122 Database Security jobs in Chennai
Information Security Analyst
Posted today
Job Viewed
Job Description
As a bank with a brain and a soul, Citi creates economic value that is systemically responsible and in our clients' best interests. As a financial institution that touches every region of the world and every sector that shapes your daily life, our **Foundational Services** teams are charged with a mission that rivals any large tech company. Our technology solutions are the foundations of everything we do. We keep the bank safe and provide the technical tools our workers need to be successful. We design our digital architecture and ensure our platforms provide a first-class customer experience. Our operations teams manage risk, resources, and program management. We focus on enterprise resiliency and business continuity. We develop, coordinate, and execute strategic operational plans. Essentially, Foundational Services re-engineers client and partner processes to deliver excellence through secure, reliable, and controlled services.
Trust is part of our DNA at Citi. As such, we take safeguarding our customer data very seriously. The Cloud Technology Services (CTS) is made up of deeply dedicated and talented colleagues who work together to ensure the safety of Citi's and our clients' assets and information. We manage information security as an end-to-end program - one with a clear mandate and accountability. Our mission is to continually execute and enhance a global security program that is fully anchored to modern control and security frameworks, fully aligned with the technology of the firm, threat-focused and data-driven, and deeply integrated across all Citi businesses globally.
Being talent-driven, we are focused on attracting, developing, and retaining diverse and inclusive talent with a high technical skill level. As a member of our team we will provide you with career development opportunities at all stages of your career. Our employees model a passion for protecting Citi and our clients and believe in treating others with dignity and respect.
This is an opportunity to work with Global Secrets Management Platforms team which is part of Citi's Cloud Technology Services. We are responsible for secrets management on-prem and the cloud for several hundred applications across the firm.
Our commitment to diversity includes a workforce that represents the clients we serve globally from all walks of life, backgrounds, and origins. We foster an environment where the best people want to work. We value and demand respect for others, promote individuals based on merit, and ensure opportunities for personal development are widely available to all. Ideal candidates are innovators with well-rounded backgrounds who bring their authentic selves to work and complement our culture of delivering results with pride. If you are a problem solver who seeks passion in your work, come join us. We'll enable growth and progress together.
**Information Security Analyst - PAM specialist**
We are opening our doors for talented individuals who are passionate about Cyber Security, want to be part of innovation by implementing and driving cutting edge technologies within a world class organization.
If you have a background in technology and interested to learn and grow with a world class Cyber Security team, then Citi is a place for you to be.
**Responsibilities:**
+ Provide BAU support for secrets management applications like CyberArk, HashiCorp Vault.
+ Collaborate with various internal and external stakeholders/support teams as required to support the application and business needs.
+ Work with client applications to provide integration/onboarding guidance.
+ Identify security vulnerabilities in the system and implement necessary solutions to remediate the vulnerabilities.
+ Strong Automation experience - Identify manual processes that can be smartly automated.
+ Ensure security best practice is followed and provide solutions to improve existing infrastructure processes in the company.
+ Be involved in the design and subsequent implementation of software and service infrastructure.
+ Provide on-call support in rotation as required.
+ Gather requirements and provide walkthroughs to businesses on usage of various SDKs and API services available for integration with Secrets/Identity and Access Management applications.
**Qualifications:**
+ 5+ Years' experience
+ Bachelor's in Engineering Degree (Computer Science or Equivalent)
+ Any trainings/certifications in Cybersecurity will be considered a plus
**Critical Competencies:**
+ CyberArk, HashiCorp Vault experience will be a big plus.
+ Basic experience working with one or more of these scripting languages - Python, Unix Shell, Perl, Go & PowerShell scripting.
+ Experience with one or more server operating system like Linux, Windows.
+ Experience/basic understanding of CHEF, Ansible, Terraform, CI/CD.
+ Experience with one or more cloud providers such as AWS, GCP, AZURE.
+ Understanding of containers and associated technologies like Kubernetes/OpenShift.
+ Excellent written and verbal communication skills
+ Ability to work across all levels of the organization.
+ Must have good analytical skills.
+ Strong customer and quality-focus.
+ Sound problem resolution, judgment, and decision-making skills .
+ Ability to work well individually and as part of a team.
**About Citi**
Citi, the leading global bank, has approximately 200 million customer accounts and does business in more than 160 countries and jurisdictions. Citi provides consumers, corporations, governments, and institutions with a broad range of financial products and services, including consumer banking and credit, corporate and investment banking, securities brokerage, transaction services, and wealth management.
Additional information may be found at | Twitter: @Citi ( | YouTube: | Blog: | Facebook: | LinkedIn: .
---
**Job Family Group:**
Technology
---
**Job Family:**
Information Security
---
**Time Type:**
Full time
---
**Most Relevant Skills**
Please see the requirements listed above.
---
**Other Relevant Skills**
For complementary skills, please see above and/or contact the recruiter.
