100 Cybersecurity Manager jobs in Hyderabad
Information Systems & Cybersecurity Manager
Posted today
Job Viewed
Job Description
Responsibilities:
Looking for a 10+ years of seasoned Information Systems Security Manager, who can Develop and implement robust security strategies and policies to protect the company's assets, employees and facilities. Assessing potential risks and vulnerabilities, investigating security breaches and reinforcing appropriate measures to mitigate them. Ensure to develop a Business continuity and Disaster recovery plans. Be versatile and take up hands on work as needed.
▪ Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk.
▪ Advise senior management C-Suite (CIO/CTO) on risk levels and security posture
. ▪ Advise appropriate senior leadership or Authorizing Official of changes affecting the organization's cybersecurity posture.
▪ Collect and maintain data needed to meet system cybersecurity reporting.
▪ Communicate the value of IT security throughout all levels of the organization stakeholders.
▪ Ensure that security improvement actions are evaluated, validated, and implemented as required.
▪ Ensure that cybersecurity inspections, tests, and reviews are coordinated for the network environment.
▪ Ensure that cybersecurity requirements are integrated into the continuity planning for that system and/or organization(s).
▪ Evaluate and approve development efforts to ensure that baseline security safeguards are appropriately installed.
▪ Identify alternative information security strategies to address organizational security objectives.
▪ Identify IT security program implications of new technologies or technology upgrades.
▪ Interpret patterns of noncompliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise's cybersecurity program.
▪ Manage the monitoring of information security data sources to maintain organizational situational awareness.
▪ Oversee the information security training and awareness program across the organization.
▪ Participate in an information security risk assessment during the Security Assessment and Authorization process.
▪ Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of network system(s) operations.
▪ Provide system-related input on cybersecurity requirements to be included in statements of work and other appropriate procurement documents.
▪ Recognize a possible security violation and take appropriate action to report the incident, as required.
▪ Recommend resource allocations required to securely operate and maintain an organization's cybersecurity requirements.
▪ Supervise or manage protective or corrective measures when a cybersecurity incident or vulnerability is discovered.
▪ Track audit findings and recommendations to ensure that appropriate mitigation actions are taken.
▪ Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals.
▪ Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies.
▪ Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
▪ Assure successful implementation and functionality of security requirements and appropriate IT policies and procedures that are consistent with the organization's mission and goals.
▪ Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs)
▪ Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance.
▪ Good understanding of data backup and recovery.
▪ Good understanding of business continuity and disaster recovery continuity of operations plans.
▪ Knowledge of the organization's enterprise IT goals and objectives.
▪ Familiarity with SOX, ISO, NIST audits is a plus
Core Competencies:
▪ Business Continuity & Disaster Recovery Planning
▪ Enterprise Architecture
▪ Information Systems/Network Security
▪ Policy Management
▪ Risk Management
▪ Technology Awareness ▪ Vulnerabilities Assessment
▪ Threat Detection & Analysis Education:
Master’s degree in information systems/Cybersecurity.
Sr Analyst I-Cyber Defense
Posted today
Job Viewed
Job Description
Description
Duties:
• Lead and coordinate incident response efforts for cloud-based environments (AWS, Azure, GCP).
• Analyze and investigate security alerts, logs, and events from SIEM, EDR, and cloud-native tools.
• Develop and maintain incident response playbooks, runbooks, and escalation procedures.
• Collaborate with CloudOps, Cloud Engineering, and Application Teams to contain and remediate threats.
• Analyze information security events from multiple sources, including SIEM, IPS/IDS, firewalls, Endpoint security, cloud security, email gateway, Identity protection, etc., identify the cause of incidents, and respond by applying containment and eradication strategies.
• Design and implement IT security systems (Endpoint security, Email protection, Identity protection, Cloud security) to protect corporate network from cyber threats.
• Respond and analyze cyber incidents, Monitoring IPS/IDS alerts, Coordinating and distributing advisories on cyber security Incident, vulnerabilities, and threats to relevant stakeholders.
• Collaborate closely with Threat Intelligence, Incident Response, Business Security, Application Security, Technology, and other teams as vital.
• Assess vulnerabilities and attacker tactics, techniques, and procedures (TTP) and provide defensive action to locate and prevent threats.
• Review and analyze security data within the SIEM and network traffic such as full packet captures and analysis/or NetFlow data to detect traffic anomalies, identify infected systems, and threat actor related activity based on known tactics, techniques, and procedures.
• Configure rules for real-time alerting in SIEM tool for events, analytic rules, automation rules, hunting queries & Playbook.
• Conduct static and dynamic Malware Analysis.
• Configure and deploy security policies, Rules, and controls within firewalls.
• Configure Palo-Alto Security firewall Policies/Rules, Build Custom objects/Categories for network Configurations based on various enterprise requirements.
