow timelines and have an absolute commitment to deadlines.
  •  

Interview Process - would be team specific

  • Round 1 - Profile Evaluation
  • Round 2 - Appknox CTF Challenge
  • Round 3 -Technical Interview with security team members
  • Round 4 - Technical Interview with the CTO and Team Lead
  • Round 5 - HR Round


Compensation

  •  As per Industry Standards


Why Join Us:-


  • Freedom & Responsibility: If you are a person who enjoys challenging work & pushing your boundaries, then this is the right place for you. We appreciate new ideas & ownership as well as flexibility with working hours.
  • Great Salary & Equity: We keep up with the market standards & provide pay packages considering updated standards. Also as Appknox continues to grow, you’ll have a great opportunity to earn more & grow with us. Moreover, we also provide equity options for our top performers.
  • Holistic Growth: We foster a culture of continuous learning and take a much more holistic approach to train and develop our assets: the employees. We shall also support you all on that journey of yours.
  • Transparency: Being a part of a start-up is an amazing experience, one of the reasons being open communication & transparency at multiple levels. Working with Appknox will allow you to experience it all first-hand.


Read more
Stratogent Technology Services
Bengaluru (Bangalore)
10 - 15 yrs
₹15L - ₹25L / yr
Security Information and Event Management (SIEM)
IT security
Splunk
ArcSight
ITIL
+2 more

Position Title: Manager – Security Operations Organization /Function: Manager is responsible for day to day operational and project delivery for a set of customers Relevant Experience: 10+ years of experience in security area and at least 2 years as Security manager Educational Qualification: BE/B.Tech/ME/M.Tech/Graduate/Master in any stream with excellent academic record

Must-have Skills: • Must know common security policy frameworks and possess knowledge of how security programs are run at mid to large scale companies • Must have managed a team to deliver “Managed Security Service” or “Security Operations Center” • Prior working Background in either SIEM tools (Splunk, ArcSight, QRadar, DNIF etc.) or Vulnerability assessment and Management tool (Qualys/Rapid7) and process • Has broader context and understanding of managed security services • Must have service mindset and empathy. Must deal with a level of ambiguity, chaos and apparent stubbornness from customers, and manage around it by thinking through the issue or request from the customer’s perspective to drive to a reasonable conclusion • Must have prior experience on Project Management • Must have prior experience of onsite-offshore delivery model and should have directly worked with US/European customers or colleagues • Must have ITIL process knowledge

Read more
Emids Technologies

at Emids Technologies

2 candid answers
Kiranmai Badisetty
Posted by Kiranmai Badisetty
Bengaluru (Bangalore)
7 - 10 yrs
₹5L - ₹10L / yr
ISO/IEC 27001:2005
ISO/IEC 27000-series
CISA
CISM
Risk Management
+1 more

Experience:- Overall 10 to 12 years of experience of which atleast 5 to 7 years’ experience should be in Information Security. Mandatory is 5 to 7 years’ experience in Information security and with one full end to end implementation experience.

Base location: - Bengaluru - Must

Joining requirement: - Not later than second week of June 2023.


Requirements: -

1.      Mandatory - ISO 27001:2013 lead implementor certified

2.      Mandatory - ISO 27001:2013 lead auditor certified (but if it is a good candidate, we can still consider)

3.      Good to have – CISA, CISM, Risk management certification, Privacy certifications.

4.      Mandatory - Atleast one end to end implementation experience of ISO 27001 standard. The candidate should have a good implementation knowledge of ISO 27001, ISO 27002 standards and is required to implement the ISO requirements and run the ISMS program for multiple countries.

5.      This immediate requirement is for implementing the ISMS program for our Canadian office location. The candidate should be willing to work from Bengaluru in EST time zone during this implementation phase whenever required.

6.      Good documentation skills.

7.      Develop, implement, maintain, review and continually improve Information Security policies.

8.      Good understanding and knowledge of applicable legal and regulatory requirements as relevant to information security.