---
_Citi is an equal opportunity employer, and qualified candidates will receive consideration without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other characteristic protected by law._
_If you are a person with a disability and need a reasonable accommodation to use our search tools and/or apply for a career opportunity review_ _Accessibility at Citi ( _._
_View Citi's_ _EEO Policy Statement ( _and the_ _Know Your Rights ( _poster._
Citi is an equal opportunity and affirmative action employer.
Minority/Female/Veteran/Individuals with Disabilities/Sexual Orientation/Gender Identity.
Information Security Analyst
Posted 3 days ago
Job Viewed
Job Description
About the company
Lexitas is a high growth company. The Company is built on a belief that having strong personal relationships with our clients, and providing reliable, accurate and professional services, is the driving force of our success.
Lexitas offers an array of services including local and national court reporting, medical record retrieval, process service, registered agent services and legal talent outsourcing. Our reach is truly national as well as international.
Lexitas is a MNC Company that has set up a subsidiary in Chennai, India – Lexitas India Pvt. Ltd. This Indian company will be the Lexitas Global Capability Center, helping build a world class IT development team, and over time serve as a Shared Services hub for several of the corporate functions.
For More Information -
This is a Full-Time Job located in Chennai, India.
Summary:
This position supports information security, privacy, risk and compliance programs and activities under the direction of the VP of Information Security or designated Information Security Manager. The position assists in developing and maintaining a comprehensive security program for Lexitas. Providing functional and technical support is important to maintain security posture and protection of electronically and physically stored information assets across our systems. Tasks include supporting design, implementation, configuration, documentation, and maintenance to mitigate risk to the business and its computing resources and assets, as well as collaborating with applicable providers, managing and monitoring tools, and facilitating applicable processes and procedures.
Key Roles and Responsibilities :
- Supports IT security, privacy, risk and compliance systems, processes, supporting activities, with the ability to lead activities and programs.
- Monitors computer networks and associated tools and provider services for security, privacy, risk and compliance issues
- Supports the project management, tracking, and documentation of Information, Privacy, Risk, and Compliance programs, processes, and activities
- Investigate security breaches and cybersecurity incidents.
- Documents security breaches and assesses impact.
- Performs and/or supports security tests, risk assessments, and audits to uncover network, application, and process vulnerabilities and provides guidance and training to ensure violations do not persist.
- Tracks and facilitates the mitigation of vulnerabilities to maintain a high security standard.
- Supports best practices for IT security, privacy and compliance.
- Performs and supports 3rd party vulnerability management and penetration testing.
- Research security enhancements and makes recommendations to management.
- Stays current on information technology trends and security standards.
- Prepares reports that detail security, privacy, and compliance risk assessment findings.
- Supports Security Operations Center functions including monitoring and supporting Incident Response activities.
- Supports all related IT Security, Privacy, Risk and Compliance policies and provides guidance to the business.
- Other Information Security, Privacy, Risk, and Compliance duties as required.
Skills and Abilities:
- Experience with computer network and application vulnerability management and penetration testing, and techniques.
- Solid understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts
- Ability to identify and mitigate network and application vulnerabilities.
- Good understanding of patch management
- Proficient with various OS
- Excellent written and verbal communication skills
- Knowledge of firewalls, antivirus, and intrusion detection system concepts
- Ability to support and document areas of Information Security, Privacy, Risk, and compliance processes and programs.
- Ability to support incident response process.
- Experience directing 3rd Party providers in the areas of Information Security, Privacy, Risk and Compliance
- Support information security controls including physical and data security protecting the confidentiality, integrity and availability of information systems data.
- Preferred KSA’s:
- Strong working knowledge and experience with primary Information Security, Privacy, Risk, and compliance standards and frameworks such as NIST, SOC 2, HIPAA, PCI DSS, GDPR, etc.
- Experience administering information security software and controls.
- Experience supporting process for managing network and application security.
- Network and system administration experience a plus.
- Good understanding of Standard Information Security Baseline Frameworks, Business Continuity, and Disaster Recovery protocols and best practices.
- Exposure to ITIL (Incident/Change Management) – ITIL v3F preferred.
- Learns and monitors the business processes for the areas of primary support responsibility.
- Support annual Security Baseline Audits and execution of recommendations.
- As part of the technology team, performs “Help Desk” day-to-day tasks in support of Information Security, Privacy, Risk, and Compliance.
Education and Experience:
- Bachelor’s degree in computer science or related field strongly preferred.
- IAT Level-2 technical certification strongly preferred (Comp TIA Security+ or CISSP) or ability to obtain within first 90 days of hire.
- 5+ years’ experience performing role of Information Security Analyst or SOC
- Demonstrated experience in responding to, managing, and resolving security incidents.
- Experience with LAN/WAN networking concepts, IP addressing and routing concepts, Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
- Experience with Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
- Experience working with Security Information and Even Management (SIEM) system is a plus.
