Cutshort logo
Physical security Jobs in Bangalore (Bengaluru)

11+ Physical security Jobs in Bangalore (Bengaluru) | Physical security Job openings in Bangalore (Bengaluru)

Apply to 11+ Physical security Jobs in Bangalore (Bengaluru) on CutShort.io. Explore the latest Physical security Job opportunities across top companies like Google, Amazon & Adobe.

icon
Rapidly growing fintech SaaS firm that propels business grow

Rapidly growing fintech SaaS firm that propels business grow

Agency job
via Jobdost by Mamatha A
Bangalore
5 - 10 yrs
₹15L - ₹30L / yr
Information security
ISO/IEC 27001:2005
HIPAA
Systems Development Life Cycle (SDLC)
Physical security
+7 more

What are we looking for?

An enthusiastic individual with the following skills. Please do not hesitate to apply if you do not match all of it. We are open to promising candidates who are passionate about their work and are team players.

Key Responsibilities & expectations from the candidate 

  • Must have strong experience in Information Security Management system(ISMS), creation of policy, procedures and implementation.
  • Operates as a key contributor to the RFP, Third-Party Risk assessment, cloud security assessment etc.
  • Lead the strategic and tactical development of information security framework, risk management and new compliance initiatives
  • Subject matter expertise in ISO 27001, SOC2, CCPA, CPRA, GDPR, PCI DSS and HIPAA.
  • Must have a strong experience in the documentation process and reviewing MSA, SCC, SLA & DPA.
  • Good knowledge of BCP/DR, Incident response, VA/PT and Audit methodologies of various compliance frameworks.
  • Good knowledge of Access management, Network, Application Security, Encryption, Backup, Physical Security, ISMS Training & Awareness etc..
  • Ability to deal with the customers and vendors on Security and privacy matters.
  • Knowledge of Core IT processes, SDLC, network infrastructure will be useful.

Personal Attributes

  • Good written, oral, and interpersonal communication skills.
  • Ability to conduct research into IT security issues
  • Ability to present ideas in business-friendly and user-friendly language.
  • Ability to effectively prioritize and execute tasks in a high-pressure environment.
  • Highly self-motivated and hardworking.

Qualification and certification 

  • Bachelor’s/master's degree in Security, Computer Science, Management Information Systems, Engineering or related field.
  • Should be at least ISO 27001 lead auditor or lead implementer. 
  • 3+ years of related work experience in information security governance, risk and compliance (GRC) or relevant compliance roles in the SaaS industry.

What can you look for?

A wholesome opportunity in a fast-paced environment that will enable you to juggle between concepts, yet maintain the quality of content, interact, and share your ideas and have loads of learning while at work. Work with a team of highly talented young professionals and enjoy the benefits of being here.

We are

It is a rapidly growing fintech SaaS firm that propels business growth while focusing on human motivation. Backed by Giift and Apis Partners Growth Fund II, Company offers a suite of three products - Plum, Empuls, and Compass. Company  works with more than 2000 clients across 10+ countries and over 2.5 million users. Headquartered in Bengaluru, Company  is a 300+ strong team with four global offices in San Francisco, Dublin, Singapore, New Delhi.

Way forward

We look forward to connecting with you. As you may take time to review this opportunity, we will wait for a reasonable time of around 3-5 days before we screen the collected applications and start lining up job discussions with the hiring manager. We however assure you that we will attempt to maintain a reasonable time window for successfully closing this requirement. The candidates will be kept informed and updated on the feedback and application status.

 
Read more
Upswing Financial Technologies Private Limited

at Upswing Financial Technologies Private Limited

2 candid answers
4 recruiters
Simran Bindra
Posted by Simran Bindra
Bengaluru (Bangalore)
3 - 6 yrs
Best in industry
Linux/Unix
Linux administration
Information security
Network Security
skill iconDocker
+4 more

At Upswing, we are committed to building a robust, scalable & secure API platform to power the world of Open Finance.

We are a passionate and self-driven team of thinkers who aspire to build the rails to connect the legacy financial sector with financial innovators through a simple and powerful banking-as-a-service (BaaS) platform.