9.      Manage and maintain a risk register / risk database along with risk treatment plans.

10.  Good understanding of physical and environmental security.

11.  Conduct Internal Audits based ISO 27001 standards and Personal Data Protection policies. A good experience in independently conducting Internal and supplier audit with respect to information security.

12.  Provide training to the employees on Privacy & Information Security Management System on regular intervals.

13.  The greater part of the job involves interacting with people, interviewing them / auditing, Preparing audit reports, discussing / persuading / influencing.

14.  Mandatory: Good verbal and written communication skills. Eye for details.

15.  Good presentation skills.

16.  Since this is a trusted role, candidates must be willing to undergo extensive background checks to verify their identity, character, qualifications, skills and experience.

Read more
Octro Inc

at Octro Inc

1 recruiter
Akansha Gupta
Posted by Akansha Gupta
Noida
6 - 10 yrs
₹10L - ₹25L / yr
ISO 9000
IT security
Information security
Information security management system
Data security
+1 more

Roles and responsibilities:

- Audit the current Information Security system and procedures and do a Gap analysis

- Identify immediate potential Information Security Risks and manage remediation tasks through to closure

- Create an Information Security Compliance Roadmap and execute end-to-end compliance initiatives by that roadmap

- Design high-quality test plans and direct Data/Information security control test activities

- Continuously improve Octro Data/Information security control framework

- Maintain handbook pages and procedures related to Information security compliance

- Identify opportunities for Information security compliance control automation, execute them and then maintain

- Provide actionable and constructive advisement to cross-functional teams, including driving remediation activities for high and select moderate-risk Observations across all Octro departments

- Design, develop, and deploy scripts to automate continuous control monitoring, administrative tasks and metric reporting for all security compliance programs

- Direct and support external audits as and when necessary


Requirements


- A minimum of 6-8 years' experience working with Data/Information Security Compliance programs

- Detailed knowledge of common information security management frameworks, regulatory requirements and applicable standards such as: ISO, SOC 2, GDPR, PCI etc.


About Octro Inc :


We are one of the fastest-growing mobile gaming companies around, a technology-driven organization at heart, and take pride in the platforms we create.

Founded in 2006 with a mission to create productivity applications for Mobile Devices. After pioneering one of the first mobile Voice-over-IP infrastructures called OctroTalk, the company ventured into building mobile gaming platforms. Sequoia Capital has invested in Octro. The funding was announced in June 2014.

Read more
Rezo.AI
Aishwarya Srivastava
Posted by Aishwarya Srivastava
Noida
6 - 10 yrs
₹5L - ₹15L / yr
IT security
Data security
ISO 27001
ISO/IEC 27001:2005
Firewall
+2 more

About Us 

Rezo.ai is an AI-Powered Contact Centre that enables enterprises to enhance customer experience and boost revenue by automating and analyzing customer agent interactions across multiple channels including voice, email, chat/WhatsApp, and social, at the required scale, whilst training agents with minimal costs 


How do we do it 

Rezo’s AI-Powered contact center leverages ground-breaking technologies in AI, ML, ASR, NLP, RPA, and predictive intelligence to transform customer experience and reduce costs by automating, analyzing social media, whilst coaching them.


Overview

Providing leadership in the information security space, helping ensure ISO and GDPR certification, and establishing, maintaining, and enforcing our security policies. Working closely with our business and technology teams to ensure awareness and adherence to the policies and procedures established.

To ensure that the security solutions being designed and delivered are aligned with the enterprise security architecture, supporting the transition of the security architecture from its current to its planned future state.

To lead and provide strategic oversight to ensure and assure the beneficial and cost-effective security change across key accounts, through the evaluation of business strategies and requirements providing advice, guidance and assurance.