Business Information Security officer
Posted 157 days ago
Job Viewed
Job Description
Yubi, formerly known as CredAvenue, is re-defining global debt markets by freeing the flow of finance between borrowers, lenders, and investors. We are the world's possibility platform for the discovery, investment, fulfilment, and collection of any debt solution. At Yubi, opportunities are plenty and we equip you with tools to seize it.
In March 2022, we became India's fastest fintech and most impactful startup to join the unicorn club with a Series B fundraising round of $137 million.
In 2020, we began our journey with a vision of transforming and deepening the global institutional debt market through technology. Our two-sided debt marketplace helps institutional and HNI investors find the widest network of corporate borrowers and debt products on one side and helps corporates to discover investors and access debt capital efficiently on the other side. Switching between platforms is easy, which means investors can lend, invest and trade bonds - all in one place. All of our platforms shake up the traditional debt ecosystem and offer new ways of digital finance.
Job Description
Act as the liaison between business units and corporate security teams to align objectives with robust security strategies.
Serve as the primary point of contact for clients for all security-related questions, concerns, and communications.
Develop and implement security policies, standards, and procedures tailored to business needs.
Lead risk assessments, identifying vulnerabilities that may impact business operations.
Facilitate regular communication between IT, security, and business leaders to ensure alignment.
Guide business units in understanding and mitigating cybersecurity risks.
Oversee compliance with applicable data protection regulations and internal security requirements.
Foster a culture of security awareness through training and effective communication.
Drive incident response planning and coordinate swift actions during security breaches.
Monitor emerging threats and continuously refine security practices to pre-empt risks.
Report risk assessments, metrics, and progress updates to executive leadership for strategic decision-making.
Collaborate with procurement and business teams to assess the security and privacy risks associated with third-party vendors used by the business units, ensuring compliance with TPRM policies.
Facilitate external Infosec audits by coordinating with auditors, providing necessary documentation and access, and ensuring timely responses to audit findings.
Maintain a strong understanding of the organization's security compliance obligations and work with business units to ensure adherence.
Drive initiatives to address compliance gaps and implement necessary controls.
RequirementsRequirement
Bachelor’s degree in Computer Science, Information Security, or a related field; a Master’s degree is often preferred.
Experience in “ISO 27001” is a must for the role.
2+ years of experience in cybersecurity, risk management, or IT security roles with increasing responsibilities.
Recognized certifications such as CISSP, CISM, or equivalent demonstrate proficiency in security best practices.
Proven track record in leading cross-functional teams and managing security programs in a complex business environment.
Deep understanding of compliance requirements, regulatory frameworks, and the ability to align security strategies with business objectives.
Excellent communication, interpersonal, and stakeholder management skills, with the ability to influence without authority
Strong analytical and problem-solving skills, with the ability to translate technical security concepts into business language.
Ability to work independently and collaboratively within a fast-paced, dynamic environment.
Strong understanding of information security principles, frameworks (e.g., ISO 27001, SOC2, NIST CSF), and relevant compliance regulations.
Threat Hunting Specialist - Information security
Posted 1 day ago
Job Viewed
Job Description
Remote Position: Hybrid
Region: Asia
Country: India
State/Province: Chennai
City: Guindy, Chennai
**Summary**
We are seeking a highly experienced and proactive Cybersecurity Senior Specialist to join our dedicated threat hunting team. In this senior role, you will be at the forefront of our defence strategy, proactively identifying, isolating, and neutralizing advanced cyber threats before they can impact our organization. You will leverage your deep expertise in security analytics, threat intelligence, and incident response to hunt for sophisticated adversaries within our complex network environments.
**Detailed Description**
+ Proactive Threat Hunting: Develop and execute advanced threat hunting missions using a hypothesis-driven approach. Proactively search for indicators of compromise (IOCs) and indicators of attack (IOAs) across endpoints, networks, and cloud environments.
+ Threat Intelligence Integration: Consume, analyze, and operationalize threat intelligence from various sources to inform hunting activities and enhance detection capabilities.
+ Advanced Analytics & Tooling: Utilize Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR), Network Detection and Response (NDR), and other security tools to identify anomalous patterns and malicious activity. Develop and refine custom detection rules and analytics.
+ Incident Response: Serve as a subject matter expert during high-priority security incidents. Conduct deep-dive forensic analysis to determine the root cause, scope, and impact of breaches.
+ Mentorship & Collaboration: Mentor junior analysts, share knowledge with the wider security team, and collaborate with security engineering to improve security posture and close visibility gaps.
+ Reporting & Communication: Clearly document and communicate findings, methodologies, and recommendations to both technical and executive stakeholders.
**Knowledge/Skills/Competencies**
+ Technical Expertise:
+ Proficiency with security tools such as SIEM (e.g., Splunk, Sumologic, Sentinel), EDR (e.g., CrowdStrike, SentinelOne), and packet capture analysis tools (e.g., Wireshark).
+ Strong understanding of the framework and its application in threat hunting.