• Create and enforce security policies in various Cyber defense tools (Endpoint security/Email gateway, firewalls, AD Groups) to mitigate risks.
• Create and update interactive Security event/Incident Reports and Dashboards for executive leadership.
• Conduct proactive Threat Hunting exercises to identify and mitigate security threats through the review of system logs, threat intelligence, network activity, and known tactics, techniques, and procedures.
• Lead activities to simulate real-world cyber-attacks and assess effectiveness of defensive measures.
• Configure IDS/IPS signatures based on Vendor-provided signatures, Vulnerability Database, CTI Feeds, TCP/IP, HTTP, FTP, SSH protocols following industry standards (NIST, PCI-DSS, HIPAA. etc.), regex, hex encoding and create Custom IDS/IPS based on opensource signatures (snort, Suricata).
• Work under Team Leader to maintain security devices and show practical experience in managing SIEM environments, firewalls, content filters, NIDS, proxy servers, HIPS, and packet capture devices.
• Perform malware analysis by sandboxing file, URL, decoding a script and locate IOCs (Indicators of Compromise) within the file while knowing and understanding the MITRE Kill Chain and other Cybersecurity standards.
• Work on End-End malware remediation process from identifying malware, containing systems while assessing the Enterprise risk, Malware reverse engineering, identifying IOC’s, updating identified signatures and Hunting IOCs in Enterprise environment.
• Work on endpoint security Incidents while providing recommended actions for completely removing all traces of malware from the infected system, including rootkits, Trojans, viruses, and malicious software’s restoring system to a known good state, ensuring the integrity and security of all data and applications.
• Serve as the primary escalation contact for all security incidents in the absence of L3.
• Make recommendations, build, modify, and update IPS policies, Endpoint AV security controls, Network AV security controls, and Security Information Event Management (SIEM) tool rules.
• Mentor and train team members.
• Deliver technical training in areas such as log monitoring, security event analysis, phishing email investigations, and incident handling.
Requirements:
• Must have a Bachelor’s degree in Software or Computer Engineering, Mechanical Engineering, Information Security, or related field.
• Must have obtained at least one of the following certifications: CISSP, CompTIA Security +, CHFI ,AWS Security Specialty, AWS Solution Architect Associate
• Strong knowledge of cloud platforms (AWS, Azure, GCP) and their security services.
• Experience with cloud-native logging and monitoring (e.g., CloudTrail, GuardDuty, Azure Defender).
• Must have 5 years of progressive experience in Information/Cyber Security positions performing/utilizing the following:
• Information Security Operations.
• Cyber Incident Response Process identification, analysis, reporting, remediation/mitigation, verification, post-analysis, and process improvement.
• Network analysis tools, scripting languages, software vulnerabilities, exploits and malware analysis, and reverse engineering.
• Reading and understanding system data including security event logs, system logs, application logs, and device logs.
• Strong network security, threat hunting, and threat intelligence
• Must have at least 4 years of experience with:
• Enterprise grade technologies including Windows and Linux Operating Systems, Databases, Endpoint security, Web Applications and Applicable monitoring tools, including. SIEM, DLP, Internet filtering/blocking, IDS/IPS, firewalls, Anti-Virus, encryption technologies, and Vulnerability management).
• Creating custom correlation rules to detect known or suspected malware traffic patterns within security tools.
Full Time / Part Time
Full timeWorker Type
EmployeeJob Exempt (Yes / No)
YesWorkplace Model
At Invesco, our workplace model supports our culture and meets the needs of our clients while providing flexibility our employees value. As a full-time employee, compliance with the workplace policy means working with your direct manager to create a schedule where you will work in your designated office at least three days a week, with two days working outside an Invesco office.
Why Invesco
In Invesco, we act with integrity and do meaningful work to create impact for our stakeholders. We believe our culture is stronger when we all feel we belong, and we respect each other’s identities, lives, health, and well-being. We come together to create better solutions for our clients, our business and each other by building on different voices and perspectives. We nurture and encourage each other to ensure our meaningful growth, both personally and professionally.
We believe in diverse, inclusive, and supportive workplace where everyone feels equally valued, and this starts at the top with our senior leaders having diversity and inclusion goals. Our global focus on diversity and inclusion has grown exponentially and we encourage connection and community through our many employee-led Business Resource Groups (BRGs).
What’s in it for you?
As an organization we support personal needs, diverse backgrounds and provide internal networks, as well as opportunities to get involved in the community and in the world.
Our benefit policy includes but not limited to:
In Invesco, we offer development opportunities that help you thrive as a lifelong learner in a constantly evolving business environment and ensure your constant growth. Our AI enabled learning platform delivers curated content based on your role and interest. We ensure our manager and leaders also have many opportunities to advance their skills and competencies that becomes pivotal in their continuous pursuit of performance excellence.