We are looking for motivated engineers who will be working in a highly creative and cutting-edge technology environment to build a world-class financial services suite.

 

About the role

As part of the DevSecOps team at Upswing, you will get to work on building state-of-the-art infrastructure for the future. You will also be –

  • Managing security aspects of the Cloud Infrastructure 
  • Designing and Implementing Security measures, Incident Response guidelines 
  • Conducting Security Awareness Training
  • Developing SIEM tooling and pipelines end to end for vulnerability/security/incident reporting 
  • Developing automation and performing routine VAPT for Network and Applications
  • Integrating with 3rd party vendors for the services required to improve security posture 
  • Mentoring people across the teams to enable best practices 

What will you do if you join us?

  • Engage in a lot of cross-team collaboration to independently drive forward DevSecOps practices across the org 
  • Take Ownership of existing, ongoing, and future DevSecOps initiatives 
  • Plan and Engage in Architecture discussions to bring in different angles (especially security angles) to the table
  • Build Automation stack and tools for security pipeline 
  • Integrate different security measures and pipelines with the SIEM tool
  • Conducting routine VAPT using manual and automated workflows, generating and maintaining the report for the same
  • Introduce and Implement best practices across teams for a great security posture in the org

 

You should have

  • Curiosity for on-the-job learning and experimenting with new technologies and ideas
  • A strong background in Linux environment
  • Proven experience in Architecting networks with security first implementation
  • Experience with VAPT tooling for Networks and Applications is required 
  • Strong experience in Cloud technologies, multi-cloud environments, and best practices in Cloud 
  • Experience with at least one scripting language (Ruby/Python/Groovy)
  • Experience in Terraform is highly desirable but not mandatory
  • Some experience with Kubernetes, and Docker is required 
  • Understanding Java web applications and monitoring them for security vulnerabilities would be a plus 
  • Any other DevSecOps-related experience will be considered


Read more
Emids Technologies

at Emids Technologies

2 candid answers
Darshan K
Posted by Darshan K
Bengaluru (Bangalore)
7 - 14 yrs
Best in industry
Information security
Implementation
Risk Management
Cyber Security
ISO 27001:2013
+7 more

Experience:- Overall 10 to 12 years of experience of which atleast 5 to 7 years’ experience should be in Information Security. Mandatory is 5 to 7 years’ experience in Information security and with one full end to end implementation experience.

Base location: - Bengaluru - Must

Requirements: -

  1. Mandatory - ISO 27001:2013 lead implementor certified
  2. Mandatory - ISO 27001:2013 lead auditor certified (but if it is a good candidate, we can still consider)
  3. Good to have – CISA, CISM, Risk management certification, Privacy certifications.
  4. Mandatory - Atleast one end to end implementation experience of ISO 27001 standard. The candidate should have a good implementation knowledge of ISO 27001, ISO 27002 standards and is required to implement the ISO requirements and run the ISMS program for multiple countries.
  5. This immediate requirement is for implementing the ISMS program for our Canadian office location. The candidate should be willing to work from Bengaluru in EST time zone during this implementation phase whenever required.
  6. Good documentation skills.
  7. Develop, implement, maintain, review and continually improve Information Security policies.
  8. Good understanding and knowledge of applicable legal and regulatory requirements as relevant to information security.
  9. Manage and maintain a risk register / risk database along with risk treatment plans.
  10. Good understanding of physical and environmental security.
  11. Conduct Internal Audits based ISO 27001 standards and Personal Data Protection policies. A good experience in independently conducting Internal and supplier audit with respect to information security.
  12. Provide training to the employees on Privacy & Information Security Management System on regular intervals.
  13. The greater part of the job involves interacting with people, interviewing them / auditing, Preparing audit reports, discussing / persuading / influencing.
  14. Mandatory: Good verbal and written communication skills. Eye for details.
  15. Good presentation skills.
  16. Since this is a trusted role, candidates must be willing to undergo extensive background checks to verify their identity, character, qualifications, skills and experience.
Read more
Bengaluru (Bangalore)
4 - 10 yrs
₹11L - ₹20L / yr
IT security audit
ISO/IEC 27001:2005
ISMS implementation

1) Determine client needs and expectations and participate in the development of the overall client service plan. Analyse, develop, and implement information security programs, including organizational design and key processes for our clients as per plans

2)Design and develop cyber security strategies and programs for large and complex organizations

3)Define and implement cyber risk management structures, governance models, organizational transformations in the areas of cyber security

4)Develop security policies, processes, procedures. Map controls and compliance requirements. Responsible for risk assessments, gap analysis (against standards and benchmarks), risk mitigation strategy development.