+ In-depth knowledge of operating systems (Windows, Linux, macOS), network protocols (TCP/IP), and cloud security principles (AWS, Azure, GCP).
+ Experience with scripting languages (e.g., Python, PowerShell) for automation and analysis.
+ Strong understanding of cloud security concepts, platforms (AWS, Azure, GCP).
+ Experience in risk and compliance management and process development in the areas of information technology and security
+ Advanced knowledge of risk mitigation and business controls
+ Excellent problem resolution and creative problem-solving skills
+ Excellent project management skills and strong knowledge of change management processes
+ Analytical Mindset: Exceptional analytical, problem-solving, and critical-thinking skills with a keen eye for detail.
+ Communication: Excellent written and verbal communication skills, with the ability to articulate complex technical concepts to diverse audiences.
**Physical Demands**
+ Duties of this position are performed in a normal office environment.
+ Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. Repetitive manual movements (e.g., data entry, using a computer mouse, using a calculator, etc.) are frequently required.
**Typical Experience**
A minimum of 8-10 years of hands-on experience in cybersecurity, with at least 5 years dedicated to threat hunting, incident response, or security operations center (SOC) roles
**Typical Education**
+ Bachelor's Degree in Computer Science, Information Security, or a related field.
+ Must have at least 2 of the below certifications:o CompTIA Security+o CompTIA Cybersecurity Analyst (CySA+)o CompTIA Advanced Security Practitioner (CASP+)o Certified Ethical Hacker (CEH)o Offensive Security Certified Professional (OSCP)
+ Educational Requirements may vary by Geography
**Notes**
This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time.
Celestica is an equal opportunity employer. All qualified applicants will receive consideration for employment and will not be discriminated against on any protected status (including race, religion, national origin, gender, sexual orientation, age, marital status, veteran or disability status or other characteristics protected by law).
At Celestica we are committed to fostering an inclusive, accessible environment, where all employees and customers feel valued, respected and supported. Special arrangements can be made for candidates who need it throughout the hiring process. Please indicate your needs and we will work with you to meet them.
**COMPANY OVERVIEW:**
Celestica (NYSE, TSX: CLS) enables the world's best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development - from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers.
Celestica would like to thank all applicants, however, only qualified applicants will be contacted.
Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services.
Chief Information Security Officer (CISO) - Large Agri Enterprise
Posted 23 days ago
Job Viewed
Job Description
Role Overview
The Chief Information Security Officer (CISO) will be responsible for establishing and leading the information security strategy, governance, and execution across the Group's NBFC and Agro Trading entities. The role ensures compliance with RBI cybersecurity guidelines, data privacy laws, and sectoral best practices, while aligning security with business growth, digital initiatives, and risk management.
Key Responsibilities
1. Information Security Strategy & Governance
- Develop and implement the Group-wide Information & Cyber Security Framework aligned to RBI NBFC Cybersecurity Directions, ISO 27001, and NIST standards.
- Establish governance mechanisms to oversee security across both financial and agri-trading operations.
- Drive group-level cybersecurity policies, SOPs, and awareness programs .
- Report regularly to the Board / Risk & Audit Committee on cybersecurity posture, risks, and incidents.
2. Regulatory Compliance & Risk Management
- Ensure compliance with RBI's Cyber Security Framework for NBFCs , CERT-In directives, and relevant data privacy regulations (DPDP Act).
- Conduct periodic IT & IS audits, vulnerability assessments, and penetration tests.
- Manage regulatory inspections, audits, and reporting requirements.
- Establish a risk-based approach to protect sensitive customer, financial, and trading data.
3. Security Operations & Incident Response
- Establish a Security Operations Centre (SOC) / outsource managed services for continuous monitoring.
- Define and lead the Incident Response Plan (IRP) including detection, containment, investigation, and recovery.
- Coordinate cyber crisis management and business continuity planning across group entities.
- Oversee endpoint security, data protection, identity & access management, and fraud monitoring.
4. Technology & Process Security
- Implement and monitor network, application, and cloud security controls.
- Secure digital lending platforms, Oracle NetSuite ERP, mobile apps, and multiple customer portals for Agri Finance and Agri trading entities.
- Ensure trading operations (ERP, commodity platforms, Digital Marketplaces, External Interfaces) are safeguarded from cyber threats.
- Define secure DevSecOps practices for in-house and/or outsourced application development.
5. Leadership & Stakeholder Management
- Lead the Information Security team and coordinate with IT, Risk, Compliance, Legal, and Business Units.
- Work with external vendors, cybersecurity consultants, and regulators.
- Build a culture of security awareness across employees, agents, and third parties.
- Act as the single point of accountability for group-level cybersecurity.
Qualifications & Experience
- Bachelor's degree in IT/Computer Science/Engineering; Master's preferred.
- Certifications: CISSP / CISM / CISA / ISO 27001 Lead Implementer / CRISC (preferred).
- 12+ years of IT/Information Security experience, with at least 5 years in a leadership role.
- Proven experience in NBFC / BFSI cybersecurity compliance . Exposure to agri trading systems is an advantage.
- Strong understanding of RBI NBFC guidelines, DPDP Act, NIST, ISO 27001, cloud security, fraud risk management .
Key Competencies
- Strategic thinking with strong risk management mindset.
- Hands-on knowledge of security operations, threat management, and compliance.
- Ability to balance security with business agility and cost constraints of a mid-sized group.
- Excellent communication with senior management, regulators, and external partners.
- Leadership, influence, and cross-functional collaboration.
Success Metrics
- Zero major regulatory non-compliance findings.
- Timely reporting and closure of vulnerabilities and incidents.
- Improved security maturity score (e.g., ISO/NIST assessments).
- Enhanced employee security awareness levels.
- Reduced cyber risk exposure across NBFC and Agro Trading operations.
Security Engineer
Posted 21 days ago
Job Viewed
Job Description
Security Engineer: ( Microsoft Subject Matter Expert) :
Fulltime Remote
About the Role:
Do you want to be on the frontline fighting for safe use within the digital frontier? Does describing your job to your family and friends as being a cyberwarrior or threat hunter sound awesome or awe inspiring? Then join us as part of our Security Operations Center (SOC)
Engineering team as a Microsoft Services Subject Matter Expert (SME) supporting our frontline Threat Hunters. In addition, given the rapid changes within the Microsoft ecosystem you will also be working cross-functionally with Product Management and R&D Engineering to drive differentiation within our service as well with our Business Development team to help maintain the relationship with Microsoft.
While this role will have business responsibilities that will help you expand your career options, the primary day to day role is as a Security Engineer. As a Security Engineer, you will serve as a critical support system for the SOC. You will create, enhance, and tune alerts and detections so that the SOC can best defend our client's networks. Your goal will be to continually improve the detection and alerting that the SOC receives. In some cases, you will work directly with clients to ensure that they send us the most beneficial and important data. You will leverage our tech stack, elements of Microsoft and provide ongoing support both internally and externally. In short, you will be a critical member of the team using Microsoft Defender, Microsoft Sentinel, Microsoft Suite including Purview, Entra, Intune tools, the Pondurance SIEM and SOAR as well as other products and services to protect our clients in the ever-changing threat landscape.
Responsibilities:
Stay on the forefront of the Microsoft ecosystem
Drive security detection improvements
Tune existing alerts and client data in our SIEM tooling for optimal performance.
Identify workflow improvements and curate new automations through our SOAR platform
Assist in continuous improvement efforts to evaluate detection and response capabilities
Develop methods to detect potential threats
Maintain the SOAR platform in support of day-to-day SOC activities
Work with cross-functional teams to enhance detection capabilities
Qualifications:
Strong understanding of tuning alerts and pertinent logs to aid in detecting threats
Expert knowledge of Microsoft including, but not limited to Defender, Sentinel, Purview, Entra, and Intune
Experience building data retrieval from the Microsoft security ecosystem
Leveraging detection mechanisms within SIEMs and SOAR
A strong understanding of cyber-attacks, MITRE ATT&CK framework, emerging threats and threat modelling as well as security research techniques
Intermediate experience with Python, PowerShell, Bash or Go
Intermediate experience with IDS/IPS systems
Talents:
Ability to adjust and adapt in a fast pace and dynamic environment, including changes in responsibilities as the business evolves.
Capacity for Synthesis: bring together disparate elements to create a coherent entity or a big-picture overview in order to gain a new perspective
Applied Technical Thinking: apply specialized, theoretical knowledge to efficient operational uses
Demonstrate strong composure with a balance of urgency and intensity, as well as focus
Security Engineer 3
Posted 1 day ago
Job Viewed
Job Description
**Job Summary**
"Responsible for contributing towards the build and maintenance of the organization's cyber security systems and infrastructure. Exercises solid knowledge of engineering skills and methodology with a working knowledge of applicable cyber security compliance standards. Conducts security assessments and audits to identify cybersecurity risks within the company's networks, applications and operating systems. Helps secure and protect the Network Infrastructure: Routers, Switches, Optical Devices, L2 Datacenter and cabling, Strand Mounted devices, Secure Routing protocols, DOCSIS plant (CMTS/vCMTS/PON), SDN, best practice device configuration, network automation, monitoring and troubleshooting. Tests company's internal systems to validate security and detect any computer and information security weaknesses. Performs a technical analysis of vulnerabilities and determines the impacts to the organization Reports, tracks and records findings in a comprehensive vulnerability assessment report. Identifies and recommends appropriate action to mitigate vulnerabilities and reduce potential impacts on cybersecurity resources. Applies long-term objectives and plans related to the company's technical vision to daily activity. Applies innovative solutions for cyber engineering developmental problems that are competitive with industry and company standards. Has in-depth experience, knowledge and skills in own discipline. Usually determines own work priorities. Acts as a resource for colleagues with less experience.