Role & Responsibility

  • Provide security advice and guidance to business and delivery teams ensuring solutions are consistent with the enterprise security roadmap whilst balancing business values and security risk.
  • Recommend changes to IT systems to bring them into compliance with security policy, standards, blueprints and roadmaps.
  • Influence stakeholders to adopt architecturally sound approaches to the management of risk.
  • Advise on the translation of business requirements into secure IT solutions and migration roadmaps.
  • Preparation and documentation of standard security operating procedures and protocols
  • Recommend technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks
  • Advise on alternate solutions and countermeasures to mitigate identified information risks.
  • Provide assurance that identified solutions or countermeasures mitigate identified information risks.
  • Write comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement
  • Implements security improvements by assessing the current situation; evaluating trends; anticipating requirements.
  • Keeps users and businesses informed by preparing performance reports; communicating system status, and owning security incidents when they arise.

 

Technical Skills Required

  • Proven experience in the design, implementation and operation of scaled IT security services and capabilities, ideally within a large government organization or complex large-scale multi-supplier organization.
  • Strong technical aptitude and exposure to ISO 27001 or similar-based security policies and standards.
  • Excellent communication skills, with the ability to articulate complex technical issues into business-focused terms and communicate with Stakeholders.
  • Knowledge of GDPR, its business implications and the merits of various technical approaches
  • Expertise in IT security risk in a business context
  • Exposure to web application security and penetration testing.
  • Exposure to securing the software development life cycle and to project management disciplines.
  • Excellent organizational and technical documentation skills.
  • Strong understanding of Information Security including threats, attacks, and vulnerability management.
  • Deep understanding of secure development practices, with practical experience of cyber security, privacy protection, cloud security, identity management, situations awareness, protective monitoring, security operations, risk management and reporting.
Read more
Gurugram
5 - 8 yrs
₹13L - ₹17L / yr
Archer
EMC RSA Archer
RSA
RSA Archer
GRC
+3 more
KRA:
  • Guiding team member for handling technical challenges
  • Conducting training sessions
  • Handling user issues and providing corrective solution
  • Fixing of the vulnerabilities and Upgrades of new stable version
  • Sustenance and maintenance of Archer tool
  • Good scripting knowledge

Desired Candidate Profiles:
  • Certified RSA Archer Professional, Internal Audit & Controls, Risk (Threat), ISO 27001
  • Minimum of 5 years’ experience in the respective field
  • Experience of managing a GRC Team
  • Strong experience of implementation, commissioning and enhancement of modules of GRC Product
  • Strong Understanding of Process workflows, Identifying the manual workflows
  • Expertise in configuring GRC tool (Archer)
  • Experience with all SDLC activities related to GRC program implementation
Read more
Chennai
4 - 7 yrs
₹1L - ₹10L / yr
skill iconPython
skill iconDjango
skill iconFlask
TCP/IP
Multiprotocol Label Switching (MPLS)
+4 more
  • Python with Powershell (who worked in Security related product Development(First Pref)/Networking.

 

Key Responsibilities

  • Collaborate in the design, implementation, and deployment of successful software applications in support of our Threat management platforms.
  • Developing backend components to enhance performance and receptiveness, server-side logic, and highly responsive web applications.
  • Performance tuning and automation of application.
  • Enhancing the functionalities of current software systems.
  • Understand system interdependencies and limitations.
  • Functionally decompose complex problems into simple, straightforward solutions.
  • Rightly estimate the task and take ownership of building production-ready software solutions.
  • Collaborate with other teams to implement features based on business rules and visual design.