4)Roll out the GRC Cybersecurity controls framework while balancing the approach with end user experience and compliance

5)Develop and tailor approaches, methods and tools to support clients cyber risk programs and initiatives

6)Provide strategic and operational advice in the areas of safeguarding critical information. Identify areas requiring improvement in the client's business processes to enable preparation of recommendations. 7)Evaluate, implement and operationalize security controls, define metrics for measure performance and establish a framework for continuous monitoring and improvement and Play substantive role in internal and external client relationship and communication

8)Interact with CxOs to define the roadmap for GRC strategy.

9Help build Cyber Transformation practice by getting involved in areas beyond engagement delivery such as pre-sales, RFP response, solution designing, competency development and Go to market strategies

10)Create or help create though leadership content in the emerging areas of Cyber Strategy and Risk Transformation .


Immediate Joiners

Read more
IT services provider based out of the US

IT services provider based out of the US

Agency job
via Jobdost by Mamatha A
Bengaluru (Bangalore)
3 - 5 yrs
₹15L - ₹22L / yr
VA/PT
VAPT
IT security
Information security
Security audit
+6 more

Job description Senior Security Consultant

Roles and Responsibilities

Company will provide a professional opportunity to work in a dynamic environment where you will have the ability to develop process and Cyber security based skills

 

Work profile of individual

  • cyber security consulting team, individual’s primary role would be to get to the heart of customer issues, diagnose problem areas, design innovative solutions and facilitate deployment resulting in client delight.
  • Will own and / Manage ISMS / ISO 27k projects IT audits, ITGC audits, SSAE, SOC audits, IT Process Audit, Systems Audit, Gap assessment TPRM, GDPR, Infosec, GRC , ISMS , Cyber Security, SOX ITGC on customer engagements
  • Will address all aspects of security like physical, logical, data, access etc and review Information Security policy and suggest / recommend necessary changes to the same on customer engagements
  • Will be an active participant in internal / third party system security reviews and audits on customer engagements
  • Will be an active participant in technical audits like VA / PT
  • Will perform internal audits on all aspects of IT and ensure compliance with the prescribed security norms on customer engagements and will be responsible for tracking the open audit findings and closure of the same
  • Will be responsible for implementation of new projects under Information Security Domain
  • Will be able to manage document tracking and updating - policies, processes, procedures, templates, etc.
  • Will plan the activities of configuration, conduct conference room pilots and will assist in resolving any queries related to requirements and Security control Design
  • Will develop a proposal by owning parts of the proposal document and by giving inputs in solution design based on areas of expertise.
  • Will engage with clients and(or) application development teams for implementation of cyber security & data privacy by design and data protection controls.
  • Will support the clients with ongoing design, implementation and maintenance of the data privacy framework for managing data protection risk including responding to legislation, devising and owning policies and training.
  • Will demonstrate ability to clearly and concisely communicate the privacy implications of technology and implementation.

 

Team work

  • Individual would be responsible for contributing to a strong team environment and promoting a positive working relationship with their colleagues.
  • Individual would predominately work with off-shore engagement teams and relevant  teams on presale and cyber security delivery.
  • Communication, written and verbal, with these teams would be expected.
  • Team members would be required to apply learning from trainings and on the job experience to work requests and support continuous process improvement.
  • Team members would be required to handle multiple tasks at the same time.
  • Detailed focus when performing work and good project management skills when managing workload and maintaining timelines will be necessary.