Employees at all levels are expect to:
- Understand our Operating Principles; make them the guidelines for how you do your job
- Own the customer experience - think and act in ways that put our customers first, give them seamless digital options at every touchpoint, and make them promoters of our products and services
- Know your stuff - be enthusiastic learners, users and advocates of our game-changing technology, products and services, especially our digital tools and experiences
- Win as a team - make big things happen by working together and being open to new ideas
- Be an active part of the Net Promoter System - a way of working that brings more employee and customer feedback into the company - by joining huddles, making call backs and helping us elevate opportunities to do better for our customers
- Drive results and growth
- Respect and promote inclusion and diversity
- Do what's right for each other, our customers, investors and our communities"
**Job Description**
**The Company**
Founded in 1963, and headquartered in Philadelphia, Pennsylvania, Comcast Corporation (NASDAQ: CMCSA, CMCSK) is a global media and technology company with two primary businesses: NBCUniversal and Comcast Cable. NBCUniversal operates 30 news and entertainment cable networks, the NBC and Telemundo broadcast networks, television production operations, television station groups, Universal Pictures, and Universal Parks & Resorts. Comcast Cable Communications, LLC ("Comcast nation's largest video, high-speed internet, and phone provider to residential and business customers under the XFINITY brand. Comcast has invested in technology to build a sophisticated network that delivers the fastest broadband speeds and brings Cable") is the customers personalized video, communications, home management offerings and business services.
**COMCAST India**
Comcast India Engineering Center
Chennai One SEZ, Phase 2 (5th floor)
North Block, Phase 2, Module 7&8,
Pallavaram - Thoraipakkam 200 Feet Road,
Thoraipakkam,
Chennai-600 097.
**Summary:**
Want to do the best work of your life? With 24 million customers in 7 countries, make your mark at Europe's leading media and entertainment brand. A workplace where you can proudly be yourself; our people make Sky a truly exciting and inclusive place to work.
As a key member of Sky's Enterprise Technology Identity and Access Management Team you will help set the direction of our B2C strategy and roadmap as we expand the platform across new areas of the business. You will be working closely with platform owners and stakeholders to make adoption of B2C as frictionless as possible, through a deep understanding of the business requirements and how the technology can be applied to create the best customer experience. You will also be working to maintain our existing B2C solution and will be expected to make recommendations around best practice and upgrades to the platform owners and IAM manager.
**Website** - Skills:**
# **One identity, CyberArk, PAM, IS , NIST,** **Azure AD,** **CrowdStrike Identity Protection, bash,** **LDAP, SAML, OAuth, and OpenID Connect.**
**Core Responsibilities**
- **Design, develop, and implement IAM solutions using One Identity Manager** .
- Collaborate with other team members to ensure that IAM solutions meet business requirements, security standards, and regulatory compliance.
- **Develop custom scripts and processes to extend the functionality of One Identity Manager** .
- Configure and maintain **connectors for identity sources such as Active Directory, LDAP, and HR systems.**
- **Perform IAM solution testing, troubleshooting, and issue resolution.**
- Be responsible for the **development lifecycle, testing and deployment of your code,** ensuring change compliance is maintained throughout.
- Proactively ensure that the platform remains in line with emerging technologies by ensuring upgrades are completed in a timely manner.
- Provide technical guidance to clients and other team members on IAM best practices, solution design, and implementation.
- Participate in the development and delivery of client training programs and technical documentation as required.
- Have an identity first approach with a sound understanding of the concept of least privileged.
- Conduct regular audits and assessments of the IAM stack identify and address any security gaps or vulnerabilities.
- Work with auditors to and supply evidence as required.
- Stay ahead of the security curve and make best practice recommendations to senior management ( **NIST, NCSC** etc.)
- Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations.
- Mentoring and support for other members of the Team.
**Required Experience and Skills:**
- Solid understanding of **Identity Governance and Administration** platforms (preferably **One Identity** ) with at least 3 years' experience in the field.
- Strong understanding of I **AM concepts and protocols such as LDAP, SAML, OAuth, and OpenID Connect.**
- Expertise in cross platform scripting ( **TSQL, Powershell, bash etc** .).
- On premise and cloud directory services ( **LDAP, Azure AD, GSuite etc** .)
- Be a subject matter expert on both legacy and modern authentication protocols.
- Have excellent security awareness including standards e.g., **IS , NIST and CIS.**
- Have a good understanding of **Web APIs including SOAP, REST and GraphQL architectures.**
- Have a good understanding of Access Controls and Identity Lifecycle management.
- Have excellent communication and organisational skills.
**Desired Skills and experience:**
- Privileged Account Management **(preferably CyberArk)**
- Azure Identity Solutions ( **PIM, MFA, Conditional Access** etc.)
- Integration with IAM supporting software suites such as **SIEM (Splunk) and Crowstrike Identity Protection.**
- Familiarity with regulatory requirements such as **PCI-DSS, SOX, and GDPR** .