Minimum qualification & experience

  • Engineering graduate.
  • 4 years of demonstrated professional experience in delivering and operating large-scale applications.
  • Strong software development skills in python including python frameworks like Django, Flask, etc.
  • Experience with software development, Web frameworks and database technologies, e.g., REST APIs, and automated scripts.
  • Experience with current development technologies, methodologies and workflows including CI/CD, Docker, Git, and Jenkins preferred.
  • Experience with microservice development and dockerized application development is a PLUS.
  • Strong knowledge of data structures, algorithms, operating systems, and distributed systems fundamentals.
  • Working familiarity with networking protocols (TCP/IP, HTTP) and standard network architectures.
  • Working familiarity with basic Linux administration.
  • https://ind01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcybersecurityguide.org%2Fcareers%2F&;data=05%7C01%7Cmadhvi.1%40neweraindia.com%7C71e5f8231a514be638bf08da656eee89%7Cc04e2addbf474beabf38e722114ec31f%7C0%7C0%7C637933824369629597%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=5ezbPi2xWTVZVsmDSzinf6eC37Mr6zWQpfivsSWa1A0%3D&reserved=0" target="_blank">Experience in the cybersecurity field especially with threat intelligence or security orchestration is a plus.
Read more
Bengaluru (Bangalore)
4 - 5 yrs
₹13L - ₹14L / yr
Internal audit
Audit
QMS
Information security
IT security
+1 more
Our client is the Health-tech initiative of India's largest business house. Started in 2015, it empowers healthcare providers and consumers in India. All healthcare monitoring services are made available through an app that will help connect doctors, hospitals, pharmacies, laboratories and consumers, enabling preventive and predictive healthcare. It helps the care-givers to track the entire patient journey from the initial appointment and maintaining their records, generating lab test reports to providing virtual consultation and home-care solutions. It is expected that this futuristic guide will strengthen doctor-patient relationship and enhance the in-clinic experience.
 
As a Associate/ Sr Associate-Information Security, you will be responsible for helping the management in creating IT policies and assisting the various processes and the management team to ensure adherence to the adopted policies and established procedures.

What you will do:

  • Working closely with the external auditors to achieve common goals
  • Conducting Enabling Service Audit (HR, Admin, IT) once in 6 months for the verification of ISMS & QMS Standards
  • Performing ISMS and Internal Audit
  • Being part of the external Audits (ISMS, QMS & CMMI)
  • Managing of implementation of ISMS

 

Desired Candidate Profile

What you need to have:

  • Strong communication and team building skills with proficiency at grasping new technical concepts quickly and utilizing the same in a productive manner
  • Experience in ISO27001, Internal Audits, CMMI    

 

Read more
Yext

at Yext

3 recruiters
Yash Rathod
Posted by Yash Rathod
Hyderabad
5 - 10 yrs
₹5L - ₹15L / yr
IT security
Information security
Security Information and Event Management (SIEM)
Scripting language
skill iconAmazon Web Services (AWS)
+1 more

Responsibilities:

The Senior Information Security Engineer is responsible for the implementation, execution and maintenance of technology solutions to mitigate risk, to protect the IT and Engineering environments by reducing the probability of, and to minimize the effects of, damage caused by malware, malicious activities and security events.

The individual will help protect the company by deploying, tuning, and managing security tools across the computing environment, as well as provide security incident response cycle support. They should have a passion and skills for identifying the latest cyber threats. The individual will:



Basic Qualifications

  • Working knowledge of infrastructure-as-code and CI/CD pipelines tools (i.e. Jenkins, Teamcity, CircleCI etc..)
  • Lead and participate in major day-to-day operational aspects of the security engineering team including improvement of current security controls while constantly identifying areas of needed improvement
  • Deep hands-on security experience with cloud providers, such as AWS, GCP, Azure
  • Understanding of automated security testing approaches and tools
  • Experience with proactive integration of security into the development process
  • Lead continuous improvement efforts of out security tools and systems (Concertation on SIEM, IDS, EDR Tools)
  • Work with our customers (Security Operations, Incident Response, and Product teams) to incorporate high quality security alerting into their operational workflows
  • Improve overall security practitioner efficiency through process automation
  • Foster and promote collaboration among all members of the IT, Infrastructure, and Risk Management Departments.


