We're #hiring a new Information Security Analyst in Mumbai, Maharashtra. Apply today or share this post with your network.
Synclature’s Post
More Relevant Posts
-
We are Hiring !!! Share your cv at tanisha.kapoor@veboticsindia.com Role- Threat Intelligence Threat Hunting Location- Nagpur, Pune, Mumbai, Bangalore, Hyderabad, Delhi/NCR Experience- 8 to 10 Years JD:- Develop hypotheses about potential threats based on indicators of compromise (IOCs), suspicious patterns, or anomalies identified from the collected data- Search and correlate events across different data sets. - Analyze the search results to identify any abnormal or suspicious activities that could indicate a security incident- Correlate events and logs from various sources to uncover hidden patterns or connections that might indicate a sophisticated attack or an ongoing breach- Triage and prioritize alerts generated by SIEM based on the severity, impact, and likelihood of a threat.-When a confirmed threat or security incident is identified, work closely with incident response teams to contain and mitigate the risk #JobOpening #ThreatIntelligence #ThreatHunting #CyberSecurity #InfoSec #SecurityAnalyst #SecurityOperations #SIEM #IncidentResponse #CyberThreats #DataAnalysis #SecurityIncident #NagpurJobs #PuneJobs #MumbaiJobs #BangaloreJobs #HyderabadJobs #DelhiJobs #NCRJobs
To view or add a comment, sign in
-
We are Hiring !!! Share your cv at tanisha.kapoor@veboticsindia.com Role- Threat Intelligence Threat Hunting Location- Nagpur, Pune, Mumbai, Bangalore, Hyderabad, Delhi/NCR Experience- 8 to 10 Years JD:- Develop hypotheses about potential threats based on indicators of compromise (IOCs), suspicious patterns, or anomalies identified from the collected data- Search and correlate events across different data sets. - Analyze the search results to identify any abnormal or suspicious activities that could indicate a security incident- Correlate events and logs from various sources to uncover hidden patterns or connections that might indicate a sophisticated attack or an ongoing breach- Triage and prioritize alerts generated by SIEM based on the severity, impact, and likelihood of a threat.-When a confirmed threat or security incident is identified, work closely with incident response teams to contain and mitigate the risk #JobOpening #ThreatIntelligence #ThreatHunting #CyberSecurity #InfoSec #SecurityAnalyst #SecurityOperations #SIEM #IncidentResponse #CyberThreats #DataAnalysis #SecurityIncident #NagpurJobs #PuneJobs #MumbaiJobs #BangaloreJobs #HyderabadJobs #DelhiJobs #NCRJobs
To view or add a comment, sign in
-
We are Hiring !!! Share your cv at tanisha.kapoor@veboticsindia.com Role- Threat Intelligence Threat Hunting Location- Nagpur, Pune, Mumbai, Bangalore, Hyderabad, Delhi/NCR Experience- 8 to 10 Years JD:- Develop hypotheses about potential threats based on indicators of compromise (IOCs), suspicious patterns, or anomalies identified from the collected data- Search and correlate events across different data sets. - Analyze the search results to identify any abnormal or suspicious activities that could indicate a security incident- Correlate events and logs from various sources to uncover hidden patterns or connections that might indicate a sophisticated attack or an ongoing breach- Triage and prioritize alerts generated by SIEM based on the severity, impact, and likelihood of a threat.-When a confirmed threat or security incident is identified, work closely with incident response teams to contain and mitigate the risk #JobOpening #ThreatIntelligence #ThreatHunting #CyberSecurity #InfoSec #SecurityAnalyst #SecurityOperations #SIEM #IncidentResponse #CyberThreats #DataAnalysis #SecurityIncident #NagpurJobs #PuneJobs #MumbaiJobs #BangaloreJobs #HyderabadJobs #DelhiJobs #NCRJobs
To view or add a comment, sign in
-