- **Certification in One Identity Manager** is highly desirable.
**Experience: 5 - 7.5 years**
**Location:** Chennai, Tamil Nādu Education: Bachelor's Degree or Equivalent
**#CIECTN25**
Comcast is an equal opportunity workplace. We will consider all qualified applicants for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, disability, veteran status, genetic information, or any other basis protected by applicable law.
Base pay is one part of the Total Rewards that Comcast provides to compensate and recognize employees for their work. Most sales positions are eligible for a Commission under the terms of an applicable plan, while most non-sales positions are eligible for a Bonus. Additionally, Comcast provides best-in-class Benefits to eligible employees. We believe that benefits should connect you to the support you need when it matters most, and should help you care for those who matter most. That's why we provide an array of options, expert guidance and always-on tools, that are personalized to meet the needs of your reality - to help support you physically, financially and emotionally through the big milestones and in your everyday life. Please visit the compensation and benefits summary ( on our careers site for more details.
**Education**
Bachelor's Degree
While possessing the stated degree is preferred, Comcast also may consider applicants who hold some combination of coursework and experience, or who have extensive related professional experience.
**Relevant Work Experience**
5-7 Years
**Job Family Group:** Information Technology
Be The First To Know
About the latest Database security Jobs in Chennai !
Security Engineer 2
Posted 1 day ago
Job Viewed
Job Description
**Job Summary**
"Responsible for contributing towards the build and maintenance of the organization's cyber security systems and infrastructure. Exercises solid knowledge of engineering skills and methodology with a working knowledge of applicable cyber security compliance standards. Conducts security assessments and audits to identify cybersecurity risks within the company's networks, applications and operating systems. Helps secure and protect the Network Infrastructure: Routers, Switches, Optical Devices, L2 Datacenter and cabling, Strand Mounted devices, Secure Routing protocols, DOCSIS plant (CMTS/vCMTS/PON), SDN, best practice device configuration, network automation, monitoring and troubleshooting. Tests company's internal systems to validate security and detect any computer and information security weaknesses. Performs a technical analysis of vulnerabilities and determines the impacts to the organization Reports, tracks and records findings in a comprehensive vulnerability assessment report. Identifies and recommends appropriate action to mitigate vulnerabilities and reduce potential impacts on cybersecurity resources. Applies long-term objectives and plans related to the company's technical vision to daily activity. Applies innovative solutions for cyber engineering developmental problems that are competitive with industry and company standards. Works with moderate guidance in own area of knowledge.
Employees at all levels are expect to:
- Understand our Operating Principles; make them the guidelines for how you do your job
- Own the customer experience - think and act in ways that put our customers first, give them seamless digital options at every touchpoint, and make them promoters of our products and services
- Know your stuff - be enthusiastic learners, users and advocates of our game-changing technology, products and services, especially our digital tools and experiences
- Win as a team - make big things happen by working together and being open to new ideas
- Be an active part of the Net Promoter System - a way of working that brings more employee and customer feedback into the company - by joining huddles, making call backs and helping us elevate opportunities to do better for our customers
- Drive results and growth
- Respect and promote inclusion and diversity
- Do what's right for each other, our customers, investors and our communities"
**Job Description**
We are seeking a motivated and detail-oriented Cybersecurity Network Security Engineer with 2-5 years of experience to join our enterprise security team. The ideal candidate will be responsible for implementing and maintaining network security controls, monitoring network traffic, and defending the organization against network-based threats. This is a critical role focused on securing enterprise networks and ensuring compliance with security policies.
**Key Responsibilities:**
+ - Implement, manage, and monitor network security devices including firewalls, IDS/IPS, VPNs, and proxies.
+ - Analyze and respond to network security incidents and anomalies in real-time.
+ - Conduct vulnerability assessments and remediate risks in network infrastructure.
+ - Collaborate with IT and Security teams to design and enforce secure network architectures.
+ - Perform regular network security reviews, audits, and risk assessments.
+ - Manage and optimizefirewall rules and access control lists across the enterprise.
+ - Support incident response activities and participate in root cause analysis.
+ - Maintain up-to-date documentation for network security infrastructure and policies.
**Required Skills & Experience:**
+ - 2-5 years of experience in network security, cybersecurity, or related IT security roles.
+ - Strong understanding of networking protocols, routing, switching, and firewall technologies.
+ - Hands-on experience with firewalls (e.g., Palo Alto, Fortinet, Cisco ASA), IDS/IPS, and SIEM solutions.
+ - Knowledge of VPNs, VLANs, and network segmentation principles.
+ - Familiarity with network monitoring and packet analysis tools (e.g., Wireshark, SolarWinds).
+ - Experience with cloud network security in AWS, Azure, or GCP is a plus.
+ - Understanding of regulatory compliance standards (e.g., ISO 27001, NIST, PCI-DSS).
+ - Scripting or automation experience (Python, PowerShell) is desirable.
**Preferred Qualifications:**
+ - Certifications such as CCNA Security, CompTIA Security+, Palo Alto PCNSA, or similar.
+ - Experience with Zero Trust Network Architecture (ZTNA).
+ - Knowledge of threat intelligence and network threat hunting.
Comcast is an equal opportunity workplace. We will consider all qualified applicants for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, disability, veteran status, genetic information, or any other basis protected by applicable law.
Base pay is one part of the Total Rewards that Comcast provides to compensate and recognize employees for their work. Most sales positions are eligible for a Commission under the terms of an applicable plan, while most non-sales positions are eligible for a Bonus. Additionally, Comcast provides best-in-class Benefits to eligible employees. We believe that benefits should connect you to the support you need when it matters most, and should help you care for those who matter most. That's why we provide an array of options, expert guidance and always-on tools, that are personalized to meet the needs of your reality - to help support you physically, financially and emotionally through the big milestones and in your everyday life. Please visit the compensation and benefits summary ( on our careers site for more details.
**Education**
Bachelor's Degree
While possessing the stated degree is preferred, Comcast also may consider applicants who hold some combination of coursework and experience, or who have extensive related professional experience.
**Relevant Work Experience**
2-5 Years
**Job Family Group:** Information Technology
Network Security Engineer
Posted today
Job Viewed
Job Description
Dear Candidate,
TCS has been a great pioneer in feeding the fire of young Techies like you. We are a global leader in the technology arena and there’s nothing that can stop us from growing together. Your role is of key importance, as it lays down the foundation for the entire project
Role : Network Security Engineer
Location : Bangalore/ Hyderabad/ Chennai/ Mumbai/ Indore
Experience : 10+ Years
Required Skills: Palo Alto Firewall, Panorama, F5 LTM Load Balancer and GTM, Infoblox.
Must Have:
- Should offer end to end IT infrastructure and Network Administration (Network Security)
- Should be dealing with fault-ticket (Service-Now), in co-ordination with Customer, application team or device vendor to resolve issues
- Should be dealing with various vendors & troubleshooting of various Network security related issues.
- Technical Support and Fault Management/troubleshooting for Network firewall and Load balancer issue.
- Configuration of firewall rules to allow or deny access as per the user/application requirement.
- Strong knowledge on leveraging advanced firewalls features like APP-ID, User-ID, Global Protect, Wild Fire, NAT policies and Security Profiles.
- Profound working knowledge of administration and management of Palo Alto firewalls using centralized Panorama and PAN-OS upgradation.
- Configuring various advanced features (Profiles, monitors, Redundancy, SSL Termination, Persistence, SNATS, HA on F5 BIGIP appliances SSL termination and initiation.
- Worked on configuring and troubleshooting Nodes, Pools, Profiles, Virtual Servers, SSL Certificates offloading.
- Working experience on iRules, policy and Big-IP F5 on LTM and GTM load balancers like GHA creation to provide uninterrupted service to customers/Application.
- Working experience on code upgrades of virtual and physical F5 LTM and GTM devices for feature and performance improvement and to mitigate security risk.
- Supported Infoblox appliances grid environment for DNS, DHCP and IP Address Management tools (IPv4) for the enterprise network.
- Worked on creating and maintaining new subnets, host with several record entries like CNAME, PTR, A, etc) with DHCP scopes using Graphical User Interface.
- In depth Knowledge on ITIL processes like Incident management, Problem Management, Configuration management and Change Management processes.
- Candidate should have been in a customer facing role with excellent communication skills.
- Strong technical knowledge and eagerness to learn new technologies
Regards,
Priscilla Nancy
HR TAG – CSP
Tata Consultancy Services
Cyber Security Engineer
Posted 3 days ago
Job Viewed
Job Description
Professional Summary: Please share your updated CV to , with the below details
Candidate Name
Mobile No.
Email ID
Current Company
Exp.
Notice Period
Current Location
Preferred Location
CCTC
ECTC
Location: Chennai
Exp.:11-13 years
- Industry Experience : 12+ years of professional experience, with over 5 years dedicated to medical device cybersecurity and regulatory compliance.
- Technical Development : Strong background in embedded systems development using Linux, C and C++ within the medical device sector.
- Security Implementation Expertise : Specialized in deploying robust security controls for medical devices, including secure authentication, authorization mechanisms, device connectivity, secure boot, and bootloader integration.
- Cybersecurity Risk Management: Proven track record in identifying and mitigating security risks in accordance with international regulatory standards such as FDA (Pre-market and Post-market), EU MDR, Japan PMDA, and China NMPA.
- Regulatory Standards & Compliance : Deep understanding of global security standards and guidelines, including ISO, IEC, AAMI, NIST, FDA, IMDRF, and MDCG, with a focus on medical device-specific security requirements and controls.
- Additional Competencies: Hands-on experience in penetration testing, Software Bill of Materials (SBOM) analysis, and vulnerability management.