To know more about us
About Invesco:
About our Culture:
About our D&I policy:
About our CR program:
Apply for the role @ Invesco Careers :
Digital Trust Cyber Defense Executive
Posted today
Job Viewed
Job Description
**_KPMG entities in India are professional services firm(s). These Indian member firms are affiliated with KPMG International Limited. KPMG was established in India in August 1993. Our professionals leverage the global network of firms, and are conversant with local laws, regulations, markets and competition. KPMG has offices across India in Ahmedabad, Bengaluru, Chandigarh, Chennai, Gurugram, Jaipur, Hyderabad, Jaipur, Kochi, Kolkata, Mumbai, Noida, Pune, Vadodara and Vijayawada. _**
**_KPMG entities in India offer services to national and international clients in India across sectors. We strive to provide rapid, performance-based, industry-focused and technology-enabled services, which reflect a shared knowledge of global and local industries and our experience of the Indian business environment. _**Strong understanding of IT security standards and frameworks (OWASP, NIST, CIS)
- Strong understanding of OSI, TCP/IP model and network basics
- Solid technical skills in both information security architecture and penetration testing and ability to assess testing tools and deploy the right ones.
- Scripting and programming experience is beneficial
- Ability to perform manual penetration testing
- Experience in Application Security Testing (Web, Mobile & ERP (SAP)), or related functions Vulnerability Assessment, Penetration testing
QUALIFICATIONS
Any Technical graduate
Preferred Certifications: CEH, ECSA, OSCP, CISSP, CCSK, OCSE, CCSP, AWS Security
**Equal employment opportunity information
**KPMG India has a policy of providing equal opportunity for all applicants and employees regardless of their color, caste, religion, age, sex/gender, national origin, citizenship, sexual orientation, gender identity or expression, disability or other legally protected status. KPMG India values diversity and we request you to submit the details below to support us in our endeavor for diversity. Providing the below information is voluntary and refusal to submit such information will not be prejudicial to you.
Senior IT Manager - Cybersecurity

Posted 5 days ago
Job Viewed
Job Description
**A Day in the Life**
In this critical role you will act as Sr. Manager, Cybersecurity leading a team of IT/Cybersecurity professionals, ensuring the highest security standards across the Enterprise. This role is responsible for assisting the CISO in the implementation of information security governance structure and strategies, priorities, and directives consistent with the vision and in alignment with the mission of the Medtronic Global Cyber & information Security Office (GCISO). This role will be accountable for helping teams achieve their goals, work strategically together, and remain as adaptable as possible in a fun, ever-changing environment. We're always looking for ways to optimize.
We look for leaders who have a clear vision of where we are going and how to get there, bold inclusive thinkers who create new ideas and bring our best solutions forward to benefit our patients, business partners, and customers.
Responsibilities may include the following and other duties may be assigned. The leadership role is Hyderabad based and requires 4-5 days in a week working at office.
General:
+ Provide recommendations to the CISO on information security standards and best practices for IT projects.
+ Lead, mentor, and manage the India-based cybersecurity team to ensure high performance, skill development, and efficient collaboration across time zones.
+ Oversee recruitment, training, and development of Global Cyber & Information Security (GCISO) team members.
+ Ensure effective communication and ways of working between the India GCISO team and global stakeholders.
+ Manage the team's workload, prioritize tasks, and ensure timely completion of deliverables.
+ Assist the CISO to oversee and manage the effectiveness of the cybersecurity strategy and roadmap.
+ Work with finance to assess road map and strategy against budget.
+ Assist in the development leadership & board communications on the cyber program.
+ Manage data analytics/dash boarding of metrics reporting. Analyze security metrics and KPIs to assess the performance of the operations team and identify areas for improvement.
+ Collaborate with the global cybersecurity leadership team to align the India operations with the overall cybersecurity strategy and goals.
+ Provide regular reporting on security operations, incident trends, and performance metrics to senior leadership.
+ Contribute to the development of security policies, procedures, and guidelines to ensure consistency and adherence to security standards globally.
+ Align and engage with stakeholders (MDT leadership, various Operating Units, ITLT, Privacy, Product Security, HR, Legal, etc.) on GCISO initiatives as required.
+ Manage staff to continuously improve the organization's security operations, incident management processes, and response times.
+ Utilize security tools and platforms (e.g., SIEM, IDS/IPS, firewalls, threat intelligence) to enhance the effectiveness of security monitoring and analysis.
+ Manage staff to execute on core cyber security business functions (e.g. risk assessments, third party risk assessments, compliance assessments and testing, audit support, contract reviews, tool administration and AI enabled process facilitation and quality assurance.
+ Collaborate with other cybersecurity teams, such as vulnerability management and risk assessment, to drive comprehensive security measures.
+ Manage relationships with third-party vendors providing security tools and services.
+ Evaluate new security technologies and tools to enhance operational capabilities.
+ Collaborate with managed security service providers (MSSPs) as needed for specialized services.
Leadership:
+ Ensure that strict standards of confidentiality and high integrity are maintained across the teams, based on the sensitivity of the work being performed.
+ Manage activities of a team with responsibility for results in terms of costs, methods, and employees. Accomplishes results through subordinate managers, supervisors, or exempt specialist employees. Recommends organizational structures of functions and units.
+ Provide leadership, management, and direct reports including performance management, individual development planning, succession planning, employee communications, and positive working environment to ensure high productivity, employee engagement, and performance.
+ Represent the organizational unit as a prime internal and external contact on security related contracts or operations.
+ Work continuously to maintain a very high-level of awareness of new trends, threats, and the constantly changing cyber landscape. Respond quickly and appropriately to these changes with modifications to strategies and approaches in order to protect the company.
+ Conduct briefings and technical meetings for top management and customer representatives. Interacts with senior leadership and equivalent concerning matters of significance to Medtronic.
+ Be responsible for and provide direction to projects and initiatives. Provides guidance to staff to meet schedules or resolve technical or operational problems. Directly participates in establishing and administering many functional projects. Develops and administers budgets, schedules, and performance standards.
+ Influence the development of overall objectives and long-range goals of the organization.
+ Develop, plan, manage, and forecast associated cost center(s), unit costs, employee complement, capital expenditures, and charge back rates. Lead the development of cost center budget and operational plan and manage expenses to plan.
+ Establish appropriate relationships at all levels within the organization to influence and execute strategy/operations.
+ Establish and maintain strong external peer connections in the interest of cyber information sharing and collaboration.
+ Continually benchmark against relevant industries and peer groups to look for continuous improvement opportunities, new techniques and tools, and measure Medtronic against similar functions. Develop business-relevant metrics to measure the effectiveness of the program, facilitate appropriate resource allocation and increase the maturity of the security program.
+ Develop job performance plans for assigned subordinates to communicate responsibilities and expected outcomes of performance in their role.
+ Review and approve future staffing and skill requirements needed for succession planning and talent management purposes.
+ Maintain a strong understanding of security technologies, risks and capabilities.
+ Develop in depth understanding of business processes and business dependencies on supported technologies.
+ Other duties as assigned.
**MUST HAVE** (Minimum Qualifications)
+ Requires a Baccalaureate degree in computer science, Business, or a related field (or for degrees earned outside of the United States, a degree which satisfies the requirements of 8 C.F.R. § 214.2(h)( 4)(iii)(A) and
+ Minimum of 18 years of overall and 10+ years of relevant experience with 5+ years of managerial experience.
**NICE TO HAVE** (Preferred Qualifications)
+ Previous experience managing across the NIST domains of cybersecurity across a large company.
+ Advanced degree in applicable business-related field or similar professional IT security certifications.
+ Demonstrated results orientation (driving to deadlines, financial targets, project goals, etc.).
+ Strong business acumen and global orientation.
+ Ability to work collaboratively and partner with employees, peers, leaders, clients, key stakeholders and vendors.
+ Demonstrated ability to provide strong Project Management skills and expertise.
+ Ability to manage the day-to-day information security risk functions across multiple projects and initiatives in Global IT.
+ Personnel Scope - Previous experience managing multiple teams, including matrixed teams containing external resources, service providers, consultants, and partnerships.
+ Employee Development - Previous experience in recruiting and developing talent; proactively lead personnel development activities and mentoring, including a succession plan for managed teams
+ Financial Accountability - Demonstrated ability and experience managing multiple cost centers, programs, and budget accountability.
+ Communication Skills - Demonstrated excellent communication skills at all levels in the organization, strong negotiator, and strong influence & presentation skills.
+ Leadership - Demonstrated leadership skills & high integrity presence; clearly conveys vision & purpose to workforce.
+ Administration - Previous experience in ensuring that functional area complies with administrative requirements including forecasting and budgeting, status reporting, and personnel administration.
+ Proven ability to take down barriers and build highly successful, high-functioning, and accountable organizations.
+ Previous experience managing the integration of IT functions and organizations.
**Physical Job Requirements**
The above statements are intended to describe the general nature and level of work being performed by employees assigned to this position, but they are not an exhaustive list of all the required responsibilities and skills of this position?
**Benefits & Compensation**
**Medtronic offers a competitive Salary and flexible Benefits Package**
A commitment to our employees lives at the core of our values. We recognize their contributions. They share in the success they help to create. We offer a wide range of benefits, resources, and competitive compensation plans designed to support you at every career and life stage.
**About Medtronic**
We lead global healthcare technology and boldly attack the most challenging health problems facing humanity by searching out and finding solutions.
Our Mission - to alleviate pain, restore health, and extend life - unites a global team of 95,000+ passionate people.
We are engineers at heart- putting ambitious ideas to work to generate real solutions for real people. From the R&D lab, to the factory floor, to the conference room, every one of us experiments, creates, builds, improves and solves. We have the talent, diverse perspectives, and guts to engineer the extraordinary.
Learn more about our business, mission, and our commitment to diversity here ( lead global healthcare technology and boldly attack the most challenging health problems facing humanity by searching out and finding solutions.
Our Mission - to alleviate pain, restore health, and extend life - unites a global team of 95,000+ passionate people.
We are engineers at heart- putting ambitious ideas to work to generate real solutions for real people. From the R&D lab, to the factory floor, to the conference room, every one of us experiments, creates, builds, improves and solves. We have the talent, diverse perspectives, and guts to engineer the extraordinary.
**We change lives** . Each team member, each day, helps to improve and redefine how the world treats the most pressing health conditions, from heart disease to diabetes. Our industry leadership comes from the passion and ingenuity of our people. That's who we are. Working alongside one another, we use science, medicine, and a profound understanding of the human body to build extraordinary technologies that can transform lives.
**We build extraordinary solutions as one team** . With one Medtronic Mindset defining how we work. Speed and decisiveness run through our DNA. Diverse perspectives inspire our bold answers to any challenge that comes our way. And we deliver results the right way, breakthrough after patient breakthrough.
**This life-changing career is yours to engineer** . By bringing your ambitious ideas, unique perspective and contributions, you will.
+ **Build** a better future, amplifying your impact on the causes that matter to you and the world
+ **Grow** a career reflective of your passion and abilities
+ **Connect** to a dynamic and inclusive culture that welcomes the challenge of life-long learning
These commitments set our team apart from the rest:
**Experiences that put people first** . Respect for people is the hallmark of our humanity. It fuels our team to positively impact even a single life. And it means we put our people first at Medtronic as well, creating a culture of belonging and always pushing to get you the career-building resources you need.
**Life-transforming technologies** . No matter your role, you contribute to technologies that transform lives. What we build empowers patients to live life on their terms.
**Better outcomes for our world** . Here, it's about more than the bottom line. Our Mission to improve human welfare drives us. We advance healthcare, society, and equity with every design, inside and outside our walls.
**Insight-driven care** . Fresh viewpoints. Cutting-edge AI, data, and automation. You're shaping the future of healthcare technology and defining the next generation of breakthroughs in care
It is the policy of Medtronic to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state or local law. In addition, Medtronic will provide reasonable accommodations for qualified individuals with disabilities.
For sales reps and other patient facing field employees, going into a healthcare setting?is considered an essential function of the job and we expect our employees to comply with all credentialing requirements at the hospitals or clinics they support.
This employer participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here ( .
For updates on job applications, please go to the candidate login page and sign in to check your application status.
If you need assistance completing your application please email
To request removal of your personal information from our systems please email
Manager-Cybersecurity - Digital Certificate Management

Posted 5 days ago
Job Viewed
Job Description
**Role: Manager - Cybersecurity - Certificate Management Operations**
**About the Company:**
Join AT&T and reimagine the communications and technologies that connect the world. Our Chief Security Office ensures that our assets are safeguarded through truthful transparency, enforce accountability and master cybersecurity to stay ahead of threats. Bring your bold ideas and fearless risk-taking to redefine connectivity and transform how the world shares stories and experiences that matter. When you step into a career with AT&T, you won't just imagine the future-you'll create it.
**About the Job:**
We are seeking an experienced Cybersecurity Manager in Digital Certificate Management Operations to join our Cybersecurity team. The individual in this role will be responsible for leading and managing a team of 10+ experienced cybersecurity professionals in AT&T India. The Manager in this role leads, manages and works with team members on Digital Certificate Management operations
The ideal candidate will have deep functional and operational expertise in the Public Key Infrastructure (PKI), cryptography, and certificate lifecycle management to ensure the secure issuance, renewal, revocation, and overall management of digital certificates across the enterprise.
This role will collaborate with developers, network engineers, and security teams to maintain a robust and compliant certificate ecosystem that supports secure communications and data protection. This role will have hands-on experience with relevant tools and compliance frameworks.
**Experience Level:** 10+ years.
**Location:** Hyderabad / Bengaluru
**Responsibilities Include:**
+ Functionally lead and manage a team of 10+ experienced professionals in AT&T India
+ Manage PKI-related operations, mentor team members, and facilitate cross-team collaboration with security, DevOps, and infrastructure groups.
+ Manage certificate lifecycle operations including issuance, renewal, revocation, and cross-certification within complex CA hierarchies.
+ Enforce cryptographic key management policies including key generation, escrow, rotation, and destruction
+ Monitor certificate status and proactively address expirations to prevent service disruptions.
+ Troubleshoot and resolve certificate-related issues across multiple platforms and applications.
+ Automate certificate management processes using scripting languages and certificate management tools.
+ Maintain accurate documentation of certificate inventories, configurations, and operational procedures.
+ Collaborate closely with developers, security teams, network administrators, and other stakeholders to ensure secure and compliant certificate deployments.
+ Ensure compliance with PKI best practices, industry standards, and regulatory requirements.
+ Establish monitoring and alerting mechanisms for certificate expiration and operational health.
+ Participate in periodic reviews / checks and respond to certificate management-related queries.
+ Stay current with emerging trends, threats, and technologies in digital certificate management.
+ Lead incident response efforts related to certificate compromise or misuse.
+ Produce comprehensive documentation and communicate complex technical concepts clearly to diverse stakeholders.
+ Provide training and support to internal teams on certificate best practices.
+ Attention to detail and sense of urgency is crucial
+ Collaborate with leadership teams, provide subject matter expertise and insights.
+ Support and guide team members in providing high-quality services / deliverables.
+ Support, guide and mentor team members in technical and functional matters
+ Should be flexible to provide coverage in US morning hours
+ Should be flexible with shifts and supporting on weekends
**Required skills:**
+ Overall - At least 10+ years of experience in performing Digital Certificate Management Operations including:
**Core PKI & Security Skills**
+ Advanced understanding of X.509 certificates, CRLs, OCSP, and complex CA hierarchies (root, intermediate, issuing).
+ Expertise in certificate lifecycle management at scale, cross-certification, and trust model architectures.
+ Strong cryptographic knowledge including symmetric/asymmetric encryption, digital signatures, and hashing algorithms.
+ Proven experience with key management policies covering generation, escrow, rotation, and secure destruction.
+ Demonstrated ability to lead complex PKI operations and guide junior team members.
+ Excellent collaboration skills working with security, DevOps, infrastructure, and application teams.
+ Operationalize secure PKI systems integrated with IAM, SSO, MFA, and compliant with standards such as NIST, FIPS 140-2, and ISO 27001.
+ In-depth knowledge of networking protocols relevant to certificate distribution and validation: SSH, TLS/SSL, HTTPS, S/MIME, IPsec, VPNs, DNS, LDAP, HTTP.
+ Proven experience leveraging automation for certificate lifecycle management using scripting tools like PowerShell and Python
**Tools & Technologies:**
+ Hands-on experience with OpenSSL, Keytool, Certutil.
+ Familiarity with Microsoft AD CS, KeyFactor, Venafi, HashiCorp Vault, and EJBCA.
+ Experience managing Hardware Security Modules (HSMs) such as Thales and SafeNet.
+ ACME protocol for automated certificate lifecycle management
**Monitoring, Logging and Compliance:**
+ Lead and Operationalize certificate expiration monitoring and alerting systems to prevent outages.
+ Maintain thorough logging and auditing of all certificate operations for security and compliance purposes.
+ Proven ability to troubleshoot complex certificate-related issues across diverse platforms.
+ Strong documentation skills to support audit readiness and operational transparency.
**Automation**
+ Python with libraries like cryptography, pyOpenSSL, requests, subprocess for PKI automation and API integration.
+ PowerShell for Windows PKI environments (e.g., AD CS).
+ Bash scripting for Linux-based PKI tools and OpenSSL automation.
+ Java for working with PKI tools such as EJBCA and integrations like HashiCorp Vault.
+ Other automation tools: Ansible, Terraform, and CI/CD systems (GitHub Actions, Jenkins).
+ RESTful API integrations for DigiCert, HashiCorp Vault, and ACME protocol platforms.
**Desirable skills:**
+ Bachelor's or master's degree in computer science, mathematics, information systems, engineering, or cybersecurity.
+ Industry certifications such as CEH, CISSP, SANS and/or other relevant certifications
+ Ability to prioritize individual/group work in a high-stress and time-bound environment
+ Excellent communication, problem-solving, and analytical skills.
+ Ability to work independently and as part of a team.
**Additional information (if any):**
+ Should be flexible to provide coverage in US morning hours
+ Should be flexible with shifts and supporting on weekends
**Weekly Hours:**
40
**Time Type:**
Regular
**Location:**
IND:AP:Hyderabad / Argus Bldg 4f & 5f, Sattva, Knowledge City- Adm: Argus Building, Sattva, Knowledge City
It is the policy of AT&T to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state or local law. In addition, AT&T will provide reasonable accommodations for qualified individuals with disabilities. AT&T is a fair chance employer and does not initiate a background check until an offer is made.
AT&T will consider for employment qualified applicants in a manner consistent with the requirements of federal, state and local laws
We expect employees to be honest, trustworthy, and operate with integrity. Discrimination and all unlawful harassment (including sexual harassment) in employment is not tolerated. We encourage success based on our individual merits and abilities without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, disability, marital status, citizenship status, military status, protected veteran status or employment status
Cybersecurity Technical Lead or Manager
Posted today
Job Viewed
Job Description
Cybersecurity Technical Lead or Manager
8 to 10 Years
Hybrid (2:30pm-11:30pm) - Pune, Hyd
Job Description:
Key Responsibilities & Duties:
- Technical Leadership: Providing expert advice on cybersecurity matters, often involving deep technical understanding of network security, architecture, and controls.
- Strategy and Planning: Developing and implementing cybersecurity strategies, frameworks, and policies tailored to client or organizational needs.
- Risk Management: Conducting risk assessments, identifying vulnerabilities, and recommending mitigation strategies.
- Project Management: Leading and managing cybersecurity projects, ensuring timely and successful delivery of technical solutions.
- Team Management: Mentoring and guiding technical teams, conducting performance reviews, and fostering professional development within the team.
- Compliance and Standards: Ensuring projects and services align with industry compliance standards like GDPR, HIPAA, and SOC 2.
Skills and Requirements:
- Technical Proficiency: A robust technical background in Cybersecurity ,network security, system diagrams, and cybersecurity principles.
- Leadership and Communication: Ability to lead and mentor technical teams, communicate effectively with stakeholders, and manage client relationships.
- Analytical Skills: Proficiency in risk analysis, vulnerability management, and threat hunting.
- Certifications: Common certifications like CISSP (Certified Information Systems Security Professional)
VDart: Digital Consulting & Staffing Solutions
VDart is a leading digital consulting and staffing company founded in 2007 and headquartered in Alpharetta, Georgia. VDart is one of the top staffing companies in USA & also provides technology solutions, supporting businesses in their digital transformation journey. Digital consulting services, Digital consulting agency
Core Services:
- Digital consulting and transformation solutions
- Comprehensive staffing services (contract, temporary, permanent placements)
- Talent management and workforce solutions
- Technology implementation services
Key Industries: VDart primarily serves industries such as automotive and mobility, banking and finance, healthcare and life sciences, and energy and utilities. VDart - Products, Competitors, Financials, Employees, Headquarters Locations
Notable Partnership: VDart Digital has been a consistently strong supplier for Toyota since 2017 Digital Transformation Consulting & Strategy Services | VDart Digital , demonstrating their capability in large-scale digital transformation projects.
With over 17 years of experience, VDart combines staffing expertise with technology solutions to help organizations modernize their operations and build skilled workforce capabilities across multiple sectors.
Information Security Analyst - Database Security & Access Management

Posted 5 days ago
Job Viewed
Job Description
Wells Fargo is seeking a Information Security Analyst.
**In this role, you will:**
+ Participate and identify security risks companywide and ensure that appropriate data security procedures and products are implemented
+ Maintain an awareness of bank security policies and government regulations pertaining to information security
+ Review the development, testing, and implementation of security plans, products, and control techniques
+ Develop and implement security standards, procedures, and guidelines for multiple platforms and diverse systems environments
+ Investigate and recommend appropriate corrective actions for data security incidents
+ Identify regulatory changes that will affect information security policy, standards, procedures, and recommend appropriate changes
+ Provide security consulting and project management services on highly complex information security projects and issues
+ Collaborate and consult with peers, colleagues, and managers to resolve issues and achieve goals
+ Interact with internal customers
+ Receive direction from leaders and exercise independent judgment while developing the knowledge to understand function, policies, procedures, and compliance requirements
**Required Qualifications:**
+ 2+ years of Information Security Analysis experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
**Desired Qualifications:**
+ Bachelor of Engineering Degree, preferably of Computer science or Information Technology
+ 2+ years hands on experience on provisioning on Databases. Experienced on managing access, roles, and security of databases.
+ Must have strong knowledge in/or SQL, Oracle, Teradata, Sybase and DB2 platforms.
+ Must have hands-on experience on/or SQL Server Management Studio, SQL Developer, Teradata SQL Assistant, Sybase ASE, DB2
+ Good to have any one Database Administration/Information Security certification (Security +, CISSP, CIAM) /IAM vendor-based certifications (CyberArk, Oracle, IBM) certified.
+ Knowledge and experience with any IAM, Provisioning, role management and certification tool
**Job Expectations:**
+ Owns, tracks, and resolves database related incidents tickets submitted to Enterprise Access Management in the ServiceNow tool.
+ Provides basic and complex technical support for routine security-related issues.
+ Owns, tracks, and resolves database related project requests.
+ Responds to Database related alerts and escalations during business hours; participates in a rotation schedule for providing after business hours support working with fellow Database Information Security Analysts, Database Administrators or Engineering staff to come up with strategic solutions to recurring problems. **Shift timings: 1.30 - 10.30 PM** **3 Days Work from Office**
**Posting End Date:**
30 Aug 2025
**_*Job posting may come down early due to volume of applicants._**
**We Value Equal Opportunity**
Wells Fargo is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other legally protected characteristic.
Employees support our focus on building strong customer relationships balanced with a strong risk mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions. There is emphasis on proactive monitoring, governance, risk identification and escalation, as well as making sound risk decisions commensurate with the business unit's risk appetite and all risk and compliance program requirements.
Candidates applying to job openings posted in Canada: Applications for employment are encouraged from all qualified candidates, including women, persons with disabilities, aboriginal peoples and visible minorities. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process.
**Applicants with Disabilities**
To request a medical accommodation during the application or interview process, visit Disability Inclusion at Wells Fargo ( .
**Drug and Alcohol Policy**
Wells Fargo maintains a drug free workplace. Please see our Drug and Alcohol Policy ( to learn more.
**Wells Fargo Recruitment and Hiring Requirements:**
a. Third-Party recordings are prohibited unless authorized by Wells Fargo.
b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process.
**Req Number:** R-477882
Be The First To Know
About the latest Cybersecurity manager Jobs in Hyderabad !
Information Security Analyst - Database Security & Access Management
Posted today
Job Viewed
Job Description
Wells Fargo is seeking a Information Security Analyst.
In this role, you will:
- Participate and identify security risks companywide and ensure that appropriate data security procedures and products are implemented
- Maintain an awareness of bank security policies and government regulations pertaining to information security
- Review the development, testing, and implementation of security plans, products, and control techniques
- Develop and implement security standards, procedures, and guidelines for multiple platforms and diverse systems environments
- Investigate and recommend appropriate corrective actions for data security incidents
- Identify regulatory changes that will affect information security policy, standards, procedures, and recommend appropriate changes
- Provide security consulting and project management services on highly complex information security projects and issues
- Collaborate and consult with peers, colleagues, and managers to resolve issues and achieve goals
- Interact with internal customers
- Receive direction from leaders and exercise independent judgment while developing the knowledge to understand function, policies, procedures, and compliance requirements
- 2+ years of Information Security Analysis experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
- Bachelor of Engineering Degree, preferably of Computer science or Information Technology
- 2+ years hands on experience on provisioning on Databases. Experienced on managing access, roles, and security of databases.
- Must have strong knowledge in/or SQL, Oracle, Teradata, Sybase and DB2 platforms.
- Must have hands-on experience on/or SQL Server Management Studio, SQL Developer, Teradata SQL Assistant, Sybase ASE, DB2
- Good to have any one Database Administration/Information Security certification (Security +, CISSP, CIAM) /IAM vendor-based certifications (CyberArk, Oracle, IBM) certified.
- Knowledge and experience with any IAM, Provisioning, role management and certification tool
- Owns, tracks, and resolves database related incidents tickets submitted to Enterprise Access Management in the ServiceNow tool.
- Provides basic and complex technical support for routine security-related issues.
- Owns, tracks, and resolves database related project requests.
- Responds to Database related alerts and escalations during business hours; participates in a rotation schedule for providing after business hours support working with fellow Database Information Security Analysts, Database Administrators or Engineering staff to come up with strategic solutions to recurring problems.
Shift timings: 1.30 - 10.30 PM
3 Days Work from Office
30 Aug 2025
*Job posting may come down early due to volume of applicants.
We Value Equal Opportunity
Wells Fargo is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other legally protected characteristic.
Employees support our focus on building strong customer relationships balanced with a strong risk mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions. There is emphasis on proactive monitoring, governance, risk identification and escalation, as well as making sound risk decisions commensurate with the business unit's risk appetite and all risk and compliance program requirements.
Candidates applying to job openings posted in Canada: Applications for employment are encouraged from all qualified candidates, including women, persons with disabilities, aboriginal peoples and visible minorities. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process.
Applicants with Disabilities
To request a medical accommodation during the application or interview process, visit Disability Inclusion at Wells Fargo .
Drug and Alcohol Policy
Wells Fargo maintains a drug free workplace. Please see our Drug and Alcohol Policy to learn more.
Wells Fargo Recruitment and Hiring Requirements:
a. Third-Party recordings are prohibited unless authorized by Wells Fargo.
b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process.