2,444 Security Monitoring jobs in India
Sr Engineer( Network Security Monitoring) - Target India
Posted 2 days ago
Job Viewed
Job Description
As a Fortune 50 company with more than 400,000 team members worldwide, Target is an iconic brand and one of America's leading retailers.
Joining Target means promoting a culture of mutual care and respect and striving to make the most meaningful and positive impact. Becoming a Target team member means joining a community that values different voices and lifts each other up. Here, we believe your unique perspective is important, and you'll build relationships by being authentic and respectful.
**Overview about TII**
At Target, we have a timeless purpose and a proven strategy. And that hasn't happened by accident. Some of the best minds from different backgrounds come together at Target to redefine retail in an inclusive learning environment that values people and delivers world-class outcomes. That winning formula is especially apparent in Bengaluru, where Target in India operates as a fully integrated part of Target's global team and has more than 4,000 team members supporting the company's global strategy and operations.
**(Pyramid overview)**
Network Security Monitoring (NSM) Position About Network Security Monitoring: Target's Network Security Monitoring (NSM) team builds and maintains a fleet of over 2000 network sensors across the globe, providing network visibility and advanced monitoring capabilities to our Cyber Defense organization. We build scalable and maintainable infrastructure with full end-to-end ownership of both the hardware and software lifecycle. Our work enables timely detection and response of adversaries by delivering reliable network visibility through a resilient sensor grid and advanced monitoring capability.
**Team Overview**
NSM team members regularly: - Collaborate with Networking partners on network design and network sensor placement - Build, deploy, and upgrade network sensors (servers) globally - Design and implement network traffic analysis solutions using engines like Zeek and Suricata - Leverage Salt for configuration management, deployment automation, and infrastructure-as-code implementation - Partner with Cyber Defense to build network-based detections and consult in response scenarios - Develop performance monitoring solutions to track data quality and sensor health to ensure grid health and data fidelity
**Position Overview**
Expect to: - Configure, troubleshoot, and optimize network sensors across diverse environments
- Debug complex networking issues and perform packet-level analysis to ensure proper traffic visibility.
- Build and maintain Salt-based automation for configuration management and deployment.
- Analyze monitoring data to identify system improvements and validate detection coverage.
- Develop and automate testing to ensure results and outcomes are as expected.
- Participate in on-call rotations to support the global sensor grid and respond to critical issues.
- Collaborate cross-functionally with teams throughout Cyber Defense and IT - Document operational procedures for sensor management best practices - Research new network security monitoring technologies and evaluate their potential implementation.
- Contribute to capacity planning and architectural design of monitoring infrastructure.
- Manage and maintain Linux/Unix-based systems that host Zeek sensors, ensuring high availability, performance, and security.
- Perform OS-level troubleshooting, patching, and hardening of sensor infrastructure.
- Automate server provisioning and configuration using tools like Salt, shell scripting, and Python.
- Monitor system logs and metrics to proactively identify and resolve issues affecting sensor performance.
**About you:**
**-** Bachelor's degree in Networking, Computer Science, or related field (or equivalent experience).
- 4+ years of experience in network administration, network security, or related roles, with a deep knowledge of network protocols and packet analysis.
- Experience with network security monitoring tools, including Zeek and Suricata.
- Strong foundation in automation and infrastructure as code, Salt experience preferred.
- You understand CI/CD principles and can implement pipelines for testing and deploying code and configuration changes.
- Proficient in Linux/Unix systems administration, including shell scripting, system tuning, and troubleshooting.
- Hands-on experience managing server infrastructure in production environments, including patching, upgrades, and performance tuning.
- Practical experience with packet capture technologies and traffic analysis tools.
- Proven ability to troubleshoot complex distributed systems and methodically diagnose network issues.
- You appreciate the importance of dev/prod parity and can design for consistent environments across dev and prod.
- Experience writing custom detection rules and understanding their performance implications.
- Familiarity with technologies such as Zabbix, Prometheus, Nagios, Grafana, Elastic, Kibana
**Useful Links-**
**Life at Target-** ** ** Link:** **
Incident Response Analyst
Posted 2 days ago
Job Viewed
Job Description
25WD92064
**Position Overview**
The Incident Response Analyst is responsible for monitoring, identifying, assessing, containing, and responding to various information security events in a large and complex environment, as well as analyse, triage, and report on these incidents and investigations. The candidate must have knowledge of system security design, network/cloud security best practices and in-depth knowledge of systems security operations, threat actors frequently used attack vectors, and general user behaviour analytics. The candidate will be part of an established security team and work closely with teams across the company in remediating security issues and driving Incident Response. The candidate should have a strong passion for security and growth and be willing to accept challenging projects and incidents.
**Responsibilities**
+ Responsible for handling day-to day operations to monitor, identity, triage and investigate security events from various Endpoint (EDR), Network and Cloud security tools and detect anomalies, and report remediation actions
+ Analyze firewall logs, server, and application logs to investigate events and incidents for anomalous activity and produce reports of findings
+ Conduct reviews and analysis of proxy logs, Microsoft Windows and Active Directory logs, and malicious code to identify, contain, eradicate, and ensure recovery from incidents
+ Help create and maintain process tools and documentation
+ Perform all stage of incident response from detection to postmortem
+ Collaborate with stakeholders in building and improving our Security Orchestration Platform
+ Clearly document notes for incidents in our case management solution
+ Perform basic forensics and malware analysis based on our playbooks and procedures
+ Responsible for working in a 24/7 environment including night shifts and the shifts are decided based on the business requirement
+ Maintain a high level of confidentiality and Integrity
**Minimum Qualifications**
+ BS in Computer Science, Information Security, or equivalent professional experience
+ 2+ years of cyber security experience in incident response
+ Technical depth in one or more specialties including: Malware analysis, Host analysis and Digital forensics
+ Strong understanding of Security Operations and Incident Response process and practices
+ Experience performing security monitoring, response capabilities, log analysis and forensic tools
+ Strong understanding of operating systems including Windows, Linux and OSX
+ Experience with SIEM, SOAR, EDR, Network, AWS, and Azure security tools
+ Excellent critical thinking and analytical skills, organizational skills, and the ability to work as part of a team
+ Excellent verbal and written communication skills
+ Ability to design playbooks for responding to security incidents
+ Ability to support off-hours, weekends, and holidays if needed in support of incident response
**Preferred Qualifications**
+ Advanced interpersonal skills to effectively promote ideas and collaboration at various levels of the organization
+ One or more security-related certifications from any of the following organizations: GCIH, GCFE, GCFA, AWS, Azure Cloud security Certifications or equivalent is desired
#LI-PJ1
**Learn More**
**About Autodesk**
Welcome to Autodesk! Amazing things are created every day with our software - from the greenest buildings and cleanest cars to the smartest factories and biggest hit movies. We help innovators turn their ideas into reality, transforming not only how things are made, but what can be made.
We take great pride in our culture here at Autodesk - it's at the core of everything we do. Our culture guides the way we work and treat each other, informs how we connect with customers and partners, and defines how we show up in the world.
When you're an Autodesker, you can do meaningful work that helps build a better world designed and made for all. Ready to shape the world and your future? Join us!
**Salary transparency**
Salary is one part of Autodesk's competitive compensation package. Offers are based on the candidate's experience and geographic location. In addition to base salaries, our compensation package may include annual cash bonuses, commissions for sales roles, stock grants, and a comprehensive benefits package.
**Diversity & Belonging**
We take pride in cultivating a culture of belonging where everyone can thrive. Learn more here: you an existing contractor or consultant with Autodesk?**
Please search for open jobs and apply internally (not on this external site).
Senior Security Monitoring and Response Analyst - Business Continuity, Operational Resilience
Posted 2 days ago
Job Viewed
Job Description
_Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential._
**Title and Summary**
Senior Security Monitoring and Response Analyst - Business Continuity, Operational Resilience
Who is Mastercard?
Mastercard is a global technology company in the payments industry. Our mission is to connect and power an inclusive, digital economy that benefits everyone, everywhere by making transactions safe, simple, smart, and accessible. Using secure data and networks, partnerships and passion, our innovations and solutions help individuals, financial institutions, governments, and businesses realize their greatest potential.
Our decency quotient, or DQ, drives our culture and everything we do inside and outside of our company. With connections across more than 210 countries and territories, we are building a sustainable world that unlocks priceless possibilities for all.
Mission First, People Always
As Corporate Security, we are responsible for keeping Mastercard safe and secure from cyber and physical threats, and it is our people on the frontlines who make this happen every day.
By taking care of our people, their wellbeing, and career development, we provide them the necessary tools and environment to ensure the success of our mission.
Overview
The Enterprise Resilience Team is looking for a Senior Analyst primarily responsible for supporting the resiliency of the organization's technical operations globally (Technology Recovery) while familiar with all other aspects of Business Continuity.
- Have you ever been responsible for planning or supporting a major data center outage?
- Do you possess strong analytical capabilities, written and oral communication skills?
- Do you enjoy discovering ways to improve processes through automation and working with cross-functional teams?
Role
- Have extensive knowledge of Technology Recovery principles
- Have a high level of understanding and comprehension of Business Continuity, Crisis Management and Operational Resilience
- Partner with team members within the Resilience Planning (RP) function to support regulatory compliance for all jurisdictions
- Have an awareness of jurisdiction regulation and guidelines (e.g., DORA).
- Train business partners on the program's roles and responsibilities and ensure all staff within the entity are knowledgeable of our requirements.
- Facilitate cross-functional review sessions to promote technology recovery requirements and annual cycle requirements, with the ability to provide guidance and direction to obtain a successful recovery strategy.
- Create documentation according to methodology and formats based on the department standards.
- Monitor schedules and plans to ensure achievement of project results (project objectives, tasks, testing and documentation) in a timely manner.
- Facilitate exercise execution with all recovery team members while ensuring production operations are protected.
- Open and timely communication with project team and management regarding progress and planning.
- Manage recovery documentation, coordination and tracking of issues to closure/resolution.
- Escalate issues to management when necessary.
- Identify opportunities to improve and streamline processes involving the response to technology recovery.
All About You
- Excellent written and spoken English language communication skills are a core requirement.
- Discipline relevant bachelor's degree or equivalent combination of experience and formal education
- Minimum of three years' experience in a similar role
- Certified Business Continuity Planner (CBCP) preferred / comparable certification.
- Fusion Risk Management Business Continuity software experience advantageous
- Strong analytical background with the ability to identify deficiencies in recovery strategies, plans and internal processes.
- Ability to communicate user and technical information, both orally and in written form.
- Ability to work with all levels of management and technical staff.
- Ability to define and implement solutions based on strategic direction.
- Ability to drive consistent and repeatable results with limited supervision.
- Ability to manage large complex projects and multiple assignments, which may require prioritization of assignments with ability to multi-task with sense of urgency.
- Excellent oral and written communication and presentation skills.
- High level of self-motivation and superior time management
- Confident decision maker and demonstrates task and objective ownership.
- High attention to detail, accurate and consistent (on time) delivery
- Passion for personal development and learning
NICE Framework references
This Mastercard role shares knowledge, skills, and abilities with related NICE work roles.
- OV-MGT-002 Provides leadership, management, direction, or development and advocacy so the organization can conduct resilience work.
Corporate Security Responsibility
Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must:
- Abide by Mastercard's security policies and practices;
- Ensure the confidentiality and integrity of the information being accessed;
- Report any suspected information security violation or breach, and
- Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.
**Corporate Security Responsibility**
All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must:
+ Abide by Mastercard's security policies and practices;
+ Ensure the confidentiality and integrity of the information being accessed;
+ Report any suspected information security violation or breach, and
+ Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.
Major Incident Response Analyst
Posted 1 day ago
Job Viewed
Job Description
We are looking for a detail-oriented and proactive Major Incident Response Analyst to join our incident response team. The ideal candidate will be responsible for analyzing and managing major incidents that affect our operations, ensuring timely resolution and minimizing impact on the business. This role requires strong analytical skills, effective communication, and the ability to work collaboratively in a fast-paced environment.
**Responsibilities and Accountabilities:**
+ Proactively monitor and analyze incidents to identify major incidents that require immediate attention and escalation.
+ Collaborate with End User Technology Support, the Digital Desk, Security Operations, and other relevant teams to support effective response and resolution of major incidents.
+ Assist in investigations of major incidents to determine root causes and impact on business operations.
+ Maintain detailed incident records, including timelines, actions taken, communications, and resolution outcomes to support reporting and analysis.
+ Maintain and update the Major Incident Management process, including policies, procedures, knowledge base with critical contacts and best practices.
+ Organise and participate in post-incident reviews to identify lessons learned and recommend improvements to incident management processes.
+ Maintain and update incident management tools and documentation to ensure accurate tracking and reporting of major incidents.
+ Provide support and guidance to team members during major incidents, ensuring adherence to established processes and protocols.
+ Stay informed about industry trends, latest security threats, and best practices related to incident response and management.
+ Contribute to a culture of preparedness across Service Enablement, TechX and DigitalX.
+ Work closely with End User Technology Support, SecOps & Incident Response and the Digital Desk
+ Capable of identifying potential signs of external threat actor involvement which could indicate a security incident.
+ Stay current with industry trends, threats, and best practices related to incident management
**Required Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
+ Atleast 3 years of experience in incident management, with a focus on major incidents in a complex global environment.
+ Strong understanding of IT service management (ITSM) frameworks, such as ITIL.
+ Excellent leadership and team management skills, with the ability to motivate and guide cross-functional teams.
+ Strong analytical and problem-solving abilities, with a focus on root cause analysis and continuous improvement.
+ Exceptional communication skills, both written and verbal, with the ability to convey complex information to diverse audiences.
+ Relevant certifications (e.g., ITIL, CISSP, CISM) are a plus.
**Preferred Qualifications:**
+ Experience in managing IT budgets and vendor relationships.
+ Relevant certifications, such as ITIL, PMP, or AWS, are a plus
**Working Environment**
**Astellas' Global Capability Centres - Overview**
_Astellas' Global Capability Centres (GCCs) are strategically located sites that give Astellas the ability to access talent across various functions in the value chain and to co-locate core capabilities that are currently dispersed._ __ _Our three GCCs are located in India, Poland and Mexico._ __
__ _The GCCs will enhance our operational efficiency, resilience and innovation potential, enabling a timely response to changing business demands._ __
__ _Our GCCs are an integral part of Astellas, guided by our shared values and behaviors, and are critical enablers of the company's strategic priorities, sustainable growth, and commitment to turn innovative science into VALUE for patients._
Category
Astellas is committed to equality of opportunity in all aspects of employment.
EOE including Disability/Protected Veterans
Senior Incident Response Specialist
Posted 6 days ago
Job Viewed
Job Description
Key responsibilities include:
- Leading and coordinating the response to cybersecurity incidents 24/7, ensuring swift and effective action.
- Conducting in-depth forensic investigations of security breaches to determine scope, impact, and root cause.
- Analyzing security logs, network traffic, and endpoint data to detect malicious activity.
- Developing and implementing containment, eradication, and recovery strategies for security incidents.
- Documenting all aspects of incident response activities, including timelines, findings, and recommendations.
- Creating comprehensive incident reports for technical teams and senior management.
- Developing and refining incident response playbooks and procedures.
- Staying current with the latest threat intelligence, attack vectors, and mitigation techniques.
- Collaborating with internal teams (IT, Legal, Communications) and external agencies during incident response.
- Conducting post-incident reviews to identify lessons learned and areas for improvement.
- Maintaining and enhancing the incident response toolkit and infrastructure.
- Providing expertise and guidance on security best practices to prevent future incidents.
- Performing threat hunting activities to proactively identify potential security risks.
- Contributing to security awareness training for employees.
Cybersecurity Analyst (Incident Response)
Posted 22 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor security alerts and events from various sources, including SIEM, IDS/IPS, and endpoint detection systems.
- Investigate potential security incidents, determine their scope, impact, and root cause.
- Develop and execute incident response plans and playbooks.
- Conduct digital forensic investigations to collect and preserve evidence.
- Analyze malware and identify attack vectors.
- Contain and eradicate security threats from affected systems.
- Coordinate with internal teams (IT, Legal, PR) and external stakeholders during incident response.
- Document incident details, actions taken, and lessons learned.
- Develop and recommend security enhancements to prevent future incidents.
- Stay current with emerging threats, vulnerabilities, and cybersecurity best practices.
- Participate in threat hunting activities.
- Provide technical guidance and support to other security team members.
- Develop and deliver security awareness training as needed.
- Maintain and improve incident response tools and technologies.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- 3-5 years of experience in cybersecurity, with a focus on incident response and digital forensics.
- Hands-on experience with SIEM tools (e.g., Splunk, QRadar), IDS/IPS, and EDR solutions.
- Proficiency in forensic analysis tools (e.g., FTK, EnCase) and techniques.
- Strong understanding of network protocols, operating systems (Windows, Linux), and common attack vectors.
- Experience with malware analysis is a significant advantage.
- Relevant certifications such as CompTIA Security+, CEH, GIAC GCIH, or similar are highly desirable.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication skills, with the ability to articulate technical issues clearly.
- Ability to work under pressure and manage multiple incidents simultaneously.
- Willingness to be on-call as needed.
This role is based in Mysuru, Karnataka, IN , but is a fully remote position. Our client offers a challenging and dynamic work environment with opportunities for professional growth in the rapidly evolving field of cybersecurity.
Senior Information Security Analyst - Threat Detection & Incident Response
Posted 8 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze security alerts from various systems (SIEM, IDS/IPS, EDR) to detect potential threats and anomalies.
- Investigate security incidents, perform root cause analysis, and develop effective remediation plans.
- Lead and coordinate incident response activities, ensuring timely and efficient resolution of security breaches.
- Conduct forensic analysis of compromised systems and digital evidence.
- Develop and maintain incident response playbooks and procedures.
- Stay current with the latest cybersecurity threats, vulnerabilities, and attack vectors.
- Proactively identify and assess security risks within the organization's IT infrastructure.
- Contribute to the development and enforcement of information security policies and standards.
- Collaborate with IT operations and development teams to implement security controls and best practices.
- Participate in security awareness training initiatives for employees.
- Prepare detailed reports on security incidents, investigations, and mitigation efforts.
Qualifications:
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Minimum of 6-8 years of experience in information security, with a focus on threat detection and incident response.
- Proven experience with Security Information and Event Management (SIEM) tools.
- Strong understanding of networking protocols, operating systems (Windows, Linux), and common attack techniques.
- Hands-on experience with forensic tools and techniques.
- Knowledge of cybersecurity frameworks (e.g., NIST, ISO 27001) and relevant compliance regulations.
- Relevant security certifications such as CISSP, CEH, OSCP, or SANS certifications are highly desirable.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong communication and interpersonal skills, with the ability to explain technical concepts to non-technical audiences.
- Ability to work effectively under pressure and manage multiple priorities.
Be The First To Know
About the latest Security monitoring Jobs in India !
Lead Information Security Analyst - SIEM & Incident Response
Posted 14 days ago
Job Viewed
Job Description
Senior Information Security Analyst - SIEM & Incident Response
Posted 20 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze security alerts generated by SIEM tools (e.g., Splunk, QRadar, LogRhythm) to detect and investigate potential security incidents.
- Lead and coordinate the response to security incidents, including containment, eradication, and recovery efforts.
- Develop, refine, and document incident response playbooks and procedures.
- Perform forensic analysis of security incidents to determine root cause and impact.
- Conduct threat hunting activities to proactively identify and neutralize emerging threats.
- Configure and tune SIEM rules, correlation searches, and dashboards to improve threat detection capabilities.
- Collaborate with IT operations, network teams, and other departments to implement security controls and remediate vulnerabilities.
- Stay current with the latest threat intelligence, attack vectors, and cybersecurity trends.
- Participate in security awareness training and educate employees on security best practices.
- Assist in security audits and ensure compliance with relevant regulations (e.g., GDPR, ISO 27001).
- Manage and maintain security tools and technologies.
- Contribute to the development and improvement of the overall information security strategy.
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- 5+ years of experience in information security, with a focus on SIEM and incident response.
- Hands-on experience with SIEM platforms (e.g., Splunk, QRadar, ArcSight, LogRhythm).
- Strong understanding of common attack vectors, malware analysis, and threat intelligence.
- Experience with forensic investigation tools and techniques.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation is a plus.
- Knowledge of network protocols, operating systems (Windows, Linux), and cloud security principles.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong communication and interpersonal skills, with the ability to work effectively in a team.
- Relevant security certifications such as CISSP, GCIH, GCIA, CEH are highly desirable.
Senior Global Incident Response Analyst
Posted 2 days ago
Job Viewed
Job Description
In this role, you will be responsible for the following:
- Incident Response Command
Participate and occasionally lead the response to high-impact cybersecurity incidents.
Coordinate cross-functional teams globally to ensure timely containment, eradication, and recovery.
Act as a first-level decision-maker during incidents, escalating to Managers/Directors, coordinating with InfoSec Comms, and following established response protocols.
- Process & Procedure Improvement
Develop, maintain, and continuously improve global incident response playbooks, runbooks, and workflows.
Participate in regular incident simulations and tabletop exercises to evaluate and enhance response readiness.
Analyze incident post-mortems to identify root causes and implement corrective actions.
- Collaboration & Stakeholder Management
Work closely with IT, Security Operations, Legal, Communications, and business units worldwide to ensure alignment during incidents.
Work with Security Awareness function to assist in improving user security awareness stemming from security incidents.
Act as a liaison between technical teams and senior leadership to provide clear incident updates and risk assessments.
- Reporting & Compliance
Maintain incident documentation and reporting in accordance with regulatory and compliance requirements.
Track key incident metrics and produce reports to inform security strategy and executive leadership.
At a minimum, we would like you to have:
- Bachelor's degree in Information Security, Information Technology, Computer Science, or a related field or equivalent work experience.
- Proven experience (5 years) in cybersecurity (operations, vulnerability management, engineering, or related roles) with at least 1 year of experience coordinating incident response actions/activities
- Advanced knowledge of security concepts and principles
- Experience coordinating global, cross-functional teams in high-pressure situations
- Excellent communication and stakeholder management skills
- Familiarity with common security tools such as SIEM, EDR, forensics, and incident management platforms
- Strong analytical and problem-solving skills.
- Robust attention to detail.
- Obtain relevant certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), etc.
Career Development:
- This position serves a mid-level individual contributor role in information security. As the Senior Global Incident Response Analyst gains experience and certifications, they can advance to higher-level roles such as Incident Response Lead and/or Manager. Continuing education and professional development are essential for career growth in this field.
**WHO IS VONTIER**
Vontier (NYSE: VNT) is a global industrial technology company uniting productivity, automation and multi-energy technologies to meet the needs of a rapidly evolving, more connected mobility ecosystem. Leveraging leading market positions, decades of domain expertise and unparalleled portfolio breadth, Vontier enables the way the world moves - delivering smart, safe and sustainable solutions to our customers and the planet. Vontier has a culture of continuous improvement and innovation built upon the foundation of the Vontier Business System and embraced by colleagues worldwide. Additional information about Vontier is available on the Company's website at .
**At Vontier, we empower you to steer your career in the direction of success with a dynamic, innovative, and inclusive environment.**
Our commitment to personal growth, work-life balance, and collaboration fuels a culture where your contributions drive meaningful change. We provide the roadmap for continuous learning, allowing creativity to flourish and ideas to accelerate into impactful solutions that contribute to a sustainable future.
Join our community of passionate people who work together to navigate challenges and seize opportunities. At Vontier, you are not on this journey alone-we are dedicated to equipping you with the tools and support needed to fuel your innovation, lead with impact, and thrive both personally and professionally.
**Together, let's enable the way the world moves!**
The company in which you have expressed employment interest is a subsidiary or affiliate of Vontier Corporation. The subsidiary or affiliate is referred to as a Vontier Company. Vontier Corporation and all Vontier Companies are equal opportunity employers that evaluate qualified applicants without regard to race, color, national origin, religion, ancestry, sex (including pregnancy, childbirth and related medical conditions), age, marital status, disability, veteran status, citizenship status, sexual orientation, gender identity or expression, and other characteristics protected by law. The "EEO is the Law" poster is available at: Individuals who need a reasonable accommodation because of a disability for any part of the employment process should call or e-mail to request accommodation.