Minimum Qualifications/Requirements

  • BS or MS in Computer Science or related field
  • Minimum 7+ years of cybersecurity experience
  • Must have previous experience performing threat hunting and incident response duties using SIEM tools, cybersecurity management consoles, and ticketing systems
  • Experience in deployment, development, and maintenance of SIEM
  • Experience writing and using Ansible server administration scripts, and create simple Python, BASH, or Powershell scripts to automate cybersecurity functions
  • Scripting experience to automate security operations, alerting, and compliance checks, CI/CD design, deployment, and management
  • Experience with managing endpoint response and detection infrastructure and endpoints at the enterprise level, including performing upgrades to the back end application and deploying new agent versions to endpoints
  • Understanding the investigative process and performing triage for cybersecurity incidents
  • Experience maintaining industry leading security technologies or infrastructure systems in complex technical IT operations environment
  • Must be detail-oriented and organized with ability to handle competing demands while meeting deadlines
  • Experience in authentication protocols and frameworks to include OAuth, and AWS IAM
  • Proactive and motivated; team player with a positive can-do attitude
  • Strong analytical/problem-solving skills and cross-functional knowledge across multiple IT operational and security disciplines
  • Ability to communicate technical concepts to a broad range of technical and non-technical staff
  • Must possess a high degree of integrity, be trustworthy, and have the ability to lead and inspire change
Read more
MNC
Bengaluru (Bangalore)
4 - 6 yrs
₹2L - ₹10L / yr
Requirement Analysis
IT security
Information security
IT security assessment
  • Threat and vulnerability analysis.
  • Investigating, documenting, and reporting on any information security (InfoSec) issues as well as emerging trends.
  • Analysis and response to previously unknown hardware and software vulnerabilities.
  • Preparing disaster recovery plans.

SOC analysts are considered the last line of defense and they usually work as part of a large security team, working alongside security managers and cybersecurity engineers. Typically, SOC analysts report to the company’s chief information security officer (CISO).

SOC analysts need to be detail oriented because they are responsible for monitoring many aspects simultaneously. They need to watch the protected network and respond to threats and events. The level of responsibility typically depends on the size of the organization.

Read more
Top 3 Fintech Startup
Agency job
via Jobdost by Sathish Kumar
Bengaluru (Bangalore)
3 - 5 yrs
₹6L - ₹8L / yr
Vendor Management
IT security
Firewall administration
EPM
Antivirus
+3 more
Job Responsibilities:

Technical Support Operations
  • Infrastructure support and escalation management
  • Effective management of infrastructure
  • Proactive maintenance of Infrastructure at branches and HO
  • Timely closure of tickets with in SLA
Network Management
  • Maintaining 100% uptime of Network.
  • Proactive monitoring maintenance of network and Internet bandwidth
Asset Management
  • Maintaining the working condition of the IT assets.
  • Preparing the IT assets for the new joinees in a timely and effective manner.
IT Projects
  • On-time execution of assigned projects;
  • Proper utilization of the existing and newly added infra tools and assets. i.e EPM, Antivirus, etc.
IT Compliance & Security
  • Ensure the regular Security measures are taken on the infrastructure.
  • Ensure the process adherence as per IT Policies

Qualifications:
  • 3 + years of overall experience in IT Infrastructure domain.
  • Degree in Computer Sciences / IT or equivalent

Other Requirements:
  • Keen interest in experimenting with new Technology/gadgets/systems
  • Should take the responsibility for Infrastructure needs and fulfill the same
  • Should be a great team player and a good manager
  • A great multitasker who should be able to work in a demanding environment
  • Should be well connected with the vendor community
  • Strong written and oral communication and interpersonal skills
  • Must have a go-getter attitude.
  • High social responsibility & Integrity
  • Compliance twitho policies, rules, and regulations
  • Belief in Teamwork & Effective leadership

Technical Skills
  • Good Knowledge on the end point infra support and server support
  • Good Knowledge on IT security
  • Linux, Windows OS knowledge
  • Good knowledge on Networking and network security


Soft Skills
  • Escalation handling
  • Vendor management
  • Good Decision making skill
Read more
DataMetica

at DataMetica

1 video
7 recruiters
Sumangali Desai
Posted by Sumangali Desai
Pune
6 - 10 yrs
₹10L - ₹20L / yr
Cloud Computing
IT infrastructure
VPN
Firewall
IT security
+8 more

Experience: 6+ years

Location: Pune

 

Lead/support implementation of core cloud components and document critical design and configuration details to support enterprise cloud initiatives. The Cloud Infrastructure Lead will be primarily responsible for utilizing technical skills to coordinate enhancements and deployment efforts and to provide insight and recommendations for implementing client solutions. Leads will work closely with Customer, Cloud Architect, other Cloud teams and other functions.