Desired Candidate Profile

  • Bachelors
  • Certifications (ISO 27001/ ISO 31000/ CISA/ CISSP/ CSX or equivalent and other relevant qualification/certification
  • Experience : 8-10 years

Knowledge Required:

  • Strong knowledge of information security concepts, risk and controls concepts. Strong understanding of security principals: audit, policies, guidelines, and compliance.
  • Deep understanding of infrastructure (data centre, network end user computing) security / cloud security / managed security services / security operations centre / compliance risk management and ITGC controls
  • Good understanding of technical security like network security, operating system, encryption, use of tools and technologies for various processes like logical access control, network security, security monitoring etc.
  • Sound knowledge of Internal Controls and Compliance. Must be able to recommend controls around people, process, and technology.
  • Sound knowledge on IT controls (especially IT risks). Good experience with control assessment, check the effectiveness of the implemented controls and recommend mitigation / improvements.
  • Good knowledge on Privacy, Governance and reporting
  • Experience with the Microsoft Office suite of products (i.e. Word, Excel, PowerPoint, Visio, etc.),
  • Strong verbal and written communication skills Knowledge / experience in fields of ITGC audits, Internal Audit, External Audit / Statutory Audit projects
  • Candidates should exhibit good client service skill collateral's with a strong focus on building relationships.

 

Additional Responsibilities:

 

  • Ability to develop value-creating strategies and models that enable clients to innovate, drive growth and increase their business profitability
  • Good knowledge on software configuration management systems and license Management systems
  • Awareness of latest technologies and Industry trends
  • Logical thinking and problem solving skills along with an ability to collaborate
  • Understanding of the financial processes for various types of projects and the various pricing models available
  • Ability to assess the current processes, identify improvement areas and suggest the technology solutions
  • One or two industry domain knowledge
  • Client Interfacing skills
  • Project and Team management
Read more
technoforte software pvt. ltd.
Hema Chandwani
Posted by Hema Chandwani
Bengaluru (Bangalore)
5 - 8 yrs
₹9L - ₹15L / yr
Shell Scripting
Cyber Security
Endpoint protection
Web application security
Information security
+1 more

Desired Skills

To have skills:

·       Proven technical expertise in cyber security domains, i.e. endpoint security, application security testing.

·       Knowledge and experience in public cloud solutions.

·       Knowledge on network security, networking concepts and architectural implementations.

·       Knowledge on vulnerability testing and define proper remediation’s.
Experience with application, database, and infrastructure security.

·       Shell scripting experience - Shell/Bash/Python.

·       Working experience of Linux operation.

 

Desire to have skills:

·       One or more of the following cyber security certifications: CEH, CISSP, OSCP, SSCP  CCSP.

·       Excellent problem solving, and follow-up skills.

·       Ability to convey technical security concepts to non-technical audiences.

Read more
travelopia UK

travelopia UK

Agency job
via Recruitment RIghtt by Harish Rajan
Bengaluru (Bangalore)
8 - 9 yrs
₹10L - ₹15L / yr
IT security
Network Security
Information security
Cyber Security
Security Information and Event Management (SIEM)
+5 more

What you will be doing:

  • Participate in network and security initiatives, network designs, project plans, and deployments as well as coordinating technical issues with vendors and internal teams
  • Contribute to design, installation, maintenance, vulnerability remediation, and monitoring of network and security systems
  • Responsible for expert-level troubleshooting of any problems relating to global issues - participation in security incident management and response.
  • Providing support and guidance to Technology teams across network and security technologies.
  • Adhere to IT access-management incident response and change control procedures (ITIL)
  • Continuous documentation of the IT network infrastructure including technical specifications, design documents, roll-out, and disaster recovery plans


What we are looking for:

 

A Network Security engineer with a solid comprehensive background in:

  • Ability to manage, supervise and delegate multiple tasks
  • Strong experience with SIEM and log management
  • EDR (Endpoint Detection and Response - especially in Microsoft ATP, Defender or SentinelOne) configuration and management.
  • Vendor management; including SOC (Security Operations Centre) providers
  • Global Security Incident management support
  • Experience in SD-WAN (Meraki) management and troubleshooting
  • Knowledge of network security, hardening network equipment, and vulnerability scans
  • Experience in Microsoft security and endpoint management tooling such as MCAS and MEM
  • Excellent troubleshooting skills. Ability to rapidly identify respond to and resolve issues
  • Proven experience in remote access technologies (ZScaler an advantage)
  • Excellent communication skills (written and verbal).
  • An ability to work under pressure and take ownership of tasks and customer issues.
  • Ability to work individually and as part of a global Infrastructure Technology team with regional teams in India, UK and North America.
Read more
A leading IT company

A leading IT company

Agency job
via Sanguine Global by khyati pareek
Bengaluru (Bangalore)
2 - 5 yrs
₹6L - ₹12L / yr
Information security
ISO/IEC 27001:2005
HIPAA

The Role

We are looking foran Information Security Analyst – Compliance to primarily strengthen our practice towards compliances such as HIPAA, HITRUST,etc. and ensure highest levels of security around sensitive data.

  • Identifying new risks and performing risk assessments.
  • Performing continuous gap analysis.
  • Auditing the applications, configurations, and internal practices against standards such as HIPAA, HITRUST etc.
  • Providing advice and implementing forward-thinking information security policies, procedures, and standards.
  • Assisting several teams (internal and external) with best practicesand security consultations.
  • Supporting with other information security activities as assigned.
  • Ensuring the organizational compliance during audits and certification efforts.

Requirements:

  • Demonstrated experience in implementing and maintaining security standards such as HIPAA, HITRUST, SOC2, ISO 27001 etc.
  • Ability to understand and interpret legal, regulatory, and contractual compliance requirements.
  • Experience in InfoSec policy creation and documentation.
  • Ability to understand technology and pertaining risks.
  • Knowledge on IT, Servers, SDLC, Database, etc.
  • Experience working with / securing cloud-based applications is an add-on.
  • 2+ years of experience.
  • Excellent written and verbal communication skills.
  • Relevant Security Certifications will be a good add-on.
Read more
Vendor To Pay Private Limited
Somil Nanda
Posted by Somil Nanda
Bengaluru (Bangalore)
4 - 6 yrs
₹8L - ₹12L / yr
DevOps
Microsoft Windows Azure
Microsoft Windows Server
Network Security
CI/CD

Key Duties & Responsibilities -

  • Design and Build cloud architecture/infrastructure
  • Provision, maintain and administer MS Azure Cloud Environment
  • Windows server administration.
  • Implement and maintain cloud monitoring, auditing and network management functions.
  • Optimize the processes for cloud-based data storage, backups and restores.
  • Implement cloud security to protect data, applications, and infrastructure.
  • Develop, maintain, and execute Configuration Management scripts.

Skills required

  • Experience in server hardening best practices
  • Knowledge of special security arrangements like Network security, DoS Protection, OS firewall, etc
  • Ability to work with software firewalls and web application firewalls
  • Log management and replication to a central server
  • Ability to architect a secure deployment in Azure/Aws cloud using the native abstractions and services provided by respective cloud service providers.
  • Ability to conduct a self VAPT of the network and servers, so that the environments are better prepared for external audits by customers' info sec teams and/or auditors.
  • Ability to use DevOps automation to setup environments from scratch and also patch them from time to time to handle the changes resulting out of various factors e.g. VAPT audits, customer requests
  • Experience building solutions using MS Azure DevOps.
  • Knowledge of general networking concepts (e.g., DNS, TCP/IP, and firewalls).
  • Experience development & maintenance of a CI/CD system.
  • In-depth knowledge of build and deployment automation technologies.
  • An attitude and ability to take ownership and deliver a high-quality product, on time.
  • Experience of implementing DevOps
  • Experience in DevOps Architectural decisions, tools selection, best practices.
  • Constant research and learning on new tools and technologies in DevOps space.
Read more
One of the world top Product/Consulting company

One of the world top Product/Consulting company

Agency job
via Myna Solutions by Preethi M
Hyderabad, Pune, Bengaluru (Bangalore)
10 - 16 yrs
₹15L - ₹30L / yr
Network Security
Security
Web application security
skill iconJava
skill iconPython
- 10+ Years of experience in a technical position helping enterprise customers.

- 5+ Years of leading an engagement.

- 5+ Years developing and implementing security operations and technology in large, complex enterprises in multiple industry verticals, across a wide range of technology platforms.

- 4+ Years on any Cloud Platform (AWS, Azure, Google, others).

- Master's or Bachelor's degree in Information Science / Information Technology, Computer Science.

- Deep hands-on experience leading the design, development and deployment of business software at scale.

- Experience with service-oriented architectures, private and public clouds and web services security.

- Strong skills in security principles such as least privilege access, defense in depth, preventative vs detective controls, Infrastructure and Network Security, Data protection, and Incident response.

- Professional experience and good technical knowledge of application security, system security, network security, authentication/authorization protocols, and cryptography.

- Experience advising customers on architectures meeting industry standards such as PCI DSS, ISO 27xxx, SOC, HIPAA, GDPR, and NIST/DoD frameworks.

- Experience with enterprise risk management methods and techniques to drive successful outcomes in a global enterprise environment.

- Good understanding of Enterprise Networks, Security and Identity Access Management.

- Configuration management using CloudFormation and/or Chef/Puppet.

- Experience with agile approaches and Experience in DevOps or DevSecOps, and how they impact risk management and compliance.

- Hands-on technical expertise in technology automation, implementation, integration, and/or deployment using scripting and/or IaaC.

- Knowledge of professional software engineering practices & best practices for the full software development life cycle, including coding standards, code reviews, source control management, libraries building, build processes, testing, and operations.

- Demonstrated ability to mentor other software developers to maintain architectural vision and software quality.

- Experience taking a lead role developing complex software systems that have successfully been delivered to customers.

- Ability to travel to customer sites as needed.

PREFERRED QUALIFICATIONS:

- AWS Solutions Architect Certified.

- AWS Security Speciality Certified.

- CISSP, CCSP, CISM, and/or other comparable certifications.
Read more
Swiggy

at Swiggy

1 video
13 recruiters
Suresh Kaushik
Posted by Suresh Kaushik
Bengaluru (Bangalore)
3 - 12 yrs
₹25L - ₹60L / yr
Network Security
Penetration testing
skill iconProgramming
Security architecture
Computer Security
+2 more
Job Description Roles and Responsibilities: • Exploit security flaws and vulnerabilities with attack simulations on multiple application platforms like Android, iOS and Web. • Ability to flow from black box to grey box to white box tests. • Ability to effectively work with the engineering teams to provide technical risk. assessment of technologies in networks, applications, code reviews in the release management cycle. • Ability to perform vulnerability assessments and penetration testing, utilizing tools - commercial and open source. • Perform, review and analyze security vulnerability data to identify applicability and false-positives. • Conduct penetration testing in line with Open Web Application Security Project (OWASP) • Write technical reports that include suggested resolution for identified problem areas and perform operational risk assessment. Required Skills and Abilities: • OWASP top 10 • Security Pen Testing methodologies including automated scans and manual methods • Tools including Burp, Nexpose, NMap, Whois etc. is a plus • Good Hands-On with Linux Debian Flavors and security hardening of the same • Understanding of Web Servers and HTTP 1.0/1.1 Protocol • Troubleshooting web servers like Apache, Nginx and other reverse proxy platforms • Basic understanding of NodeJS, Python and JAVA • TCP/IP networking including IP classes, subnets, NAT • SSL Handshake and Certificates - Understanding • DNS, and DHCP, Network troubleshooting • Remote access methods • Backup and disaster recovery methodologies • Network analysis tools • Good Hands-on using Linux Debian Flavors • Experience with security issues in Cloud Technologies (AWS) is a plus • Ability to grasp new technology concepts quickly • Good documentation skills • Ability to work in a team environment and interact with people • Knowledge and understanding of basic information security principles • Should be aware of the latest Major Application Zero-day vulnerabilities • Should be able to understand security alerts and take necessary actions accordingly Education and Experience: • Bachelor’s degree in information technology related field
Read more
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Why apply via Cutshort?
Connect with actual hiring teams and get their fast response. No spam.
Find more jobs
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort