257 Database Security jobs in Chennai
Information Security Engineer
Posted today
Job Viewed
Job Description
Key Responsibilities:
- Configure, manage, and monitor network firewalls (e.g., Palo Alto, Fortinet, Cisco, Check Point).
- Implement and maintain IPsec VPNs for secure remote access and site-to-site connectivity.
- Administer and optimize Web Application Firewalls (WAF) to protect application traffic.
- Deploy and manage reverse proxy solutions for secure internal application access.
- Operate and maintain Secure Service Edge (SSE) and Secure Web Gateway (SWG) platforms (e.g., Cisco Umbrella, Zscaler, Netskope).
- Analyze and document application traffic flow , identify bottlenecks, and implement secure data paths.
- Investigate security incidents and generate reports using security logs and SIEM tools.
- Participate in vulnerability management , threat assessments, and audit response activities.
- Collaborate with other IT, network, and application teams to integrate security across projects.
- Maintain up-to-date documentation on system configurations, procedures, and incident reports.
Qualifications and Skills:
Education:
- Bachelor s degree in Information Technology, Computer Science, Cybersecurity, or related field.
Required Technical Skills:
- 3+ years of hands-on experience in a cybersecurity or network security role.
- In-depth knowledge of:
- Firewall management (rules, NAT, policies)
- IPsec VPN setup and troubleshooting
- WAF platforms and configuration
- Reverse proxy solutions (e.g., F5, NGINX, Apache)
- SSE/SWG technologies and configurations
- Understanding of basic network protocols and architecture (TCP/IP, HTTP/S, DNS, routing).
- Familiarity with application working flows and traffic patterns.
Information Security Engineer
Posted today
Job Viewed
Job Description
Job Description
Role Summary: Designs and implements technical solutions for protecting the confidentiality, integrity and availability of sensitive information. Provides technical evaluations of client systems and assists with making security improvements. Provides technical support in the areas of vulnerability assessment, risk assessment, network security and security implementation. Conducts testing and audit log reviews to evaluate the effectiveness of current security measures. Conducts security product evaluations, and recommends products, technologies and upgrades to improve the client’s security posture.
Responsibilities :
Required Skills
Preferred Skills
Listen to the story of Employee Voice
Annette Barnabas
Business Analysis Associate DirectorIndia
Read more
Vanathi Asok
Director – Project and Application ServicesIndia
Read more
Swathi Sujir
Business Operations SupervisorIndia
Read more
Apply Back to search resultsInformation Security Engineer
Posted today
Job Viewed
Job Description
Job Role : -Information Security Engineer
Job Location : - Bangalore/Chennai
Experience :- 6+ Years
Job Roles & Responsibilities :-
- Conduct vulnerability assessments and policy compliance scanning using tools like Qualys across on-prem, cloud, container environments, databases, web services, and infrastructure.
- Validate scan results, eliminate false positives, and produce accurate, high-quality vulnerability reports.
- Act as technical SME to analyze findings, trace root causes, and recommend sustainable remediations to support teams.
- Maintain and share a knowledge base for vulnerability management, ensuring team-wide expertise.
- Research emerging vulnerabilities, trends, and improvements in the vulnerability management lifecycle.
- Communicate security policies, procedures, and compliance requirements clearly across all organizational levels.
- Provide leadership support by stepping in for the team lead when needed.
Job Skills & Requirements : -
Experience & Education
- 6+ years in information security
- Degree in Engineering, Computer Science, or related field.
- Industry certifications are a plus (e.g., CISSP, CISA, CISM, CRISC, CCNA/CCNP Security, CCIE).
Technical Proficiency
- Expert in vulnerability scanning and compliance tools (e.g., Qualys).
- Skilled in assessing on-prem, cloud, container (Docker, Kubernetes), databases, and application stacks.
- Experience with security infrastructure: firewalls, routers, switches, load balancers, proxies.
- Strong analytical capabilities for root-cause analysis and risk assessment.
Leadership & Communication
- Able to guide remediation efforts and influence infrastructure/application teams.
- Exceptional written and verbal communication, capable of clear reporting and policy articulation.
- Strong organizational, time-management, and team mentorship skills.
Additional Attributes
- Proactive learner, adaptable to evolving threats and technologies.
- Hands-on risk assessment and threat modeling expertise.
- Ready to take on ad-hoc duties and support team leadership as needed.
Senior Information Security Engineer
Posted today
Job Viewed
Job Description
Job Role : -Senior Information Security Engineer
Job Location : -Bangalore/Chennai
Experience : - 8+ Years
Job Roles & Responsibilities : -
- Lead vulnerability assessments and policy compliance scans across on prem, cloud, container (Docker/Kubernetes), database, and web environments using tools like Qualys.
- Validate scan results, eliminate false positives, and deliver accurate, actionable reports to stakeholders.
- Serve as technical SME: analyze findings, diagnose root causes, and guide remediation efforts.
- Develop and maintain a knowledge base to support continuous improvement and team expertise.
- Stay current on emerging threats, tools, and VM lifecycle advancements; recommend service enhancements.
- Communicate security requirements effectively across the organization and step in as interim team lead when necessary.
Job Skills & Requirements : -
Experience & Education
- 8+ years in information security
- Bachelor s in Engineering, CS, IT, or equivalent.
- Industry certifications preferred: CISSP, CISA, CISM, CRISC, CCNA/CCNP/CCIE Security.
Technical Expertise
- Proficient with vulnerability scanning platforms (Qualys, Nessus, etc.), false-positive tuning, and compliance frameworks.
- Experience across cloud, on prem systems, network devices (routers, firewalls, proxies), and infrastructure components.
- Skilled in risk/threat assessment and security policy enforcement.
- Familiar with containers, DDI (DNS/DHCP/IPAM), WAF/CDN/DDOS solutions (e.g., Infoblox, Zscaler, Imperva).
- Advantageous: scripting (Python), and use of monitoring tools like Spectrum, SevOne, ThousandEyes, CyberArk, MS Entra ID.
Soft Skills & Leadership
- Excellent analytical, communication, and report-writing abilities.
- Strong organizational and time-management skills.
- Demonstrated leadership: capable of guiding teams, managing escalations, and fostering security culture.
- Adaptable self-starter with a commitment to continuous learning and proactive problem solving.
Information Security Analyst
Posted 2 days ago
Job Viewed
Job Description
About the company
Lexitas is a high growth company. The Company is built on a belief that having strong personal relationships with our clients, and providing reliable, accurate and professional services, is the driving force of our success.
Lexitas offers an array of services including local and national court reporting, medical record retrieval, process service, registered agent services and legal talent outsourcing. Our reach is truly national as well as international.
Lexitas is a MNC Company that has set up a subsidiary in Chennai, India – Lexitas India Pvt. Ltd. This Indian company will be the Lexitas Global Capability Center, helping build a world class IT development team, and over time serve as a Shared Services hub for several of the corporate functions.
For More Information -
This is a Full-Time Job located in Chennai, India.
Summary:
This position supports information security, privacy, risk and compliance programs and activities under the direction of the VP of Information Security or designated Information Security Manager. The position assists in developing and maintaining a comprehensive security program for Lexitas. Providing functional and technical support is important to maintain security posture and protection of electronically and physically stored information assets across our systems. Tasks include supporting design, implementation, configuration, documentation, and maintenance to mitigate risk to the business and its computing resources and assets, as well as collaborating with applicable providers, managing and monitoring tools, and facilitating applicable processes and procedures.
Key Roles and Responsibilities :
- Supports IT security, privacy, risk and compliance systems, processes, supporting activities, with the ability to lead activities and programs.
- Monitors computer networks and associated tools and provider services for security, privacy, risk and compliance issues
- Supports the project management, tracking, and documentation of Information, Privacy, Risk, and Compliance programs, processes, and activities
- Investigate security breaches and cybersecurity incidents.
- Documents security breaches and assesses impact.
- Performs and/or supports security tests, risk assessments, and audits to uncover network, application, and process vulnerabilities and provides guidance and training to ensure violations do not persist.
- Tracks and facilitates the mitigation of vulnerabilities to maintain a high security standard.
- Supports best practices for IT security, privacy and compliance.
- Performs and supports 3rd party vulnerability management and penetration testing.
- Research security enhancements and makes recommendations to management.
- Stays current on information technology trends and security standards.
- Prepares reports that detail security, privacy, and compliance risk assessment findings.
- Supports Security Operations Center functions including monitoring and supporting Incident Response activities.
- Supports all related IT Security, Privacy, Risk and Compliance policies and provides guidance to the business.
- Other Information Security, Privacy, Risk, and Compliance duties as required.
Skills and Abilities:
- Experience with computer network and application vulnerability management and penetration testing, and techniques.
- Solid understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts
- Ability to identify and mitigate network and application vulnerabilities.
- Good understanding of patch management
- Proficient with various OS
- Excellent written and verbal communication skills
- Knowledge of firewalls, antivirus, and intrusion detection system concepts
- Ability to support and document areas of Information Security, Privacy, Risk, and compliance processes and programs.
- Ability to support incident response process.
- Experience directing 3rd Party providers in the areas of Information Security, Privacy, Risk and Compliance
- Support information security controls including physical and data security protecting the confidentiality, integrity and availability of information systems data.
- Preferred KSA’s:
- Strong working knowledge and experience with primary Information Security, Privacy, Risk, and compliance standards and frameworks such as NIST, SOC 2, HIPAA, PCI DSS, GDPR, etc.
- Experience administering information security software and controls.
- Experience supporting process for managing network and application security.
- Network and system administration experience a plus.
- Good understanding of Standard Information Security Baseline Frameworks, Business Continuity, and Disaster Recovery protocols and best practices.
- Exposure to ITIL (Incident/Change Management) – ITIL v3F preferred.
- Learns and monitors the business processes for the areas of primary support responsibility.
- Support annual Security Baseline Audits and execution of recommendations.
- As part of the technology team, performs “Help Desk” day-to-day tasks in support of Information Security, Privacy, Risk, and Compliance.
Education and Experience:
- Bachelor’s degree in computer science or related field strongly preferred.
- IAT Level-2 technical certification strongly preferred (Comp TIA Security+ or CISSP) or ability to obtain within first 90 days of hire.
- 5+ years’ experience performing role of Information Security Analyst or SOC
- Demonstrated experience in responding to, managing, and resolving security incidents.
- Experience with LAN/WAN networking concepts, IP addressing and routing concepts, Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
- Experience with Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
- Experience working with Security Information and Even Management (SIEM) system is a plus.
Information Security Architect
Posted today
Job Viewed
Job Description
As a Principal Information Security Architect you will utilize your extensive cybersecurity knowledge including threat modeling, risk assessment, and security controls; expertise in secure software architecture design and security governance frameworks; proficiency in programming languages and security assessment tools.
Job Functions:
- Develop and communicate a strategic security vision and roadmap aligned with the organization's business objectives.
- Ensure that the security strategy guides security initiatives, technology choices, and risk management efforts.
- Design secure architectures for software systems and infrastructure, including threat modeling, security controls, and secure coding practices.
- Ensure that security designs are implemented consistently and meet industry best practices.
- Ensure compliance with industry regulations, standards, and internal security policies. Monitor and report on security compliance.
- Develop risk mitigation strategies, including security controls, incident response plans, and disaster recovery procedures.
- Ensure that the organization's workforce is educated about security risks and best practices.
- Lead and coordinate responses to security incidents, ensuring lessons learned are incorporated into security improvements.
Basic Qualifications:
- Bachelor's degree in a related field, such as computer science, information security, cybersecurity, or a related discipline
- 10 years of related experience in Information Security
Preferred Qualifications
- Master's degree in IT, Computer Science, information security, cybersecurity, or related field
- 12 years of related experience in Information Security
- Certification in relevant security domains (e.g., GDSA, CISSP-ISSAP, CISM, CISA)
Must be 18 years of age or older
Benefits
In line with our commitment to employee wellbeing, our total rewards benefits package is designed to support the physical, financial, and emotional health of our employees, tailored to meet their unique and evolving needs. Our approach considers our employees' whole selves, ensuring they can thrive both in and outside of work. Here are some of the benefits we offer, which may vary based on role, location, or hours worked:
- Healthcare (Medical, Dental, Vision)
- Paid Time Off, Volunteer Time Off, and Holidays
- Employer-Matched Retirement Plan
- Employee Stock Purchase Plan
- Short-Term and Long-Term Disability
- Infertility Treatment, Adoption and Surrogacy Assistance
- Tuition Reimbursement
These benefits are designed to enhance the health, protect the financial security, and provide peace of mind to our employees and their families.
Deluxe Corporation is an Equal Employment Opportunity employer:
All qualified applicants will receive consideration for employment without regard to race, color, creed, religion, disability, sex, age, ethnic or national origin, marital status, sexual orientation, gender identity or presentation, pregnancy, genetics, veteran status or any other status protected by state or federal law.
Please view the electronic EEO is the Law Poster which serves to inform you of your equal employment opportunity protections as part of the application process.
Reasonable Accommodation for Job Seekers with a Disability:
If you require reasonable accommodation in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please direct your inquiries to
Head - Information Security
Posted today
Job Viewed
Job Description
Job Purpose
To provide a hassle free trading environment to the clients. Satisfying the clients by providing a timely assistance thereby generating revenue to the organization and goodwill. Launching of New products in the online trading platform to the customers for satisfying their various investment needs
Job Context & Major Challenges
Job Context
ABM has a daily turnover of over 1,000 crores and has been rapidly improving its market shares in the various segments it operates in. In the otherwise fragmented equity broking business, ABM has doubled it market share to over 1.6% of retail cash equity volumes in the last 18 months. The commodity market shares have also doubled during this period. ABM remains one of the largest distributor for BSLI and BSLAMC and the largest distributor for other manufacturing organisations within ABFSG. ABM brings value to other line of business within ABFSG and adds Rs ~ 25-30 Crores to the bottom line of BSLI / BSLAMC / ABFL / ABPE etc ABM works in a highly regulated environment with a host of regulators like SEBI, RBI, AMFI, FMC, IRDA etc. regulating it s day to day operations.In addition to the regulator ABM is also subject to close monitoring and inspection through various agencies like NSE / BSE / NCDX / MCX/ NSDL / CDSL etc. AABM has a daily turnover of over 1,000 crores and has been rapidly improving its market shares in the various segments it operates in. In the otherwise fragmented equity broking business, ABM has doubled it market share to over 1.6% of retail cash equity volumes in the last 18 months. The commodity market shares have also doubled during this period. ABM remains one of the largest distributor for BSLI and BSLAMC and the largest distributor for other manufacturing organisations within ABFSG. ABM brings value to other line of business within ABFSG and adds Rs ~ 25-30 Crores to the bottom line of BSLI / BSLAMC / ABFL
/ ABPE etc ABM works in a highly regulated environment with a host of regulators like SEBI, RBI, AMFI, FMC, IRDA etc. regulating it s day to day operations.In addition to the regulator ABM is also subject to close monitoring and inspection through various agencies like NSE / BSE / NCDX / MCX/ NSDL / CDSL etc. ABM also operates in a highly competitive market mainly in fragmented industry with ABML competition from major National Broking houses like ICICI Securities, HDFC Securities, Angel Broking, MOFSL etc. and a range of local Broking outfits. On the other hand ABMML competition is from Major Distribution Houses like NJ India Invest, Bajaj Capital Prudent, IIFL and a range of Banks (both Indian and MNC). . Product Management Process: The Product Management process includes planning and execution throughout the product lifecycle, including gathering and prioritizing product and customer requirements and working closely with Technical Team and vendor and customer satisfaction goals are met. Product Maintenance: Coordinating with vendors and dev elopers for managing change during the UAT and post implementation phase. Impact Analysis of the Change Requests on the system and follow up on bugs. It also includes Version up gradation and Product enhancement as and when required. Product Support: Product support involves a series of activities which includes Providing Technical and Functional assistance to Internet clients throughout the trading hours and having a dedicated customer care desk for handling all types issues/queries.
Key Result Areas
KRA (Accountabilities) (Max 1325 Characters)
Supporting Actions (Max 1325 Characters)
KRA1 Product Management- Include gathering the requirements from the clients perspective and from a business perspective, doing benchmarking, preparing BRD's, undergoes thorough checking of the products in UAT, coordinating with the vendor for rectifying the bugs and also explaining the requirements to them
KRA2 Product Maintenance: The functionality checking of Trading Platforms has to be carried out on a regular basis. Should ensure that we are providing absolute error free software to the clients. On the event of an issue, should coordinate with the Vendors directly or in directly, should escalate the issue to the higher authorities and ensures that the issue is resolved at the earliest. Clients must be communicated well about the issue and also should provide them some alternatives till the issue has been resolved
KRA3 Product Support Providing support to the clients includes both Technical and Functional Assistance of Trading. When a new product is launched or some up- gradation has been taken place in a product, ensures that clients are all aware of the changes by providing Product Demos to the PAN India Branches, providing a support desk for all clients/branches, sending mailers/teasers etc.
KRA4 Exchange Compliance regarding IBT Submitting the IBT Trade/Volume confirmation in NSE and BSE.
Be The First To Know
About the latest Database security Jobs in Chennai !
Lead - Information Security
Posted today
Job Viewed
Job Description
Role & responsibilities:
- Serve as the onsite cybersecurity lead and advisor for the client.
- Conduct security posture assessments, identify risks, and recommend appropriate controls.
- Guide the development and enforcement of security policies, standards, and procedures.
- Review and monitor client IT and security operations to ensure risk mitigation and compliance.
- Support the client during audits, compliance checks, and incident investigations.
Advise on and oversee areas such as:
Secure configurations and hardening
Identity & Access Management (IAM)
Vulnerability management & patch governance
Network, endpoint, and cloud security
Data protection & privacy controls
Coordinate with the company's backend cybersecurity team for advanced needs such as:
Threat intelligence and analysis
Incident response and digital forensics
Advanced penetration testing and vulnerability assessments
Red/blue team exercises
Prepare and present security reports, dashboards, and recommendations to client management.
- Act as a trusted security partner to both technical teams and business executives at the client site
Preferred candidate profile
- Bachelors degree in computer science.
- Relevant certifications such as CEH, CISSP, CISA, or ISO 27001 Lead Implementer.
- At least 5 years of experience in cybersecurity, regulatory compliance, or related roles.
- Strong knowledge of:
- Security frameworks (NIST CSF, ISO 27001, CIS Controls)
- Regulatory compliance (DPDP)
- Risk assessment and governance methodologies.
- Understanding of IT and security domains (networks, endpoints, cloud, applications).
- Hands-on experience with vulnerability management, penetration testing, IAM, and incident response.
- Strong communication and stakeholder management skills.
Preferred Skills:
- Ability to work independently onsite while effectively leveraging remote expert teams.
- Consultative mindset, able to translate technical risks into business impact and executive-level insights.
- Strong understanding of cybersecurity tools and frameworks.
- Analytical and problem-solving skills with attention to detail.
Information Security Analyst
Posted today
Job Viewed
Job Description
- An Information Security Analyst monitors and protects an organization's computer networks and systems from cyber threats and data breaches. Key responsibilities include implementing security software like firewalls and encryption, conducting vulnerability assessments and penetration tests, responding to and mitigating security incidents, developing security policies and best practices, creating disaster recovery plans, and educating employees on security awareness. They stay current with emerging threats and often collaborate with IT staff and management to enhance overall security posture.
- Key Responsibilities Monitoring and Detection: Continuously monitor networks for suspicious activity, potential breaches, and viruses.
- Vulnerability Assessment: Identify weaknesses in systems and networks through testing and analysis to prevent unauthorized access. .
- Incident Response: Investigate, respond to, and mitigate security incidents and cyberattacks to minimize damage.
- Implementation of Security Measures: Install and maintain security safeguards, including firewalls, encryption software, and antivirus programs.
- Policy Development: Create and enforce security policies, standards, and best practices for the organization. .Reporting: Prepare detailed reports on attempted attacks, security breaches, and security metrics for management and stakeholders.
- Disaster Recovery: Develop and help implement disaster recovery plans to ensure continued IT operations during emergencies.
- Employee Education: Train employees on cybersecurity awareness, proper security procedures, and best practices to prevent attacks.
- Research and Awareness: Stay updated on the latest cybersecurity trends, technologies, and emerging threats by consulting external sources and industry publications.
- Essential Skills
- Technical Proficiency: Deep knowledge of computer networks, operating systems, security tools, and programming languages like Python and JavaScript.
- Analytical Skills: Ability to quickly process large datasets to identify security vulnerabilities and patterns.
- Communication Skills: Strong ability to explain complex technical information clearly to both technical and non-technical audiences.
- Problem-Solving: Aptitude for diagnosing issues and developing effective mitigation techniques for security threats.
- Attention to Detail: Meticulous in monitoring systems and reviewing security measures for potential gaps.
- Tamil candidates only
Job Type: Full-time
Pay: ₹340, ₹1,167,607.61 per year
Benefits:
- Food provided
Work Location: In person