Role SummaryWe are seeking a highly skilled Level 3 (L3) Identity and Access Management (IAM) Engineer to design, manage, and optimize enterprise IAM solutions using Okta and Auth0 . The role requires deep expertise in authentication, authorization, identity federation, and security best practices , along with the ability to lead complex IAM incidents and enhancements.Key Responsibilities:IAM...
SCS Cyber Security - Development TeamJob Title: Cyber Security EngineerJob Summary: Cyber Security Engineer to design, implement, and maintain security aspects that protect our applications, systems and data. Candidate should have a strong technical background in cybersecurity, a proactive mindset,and the ability to respond to threats in real time Responsibilities: Detail and implement...
Security Impossible Pty Ltd | Australia (Remote, Global Team) Who We Are? Security Impossible is a fast-growing cybersecurity consulting and training SaaS company, based in Australia and working with clients and learners across the globe. We don’t just talk security — we build it, break it, analyse it, and teach it. From real-world consulting engagements to hands-on cyber labs, attack...
Job Title: TPRA / TPRM Manager (Third-Party Risk Assessment) Experience: 6+ Years Location: Remote – India Shift: US Shift (5:00 PM – 2:00 AM IST / as per client alignment) Employment Type: Full-time Role Overview We are seeking an experienced TPRA / TPRM Manager to lead and manage end-to-end third-party risk assessment programs for global clients. The role requires strong exposure to...
Securities Roles and ResponsibilitiesJob DescriptionInternalConfidential and Proprietary Information of CredAvenue Private Limited (‘Yubi’). Only expressly authorized for individuals under obligations of confidentiality with Yubi are permitted to review materials in this document. By reviewing these materials, you agree to not disclose these materials to any third party unless expressly...
In the role of a seasoned Product Security Incident Analyst, your primary responsibility will be to oversee and orchestrate the response efforts concerning security incidents and vulnerabilities associated with Valeo's automotive products and systems (including ECUs, telematics units, and in-vehicle software).Your expertise will be crucial in guiding the team towards detecting genuine...
• Minimum 5 years of information security engineering, architecture, and governance experience required • Experience with developing or implementing secure architecture and meet business needs • Responsibilities • Lead the engineering and operation of security technologies and processes to meeting business needs • Identify and maintain awareness of trends, technologies, and regulations which...
Power Plant Solutions Department is part of the VTO Organisation and supports the regions in selling, installing, and servicing a large number of SCADA systems controlling medium and large sized wind power plants. Our customers can mainly be found among larger power supply companies and professional investors. Responsibilities Supporting Configuration of switch and router for the SCADA...
About the Client: Our client is a leading GCC in Chennai Role Summary: This role involves strategic planning, implementation of robust security measures, and leadership in the development and execution of infrastructure and security policies. The Head of IT Infrastructure and Cyber Security is responsible for overseeing and managing the organization's IT infrastructure, ensuring its optimal...
Description : The opportunity: Penetration testing, vulnerability analysis, security risk management, security risk identification and mitigation, SQL injection, cryptography Encryption Standards and Products. How you’ll make an impact: You will work with Cybersecurity Risk Assessments according to the 62443 standards, you will be part of the Risk Mitigation Plans. You will ensure we...
To join our team of cybersecurity professionals. Our mission in KONE Cybersecurity is to keep KONE business cyber resilient. With cybersecurity tooling, including Identity and Access Management we help KONE people as well as our customers and partners to perform at their best, and at the same time keep KONE secure. The platforms that are in scope of IAM are: Identity management based on...
Job Title: GRC Deputy Manager – Information Security & Data PrivacyLocation: ChennaiExperience: 4+ YearsNotice Period: Immediate to 30 days preferredEmployment Type: Full-timeRole OverviewWe are seeking a GRC Deputy Manager with strong hands-on experience in Governance, Risk & Compliance (GRC), Information Security, and Data Privacy. The role involves supporting enterprise-wide security...
The candidate should be able to •Provides clear and concise project communication; both written and verbal. • Facilitates/manages project communications and stakeholder, client, and project team expectations. Performs duties and makes complex decisions and recommendations under limited supervision, applying a broad knowledge of principles, practices, and procedures. •Schedule Projects •Risk and...
Description : The opportunity: The Cybersecurity Engineer is responsible for implementing and maintaining cybersecurity controls and ensuring secure networking is achieved in the solution's implementation. The cybersecurity Engineer will also be responsible for creating and maintaining the required documents . How you’ll make an impact: Maintain a deep understanding of IT networking and...
Description : The opportunity: Hitachi Energy India Development Centre (IDC) is a research and development facility with around 500 R&D engineers, specialists, and experts, who focus on creating and sustaining digital solutions, new products and technology. This includes product integration, testing, cybersecurity, and certification. Able to lead a team with strong people management skills, to...
• Experience and talent in data visualization • Experience creating Dashboards and Analytics within SEIM (Security Information and Event Management) Tool. • Experience creating workflows for Incident Response within a SEIM (Security Information and Event Management) Tool. • GIAC Cyber Threat Intelligence Certification. • Experience with the following StealthWatch, TripWire, Zenoss, ArcSight,...
• Well rounded knowledge across the Cyber Security domain • Strong understanding of Managed Security Service • Hands-on experience in cloud-managed security services. • Strong understanding of Identity and Access Management & Authentication across leading platforms • Architecture experience in defining and designing Security Operations center • Proven experience in pricing models and...
• 7+ years of experience in creating and managing enterprise information security architectures and solutions across multiple disciplines (network, Cloud, endpoint, software development, etc.) • Encryption and security/compliance experience (PCI) • In-depth understanding and Knowledge of network security capabilities and best-practices (e.g., IPS/IDS, firewalls, proxies, BYOD, SIEM, wireless...
• Work with Cyber Security Product Management, Engineering, and Operations team to understand business requirements, levels of demand, and impact on technical architecture. • Perform testing of new software versions for platforms including Remote Access VPN, Firewalls, and Web Proxy • Design the low-level, technical capability architecture for new and modified capabilities and ensure that the...
Candidate must have: •Strong communications and interpersonal skills to build/maintain ongoing business relationships with employees, vendors, and clients at all levels of the organization •Experience in Network Monitoring and Defense, Security Appliance, Firewall, Routing, IDS/IPS, WAF, ISE/NAC, AD, setup, and rule management •Experience in Vulnerability Management / Scanning /...