Urgent Requirement for ROLE: Senior Security Analyst, IT Security and Compliance Location: Pune Or Mumbai Expereince: 4 to 12 Years Salary upto 27 LPA Skill Required: #malwareAnalysis #forensicanalysis #threatintelligence #DLP #Vulnerabilitymanagement #Crowdstrike #SIEM #threathunting Mail you resume with sshruti.ssaxena@gmail.com #CyberSecurity #InfoSec #DataSecurity #ITSecurity #NetworkSecurity #CyberThreats #SecurityAnalyst #CyberDefense #SecurityOperations #ThreatIntelligence #IncidentResponse #SecurityAwareness #CyberRisk #VulnerabilityManagement #SecurityMonitoring #DigitalForensics #RiskManagement #IdentityManagement #CloudSecurity #PenetrationTesting #SecurityArchitecture #SOCAnalyst #MalwareAnalysis #SecurityStrategy #Compliance #ITCompliance #RegulatoryCompliance #Governance #Audit #SecurityStandards #SecurityPolicy #PrivacyCompliance #SecurityControls #SecurityManagement #ITGovernance #ITRisk #ComplianceManagement #DataProtection #GDPRCompliance #PCICompliance #HIPAACompliance #ISO27001 #CyberProtection #NetworkDefense #CyberAttack #DefenseStrategy #CyberResilience #ThreatDefense #CyberWarfare #DigitalDefense #CyberOperations #DefenseTechnology #CyberIntelligence #CyberIncidentResponse #CyberDefenseSolutions #CyberDefenseTraining #CloudComputing #CloudProtection #CloudSafety #SecureCloud #CloudPrivacy #CloudCompliance #CloudArchitecture #CloudStrategy #CloudRisk #CloudGovernance #CloudEncryption #CloudAudit #CloudMonitoring #CloudResilience #CloudIdentity #CloudAccessControl #CloudBackup #CloudFirewall #ThreatAnalysis #SecurityThreats #ThreatDetection #ThreatAssessment #RiskAnalysis #SecurityAnalysis #IncidentAnalysis #SecurityIncidents #VulnerabilityAnalysis #CyberForensics #SecurityResearch #DigitalThreats #CyberInvestigation #InfoSecAnalysis #ForensicAnalysis #ComputerForensics #ForensicInvestigation #IncidentForensics #ForensicExamination #EvidenceAnalysis #ForensicTechniques #ForensicScience #ForensicResearch #ForensicTools #ForensicProcedure #ForensicExpert #ForensicEvidence #LegalForensics #MobileForensics #NetworkForensics #DigitalEvidence #ForensicReports #ThreatIntelligence #CyberSecurityIntel #IntelligenceAnalysis #InfoSecIntel #ThreatHunting #ThreatIndicators #DigitalThreatIntel #CyberRiskIntelligence #IDS #IPS #IntrusionDetection #IntrusionPrevention #NetworkDefense #CyberDefenseSolutions #ThreatManagement #CyberThreatHunting #HuntingThreats #HuntTeam
To view or add a comment, sign in
-
Good opportunity
𝑮𝒓𝒆𝒂𝒕 𝑶𝒑𝒑𝒐𝒓𝒕𝒖𝒏𝒊𝒕𝒚 𝒇𝒐𝒓 𝐍𝐞𝐭𝐰𝐨𝐫𝐤 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝑷𝒓𝒂𝒄𝒕𝒊𝒕𝒊𝒐𝒏𝒆𝒓𝒔!! - We are hiring for the position of Network Security Manager at Ujjivan Small Finance Bank, Head office Bangalore. Candidate with the area of at least below expertise and relevant experience of 7-10 years and above can send their resume to shailesh.tiwari@ujjivan.com 𝐀𝐫𝐞𝐚 𝐨𝐟 𝐄𝐱𝐩𝐞𝐫𝐭𝐢𝐬𝐞: •Excellent working knowledge on Routing and switching is required •Require candidate with at least one hands on firewall experience. •Know designing and LAN, WAN, switching/routing, and Data Centre infrastructure including Next-Gen firewalls. •Good knowledge of Switching Layer 3 HSRP, VRRP, VLAN configuration, VTP, STP and NAT •Good knowledge of Routing OSPF, EIGRP, BGP, MPLS, and policy-based routing Knowledge and experience with switches, VPC, and VDC 𝑪𝒂𝒏𝒅𝒊𝒅𝒂𝒕𝒆 𝒘𝒊𝒕𝒉 𝒔𝒐𝒖𝒏𝒅 𝒇𝒖𝒏𝒅𝒂𝒎𝒆𝒏𝒕𝒂𝒍𝒔 𝒐𝒇 𝑵𝒆𝒕𝒘𝒐𝒓𝒌𝒊𝒏𝒈 𝒘𝒊𝒕𝒉 𝒍𝒆𝒔𝒔 𝒔𝒆𝒄𝒖𝒓𝒊𝒕𝒚 𝒆𝒙𝒑𝒐𝒔𝒖𝒓𝒆 𝒎𝒂𝒚 𝒂𝒍𝒔𝒐 𝒃𝒆 𝒄𝒐𝒏𝒔𝒊𝒅𝒆𝒓𝒆𝒅. 𝑻𝒉𝒆 𝒄𝒂𝒏𝒅𝒊𝒅𝒂𝒕𝒆 𝒎𝒂𝒚 𝒃𝒆 𝒄𝒐𝒏𝒔𝒊𝒅𝒆𝒓𝒆𝒅 𝒕𝒐 𝒈𝒓𝒂𝒅𝒖𝒂𝒕𝒆 𝒕𝒐 𝑵𝒆𝒕𝒘𝒐𝒓𝒌 𝑺𝒆𝒄𝒖𝒓𝒊𝒕𝒚 𝑴𝒂𝒏𝒂𝒈𝒆𝒓 𝐃𝐞𝐬𝐢𝐫𝐚𝐛𝐥𝐞 : Network /Network Security/ Firewall certifications with Cloud Networking knowledge. Ujjivan Small Finance Bank Ujjivan Universe #jobopening #job #cybersecurity #networksecurity #networkingjobs
To view or add a comment, sign in
-
++connects
*Urgently looking for Immediate Joiner* *Network Security L1, L2, L3* *Mandatory hand in exp Need Strong exp in - BGP, Network, fortiget, checkpoint,.* Please don't apply if you don't have hands-on experience in above mentioned skill otherwise cv won't be shortlisted.🙏 *Exp - 2-4 yrs - L1, 4-8 yrs-L2, 9-14 yrs - L3* Anyone who is interested kindly share their resume to me Location - Thane ( Mumbai) *Salary -L1- 3.5 lpa L2- up to 8 lpa, L3- up to 13.5 lpa,* *immediate joiner only* recruitment2@la-technologiesindia.com
To view or add a comment, sign in
-
Hi Folks!! We are hiring for passionate Third Party Governance... Exp: 5-10 years Location: Pune, Chennai #KeyResponsibilities: Third-Party Governance Role: . Vendor Risk Identification and Analysis: • Revise the Vendor Risk Assessment Playbook, Process, and Procedures to ensure they're up-to- date with industry practices. • Construct a risk assessment plan using a standardized approach to minimize the bank's exposure to third-party vendor risks. b. Third-Party Cyber Risk Assessments: • Analyse third-party cyber risk assessment documents and procedures to ensure comprehensive risk management. • Continually monitor and adapt to new risks, ensuring that assessment strategies are proactive. c. Tools, Measurement, and Analysis: • Scrutinize and validate cyber tools and create test cases to assess the effectiveness of third-party cyber risk tools. • Optimize the use of JIRA for improved tracking and management of cyber assessments. d. Program Governance – Cyber PMO: • Establish a Cyber Program Management Office to oversee and align cyber risk projects with organizational goals. • Provide ongoing support for cyber risk initiatives and ensure effective communication among all stakeholders. Vendor Risk Assessment and Mitigation 1. Walkthroughs and Understanding: Conducting in-depth sessions with application owners to comprehend the application architecture, services provided, and IT processes involved. 2. Assessment Scope and Connectivity: Defining the scope of the assessment and identifying how vendor services connect with the organization’s existing architecture. 3. Questionnaire Distribution and Assistance: Tailoring assessment questionnaires based on vendor service applicability and facilitating stakeholders in completing them. 4. Evidence Review and Follow-ups: Reviewing the evidence provided by stakeholders and conducting follow-up meetings for clarification and understanding of responses. 5. Gap Analysis and Validation: Analysing the questionnaires to identify gaps and conducting validation sessions with stakeholders on the findings. 6. Risk Assessment Reporting: Compiling the findings into a Risk Assessment Report that details the risks and their ratings. The deliverables from this stage include a controls checklist for vendors and a comprehensive Risk Assessment report. For Risk Mitigation: • Propose recommendations and create an action plan for risk treatment. • Review and evaluate proposed actions against the organization's risk acceptance criteria. Please shoot your resume at nisha.callfortalent@gmail.com or you can recommend someone who is looking job in the same domain. #thirdparty #chennailocation #punelocation #immediatejoiner #urgentopening #hybridworkmode
To view or add a comment, sign in
-
#Hiring #IT_Infra_Head #location_Hyderabad (Shamshabad) #Industry_paper & Reality #CTC up to 20 LPA #Exp_10 years of experience in IT management roles, preferably in manufacturing or related industries. #Jd 1. Strategic Planning: Develop and execute IT strategies aligned with the company's goals and objectives. 2. Team Leadership: Lead, mentor, and manage a team of IT professionals to ensure optimal performance and productivity. 3. Infrastructure Management: Oversee the design, implementation, and maintenance of IT infrastructure, including networks, servers, and hardware. 4. Technology Evaluation: Evaluate, select, and implement software solutions to enhance operational efficiency and support business processes. 5. Cybersecurity: Implement and maintain robust cybersecurity measures to protect the company's digital assets and mitigate risks. 6. Budget Management: Develop and manage the IT budget, ensuring efficient allocation of resources and cost-effective solutions. 7. Vendor Management: Manage relationships with IT vendors and service providers to ensure quality of service and value for money. 8. Compliance and Governance: Ensure compliance with relevant regulations and industry standards, as well as internal policies and procedures. 9. Business Continuity: Develop and implement strategies for IT disaster recovery and business continuity planning. 10. Innovation: Identify opportunities for leveraging technology to drive innovation and competitive advantage. sravang@hrinputs.com 7386554870.
To view or add a comment, sign in
-
Good Opportunities
Cloud Security & DevSecOps Practitioner, Digital Forensics, Incident Response, Threat Hunting and Intelligence Researcher | Speaker, Mentor and Trainer | Helping People and Organizations Secure Themselves
#HiringAlert! At eSec Forte® Technologies, we are looking to expand our Security Engineering Team in Gurugram and Mumbai. We are currently hiring for multiple positions and are looking for talented professionals who are passionate about cybersecurity and have experience in the field. If you are interested in joining our team, please contact Asha Choudhary or email your job application to joinus@esecforte.com. #Jobs #CloudSecurityJobs #NetworkSecurityJobs #ApplicationSecurityJobs
To view or add a comment, sign in
-
Hi Folks!! We are hiring for passionate Third Party Governance... Exp: 5-10 years Location: Pune, Chennai #KeyResponsibilities: Third-Party Governance Role: . Vendor Risk Identification and Analysis: • Revise the Vendor Risk Assessment Playbook, Process, and Procedures to ensure they're up-to- date with industry practices. • Construct a risk assessment plan using a standardized approach to minimize the bank's exposure to third-party vendor risks. b. Third-Party Cyber Risk Assessments: • Analyse third-party cyber risk assessment documents and procedures to ensure comprehensive risk management. • Continually monitor and adapt to new risks, ensuring that assessment strategies are proactive. c. Tools, Measurement, and Analysis: • Scrutinize and validate cyber tools and create test cases to assess the effectiveness of third-party cyber risk tools. • Optimize the use of JIRA for improved tracking and management of cyber assessments. d. Program Governance – Cyber PMO: • Establish a Cyber Program Management Office to oversee and align cyber risk projects with organizational goals. • Provide ongoing support for cyber risk initiatives and ensure effective communication among all stakeholders. Vendor Risk Assessment and Mitigation 1. Walkthroughs and Understanding: Conducting in-depth sessions with application owners to comprehend the application architecture, services provided, and IT processes involved. 2. Assessment Scope and Connectivity: Defining the scope of the assessment and identifying how vendor services connect with the organization’s existing architecture. 3. Questionnaire Distribution and Assistance: Tailoring assessment questionnaires based on vendor service applicability and facilitating stakeholders in completing them. 4. Evidence Review and Follow-ups: Reviewing the evidence provided by stakeholders and conducting follow-up meetings for clarification and understanding of responses. 5. Gap Analysis and Validation: Analysing the questionnaires to identify gaps and conducting validation sessions with stakeholders on the findings. 6. Risk Assessment Reporting: Compiling the findings into a Risk Assessment Report that details the risks and their ratings. The deliverables from this stage include a controls checklist for vendors and a comprehensive Risk Assessment report. For Risk Mitigation: • Propose recommendations and create an action plan for risk treatment. • Review and evaluate proposed actions against the organization's risk acceptance criteria. Please shoot your resume at nisha.callfortalent@gmail.com or you can recommend someone who is looking job in the same domain. #thirdparty #chennailocation #punelocation #immediatejoiner #urgentopening #hybridworkmode
To view or add a comment, sign in
16,690 followers