Job Requirements:

  • Experience in Cloud Foundation setup from the hierarchy of Organization to individual services
  • Experience in Cloud Virtual Network, VPN Gateways, Tunneling, Cloud Load Balancing, Cloud Interconnect, Cloud DNS
  • Experience working with scalable networking technologies such as Load Balancers/Firewalls and web standards (REST APIs, web security mechanisms)
  • Experience working with Identity and access management (MFA, SSO, AD Connect, App Registrations, Service Principals)
  • Familiarity with standard IT security practices such as encryption, certificates and key management.
  • Experience in Deploying and maintaining Applications on Kubernetes
  • Must have worked on one or more configuration tools such an Terraform, Ansible, PowerShell DSC
  • Experience on Cloud Storage services including MS SQL DB, Tables, Files etc
  • Experience on Cloud Monitoring and Alerts mechanism
  • Well versed with Governance and Cloud best practices for Security and Cost optimization 
  • Experience in one or more of the following: Shell scripting, PowerShell, Python or Ruby. 
  • Experience with Unix/Linux operating systems internals and administration (e.g., filesystems, system calls) or networking (e.g., TCP/IP, routing, network topologies and hardware, SDN)
  • Should have strong knowledge of Cloud billing and understand costing of different cloud services 
  • Prior professional experience in IT Strategy, IT Business Management, Cloud & Infrastructure, or Systems Engineering

 

Preferred 

  • Compute: Infrastructure, Platform Sizing, Consolidation, Tiered and Virtualized Storage, Automated Provisioning, Rationalization, Infrastructure Cost Reduction, Thin Provisioning
  • Experience with Operating systems and Software
  • Sound background with Networking and Security 
  • Experience with Open Source: Sizing and Performance Analyses, Selection and Implementation, Platform Design and Selection
  • Experience with Infrastructure-Based Processes: Monitoring, Capacity Planning, Facilities Management, Performance Tuning, Asset Management, Disaster Recovery, Data Center support

 

About Us!

A global Leader in the Data Warehouse Migration and Modernization to the Cloud, we empower businesses by migrating their Data/Workload/ETL/Analytics to the Cloud by leveraging Automation.

 

We have expertise in transforming legacy Teradata, Oracle, Hadoop, Netezza, Vertica, Greenplum along with ETLs like Informatica, Datastage, AbInitio & others, to cloud-based data warehousing with other capabilities in data engineering, advanced analytics solutions, data management, data lake and cloud optimization.

 

Datametica is a key partner of the major cloud service providers - Google, Microsoft, Amazon, Snowflake.

 

We have our own products!

Eagle – Data warehouse Assessment & Migration Planning Product

Raven – Automated Workload Conversion Product

Pelican - Automated Data Validation Product, which helps automate and accelerate data migration to the cloud.

 

Why join us!

Datametica is a place to innovate, bring new ideas to live and learn new things. We believe in building a culture of innovation, growth and belonging. Our people and their dedication over these years are the key factors in achieving our success.

 

Benefits we Provide!

Working with Highly Technical and Passionate, mission-driven people

Subsidized Meals & Snacks

Flexible Schedule

Approachable leadership

Access to various learning tools and programs

Pet Friendly

Certification Reimbursement Policy

 

Check out more about us on our website below!

www.datametica.com

Read more
Hyderabad
7 - 12 yrs
₹10L - ₹18L / yr
IT security
Security Information and Event Management (SIEM)
SSL
BCP
Information security
+3 more
Job Description
IT Security Manager- 8-12 Years

NOTE - We are looking for those candidates who can join immediately or within 15-20 days of the notice period.
Key Responsibilities:
• Lead IT security projects including design and implementation of security infrastructure &software
• Experience working with Linux/UNIX administration"

• Define next gen IT security strategy, architecture, and processes for the group
• Analyse business requirements by partnering with key stakeholders across the organization to develop security solutions
• Lead validation of BCP & DR as per the organizational needs
• Experience with framing apolicies, processes and procedures and their implementation of IT Security for both On premise and Cloud infrastructure
• Write or review security-related documents, such as incident reports, proposals, and tactical or strategic initiatives.
• Maintain and manage security for all existing and new IT infrastructure and Applications
• Monitor security performance of information technology systems to drive cost and productivity levels, and to make recommendations for improving & standardization of the IT infrastructure
• Develop strategies for infra and application hardening
• Hands on experience with implementation of various security products & infrastructure
• Testing, troubleshooting, and modifying and ensure no performance impact on the systems so that they operate effectively
• Prepare plan and strategies to ensure security of the organization including both high and low risk events.
• Develop budgets for security operations and new initiatives.
• Coordinate security operations, Audit & Compliance activities along with law enforcement and government agencies.
• Ensure completeness of documentation and have exposure to ISO 27001, ISMS policies
• Work with key IT service providers to ensure industry standard platform, network and endpoint security posture
Key Skills required:
• Critical Infrastructure Management- (Manage SPI, Certification resources and infrastructure)
• WAF – Barracuda, Cloudflare, Akamai
• Cloud Security – AWS and Azure are preferred
• Work with Software and teams in resolving vulnerabilities
• SSL and PKI infrastructure management
• SIEM – Event Management, Endpoint Management, Threat analysis, patch Management
• Anti-Virus (VDC and Global Endpoints)- Web content filtering, Definition updates,
• Time Monitoring – system health checks and resource utilization checks, SIEM log analysis
• Log Monitoring and Log Analysis – collect, alert, store, search, report and share system and WAF logs
• Manage compliance – PCI, ISO
• Ability to work in global environments with teams spread globally
• Multi-tasking and time-management skills, with the ability to prioritize tasks.
• Highly organized and detail oriented.
• Excellent analytical and problem-solving skills.
• Experience with framing policies, processes and procedures and their implementation of IT Security for both On premise and Cloud infrastructure
experience with policies
• blue team (any experience with defending the network)
any experience with vulnerability assessment and PT
Read more
Hyderabad
2 - 3 yrs
₹7L - ₹8.5L / yr
IT security
Security Information and Event Management (SIEM)
WAF
Firewall
security
+3 more
JOB TITLE : INFORMATION SECURITY Engineer

NOTE- we are looking for hose who can join  immediately or within notic period of 15-20days.
location_;Hyderabad
(wfh till pandemic)
JOB DESCRIPTION
• Job Scope
o Analyse incident in our security devices, conducting investigation and finding the
root cause of incidents.
o Managing endpoint detection security system
o Managing, configuration and fine tuning of on-prem firewall and WAF
o Provide and advise IT team on security and IT related issues such as network
configuration, firewall configuration, etc
o Ensuring all utilized cloud services are secured and the configuration comply to best
practices benchmark
o Communicate risk and recommendations to mitigate risk to the senior
administration by communicating in non-technical format
o Assists other department to ensure regulatory compliance to any necessary
compliance
• Minimum Requirements
o At least 2 years of experiences in managing endpoint detection system, WAF and
FW.
o Hands on experience on cloud environment preferably Microsoft Azure.
o Bachelor’s degree of any IT related courses.
o Strong understanding of incident detection and response process and procedure
o Strong knowledge in networking and in operating system such as
Linux/Unix/Windows
Read more
Virtual Engineering Services Pvt Ltd
Abha Sachdeva
Posted by Abha Sachdeva
NCR (Delhi | Gurgaon | Noida)
3 - 5 yrs
₹4L - ₹8L / yr
OWASP
Vulnerability assessment
Web application security
Penetration testing
IT security
+11 more

IT Security Specialist

 

 

Roles and Responsibilities

  • Extensive experience of 2-5 years in Vulnerability Assessment and Penetration testing, Web Application security.
  • An Experience in performing web application security assessments using hands on techniques for identifying SQL injections, XSS, CSRF, authentication/authorization, OWASP top 10 issues.
  • Must have working experience in OWASP Top 10 Vulnerabilities Testing in Web applications.
  • Create policy and standards for developers and testers to secure programming in the organization. (secure code review, static application security testing.
  • Experience on both commercial and open source tools Cenzic Hailstorm, Burpsuite, AppScan, WebInspect, Appspider, sqlmap, OWASP ZAP. Assessing cloud security risk (AWS and Azure) and recommending appropriate security controls.
  • Ability to interact with project teams to understand the security requirements and come up with solutions
  • Extensive knowledge of managing Web Application Firewall (Product) including rules management and product administration
  • Strong understanding of networking concept.

 

Desired Candidate Profile

 

  • Excellent knowledge of Microsoft Windows operating environments and with special attention to security and hardening issues.
  • Able to work independently with minimal supervision.
  • Good knowledge of secure software development standard, process, techniques, cloud security policies and tools.
  • Keep stakeholders updated with communications and weekly reporting.
  • Collaborate with Security Platform and Services teams to build and integrate existing security solutions.
  • Excellent communication skills - written, verbal, presentation and interpersonal.
  • Willing to learn new skills and implement new technologies.
  • Should come with bachelor’s degree in engineering, mathematics or master’s in computer application / programing.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Read more
Hostcode LAB

at Hostcode LAB

1 recruiter
Rakhi Dhar
Posted by Rakhi Dhar
Remote, Bhubaneswar
1 - 2 yrs
₹3L - ₹5L / yr
Sales
Inside Sales
Business Development
IT security
Lead management

About Hostcode LAB Technologies: Hostcode LAB is an IT and Information Security startup, empowering the businesses to grow online with the latest cloud technologies, Web/mobile app Security Solutions, Customized web/mobile application development along with Internet marketing solutions.
As a business development executive in Hostcode LAB, you will be responsible to research client business referrals, network, and web leads; provide prospective customers/clients with all services offered and additional presentations as needed, and work with clients to create solutions for their needs and consult throughout the sales process. Must be energetic, well-spoken, and eager to close sales and increase revenue.

Responsibilities and Duties

  • Identifying, qualifying, and securing business opportunities; coordinating business generation activities; developing customized targeted sales strategies.
  • Building business relationships with current and potential clients.
  • Understanding client needs and offering solutions and support; answering potential client questions and follow-up call questions; responding to client requests for proposals (RFPs)
  • Creating and maintaining a list/database of prospect clients; maintaining a database (Hubspot, CRM, Excel, etc.) of prospective client information.
  • Cold calling; making multiple outbound calls to potential clients; closing sales and working with the client through the closing process.
  • Meeting all quotas for cold, active, inactive calls, appointments, and interviews; meeting or exceeding monthly sales goals.

Requirements and Qualifications

  • Experience with lead generation and prospect management.
  • Excellent verbal and written communication skills; the ability to call, connect, and interact with potential customers.
  • Excellent in Bidding on freelancing platforms.
  • Persuasive and goal-oriented.
  • Possesses an energetic, outgoing, and friendly demeanor.
  • Able to professionally and confidently communicate with C-Level Executives
  • Two years of cold calling experience; s sales experience; knowledge of sales process from initiation to close.
  • Excellent analytical and time-management skills
  • Demonstrated and proven sales results.
  • Excellent understanding of IT industry and software products and services.
  • Ability to work independently or as an active member of a team

Experience :

  • Client Acquisition: Min 1 year ( Preferred)
  • Lead Management: Min 1 year ( Preferred )**

**

  • Education: MBA ( Preferred)
  • Language: English (Preferred )**

Benefits

  • Incentives on reaching sales targets.

Location: Bhubaneswar.
Designation: Business Development Executive.

Job Types: Full-time, Commission

Experience:

  • total work: 1 year (Required)
  • business development: 1 year (Required)

Education:

  • Bachelor's (Preferred)

Location:

  • Bhubaneshwar, Orissa (Preferred)

Language:

  • English (Preferred)

Shifts:

  • Morning (Preferred)

Required Assets:

  • Two-wheeler (Preferred)

Industry:

  • Software Development
Read more
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Why apply via Cutshort?
Connect with actual hiring teams and get their fast response. No spam.
Find more jobs
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort