1,511 Threat Management jobs in India

Information Protection Lead (Insider Threat/Risk Management Expert)

Pune, Maharashtra ZS

Posted today

Job Viewed

Tap Again To Close

Job Description

ZS is a place where passion changes lives. As a management consulting and technology firm focused on improving life and how we live it, our most valuable asset is our people. Here you’ll work side-by-side with a powerful collective of thinkers and experts shaping life-changing solutions for patients, caregivers and consumers, worldwide. ZSers drive impact by bringing a client first mentality to each and every engagement. We partner collaboratively with our clients to develop custom solutions and technology products that create value and deliver company results across critical areas of their business. Bring your curiosity for learning; bold ideas; courage and passion to drive life-changing impact to ZS.

Our most valuable asset is our people .

At ZS we honor the visible and invisible elements of our identities, personal experiences and belief systems—the ones that comprise us as individuals, shape who we are and

make us unique. We believe your personal interests, identities, and desire to learn are part of your success here. about our diversity, equity, and inclusion efforts and the networks ZS supports to assist our ZSers in cultivating community spaces, obtaining the resources they need to thrive, and sharing the messages they are passionate about. 

Information Protection Lead

We are seeking a highly motivated and experienced professional to build and lead our Insider Threat & Risk Management team within the Information Security group. This role is critical in identifying, assessing, and mitigating insider risks to protect our firm’s critical data, intellectual property, and operational integrity.

The Lead will develop and execute an insider threat program, leveraging behavioral analytics, security tools, and cross-functional collaboration to proactively detect and respond to threats.

What You'll Do:

  • Program Development & Leadership: Design and implement a comprehensive insider threat and risk management program aligned with business and security objectives.
  • Threat Detection & Response: Utilize data analytics, behavioral indicators, and security tools (e.g., UEBA, DLP, SIEM) to monitor and investigate potential insider threats.
  • Risk Assessment & Mitigation: Conduct insider risk assessments, define detection methodologies, and recommend mitigation strategies.
  • Collaboration & Stakeholder Engagement: Work closely with Legal, HR, IT, Security Operations, and Compliance teams to develop policies, response frameworks, and training initiatives.
  • Incident Handling & Investigations: Lead investigations into potential insider threats, ensuring timely response and remediation while adhering to privacy and legal considerations.
  • Security Awareness & Training: Drive awareness programs to educate employees and leaders about insider risks and best practices.
  • Regulatory & Compliance Alignment: Ensure the program aligns with industry standards (e.g., NIST, ISO 27001, SOC2) and regulatory requirements.
  • Continuous Improvement: Regularly assess and refine the program to adapt to evolving threats and business needs.
  • What You'll Bring:

  • Bachelor’s degree in information security, Cybersecurity, or related field.
  • 6+ years of experience in information security, with a focus on information protection, DLP and data protection.
  • Strong understanding of information security frameworks, regulations, and standards (e.g., ISO 27001, NIST, GDPR).
  • Familiarity with network security, endpoint protection, and cloud security principles.
  • Ability to balance proactive prevention with reactive incident response.
  • High ethical standards and discretion when handling sensitive information.
  • Demonstrated ability to build and lead teams, with excellent communication and interpersonal skills.
  • Experience with security technologies such as data classification, DLP, encryption, SIEM, and access controls.
  • Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or equivalent.
  • Excellent analytical and problem-solving skills, with the ability to assess risks and recommend effective solutions.
  • Strong communication and interpersonal skills to collaborate with various teams and stakeholders.
  • Proven track record of successfully implementing and managing information protection programs.
  • Perks & Benefits: ZS offers a comprehensive total rewards package including health and well-being, financial planning, annual leave, personal growth and professional development. Our robust skills development programs, multiple career progression options and internal mobility paths and collaborative culture empowers you to thrive as an individual and global team member. We are committed to giving our employees a flexible and connected way of working. A flexible and connected ZS allows us to combine work from home and on-site presence at clients/ZS offices for the majority of our week. The magic of ZS culture and innovation thrives in both planned and spontaneous face-to-face connections.Travel: Travel is a requirement at ZS for client facing ZSers; business needs of your project and client are the priority. While some projects may be local, all client-facing ZSers should be prepared to travel as needed. Travel provides opportunities to strengthen client relationships, gain diverse experiences, and enhance professional growth by working in different environments and cultures.
    This advertiser has chosen not to accept applicants from your region.

    Security Analyst

    Noida, Uttar Pradesh R1 RCM

    Posted 1 day ago

    Job Viewed

    Tap Again To Close

    Job Description

    R1 RCM Inc. is a leading provider of technology-enabled revenue cycle management services which transform and solve challenges across health systems, hospitals and physician practices. Headquartered in Chicago, R1® is a publicly-traded organization with employees throughout the US and international locations.
    Our mission is to be the one trusted partner to manage revenue, so providers and patients can focus on what matters most. Our priority is to always do what is best for our clients, patients and each other. With our proven and scalable operating model, we complement a healthcare organization's infrastructure, quickly driving sustainable improvements to net patient revenue and cash flows while reducing operating costs and enhancing the patient experience.
    We are looking for a self-motivated Cybersecurity Analyst to join the R1 Cybersecurity Operations Team. We have a relentless focus on driving results for our customers and enabling them to invest more in patient care; in turn, this allows us to continue to grow our company and your career.
    The successful candidate must be well-versed in security operations, cyber security tools, intrusion detection, and secured networks. They will serve as an expert and be responsible for providing network and security operations technical analysis, assessment, and recommendations in the areas of real-time security situational awareness, operational network system and applications systems security monitoring.
    **Responsibilities** :
    + Monitoring various security tools (e.g., Crowdstrike, Proofpoint, MS Sentinel, Azure VM ) to identify potential incidents, network intrusions, and malware events, etc. to ensure confidentiality, integrity, and availability of R1's architecture and information systems are protected
    + Reviewing and analyzing log files to report any unusual or suspect activities.
    + Utilize incident response use-case workflows to follow established and repeatable processes for triaging and escalating.
    + Generating trouble tickets and performing initial validation and triage to determine whether incidents are security events using open-source intelligence (OSINT)
    + Following established incident response procedures to ensure proper escalation, analysis and resolution of security incidents.
    + Analyzing and correlating incident event data to develop preliminary root cause and corresponding remediation strategy.
    + Providing technical support for new detection capabilities, recommendations to improve upon existing tools/capabilities to protect the R1's network, and assessments for High Value Assets.
    + In this role, the successful candidate will maintain and monitor compliance with enterprise change management policies and procedures.
    + Develop and maintain metrics & reports on the status of the R1 cyber security operations program.
    + Attend and participate in Cyber security projects and the change management process. This includes interacting with business units and technical teams to understand what is coming and how their projects can be more secure from the beginning.
    + As part of the overall Cybersecurity Operations Team, work in tandem with the security operations center (SOC), incident responders (when anomalous activity and host compromise occurs), and technology infrastructure and development team members.
    + Participate in established incident response procedures to ensure proper escalation,?analysis?and resolution of security events and incidents.
    + Managing and maintaining change detection and auditing tools
    + Researching technology and application processing environments, operation, and associated user workflow to design, build, configure, implement, and document change compliance and audit rules within designated technologies.
    + Reconciling changes detected by the system to authorized changes documented in service desk and change management applications.
    + Analyzing large volumes of security event data from a variety of sources to identify suspicious and malicious activity.
    + Documenting, logging and investigating security incidents.
    + Performing case management throughout the incident lifecycle for moderately complex security incidents
    + Design, build, and documenting security technology standards, processes, and operational workflows
    + Operating and maintaining physical security monitoring systems
    + Review, investigate, track, and monitor viruses and malware propagation and eradication throughout the enterprise.
    + Monitoring compliance with enterprise security, compliance, and change management programs, policies, and processes
    + Researching Threat Intelligence sources on the latest malware, trends, patches in order to keep the Security Program up-to-date.
    + Providing metrics & reports on the status of tools, environments, and assets within the organization.
    + Database and Application security to prevent attacks via Input Validation, Cross-Site Scripting, Buffer Overflow.etc
    **Required Qualifications** :
    + A minimum of 4 years of professional experience in an IT-related field
    + Intermediate knowledge of security, monitoring, and networking technologies, tools, protocols and standards
    + Knowledge of security policy, programs, process, and metrics
    + CompTIA Security+ certification or equivalent professional experience in security operations
    + Intermediate or advanced security, networking, or audit certification
    + Recent experience with static and/or dynamic code review process
    + Strong drive and passion to deliver distinctive end-products, a quick learner with a strong attention to detail and quality.
    + Excellent interpersonal and communication skills
    **Desired Qualifications:**
    + A Bachelor's degree in a technical discipline (e.g., Computer Science, Business Analyst, etc.)
    + Certification (or ability to obtain certification) in at least one of the following areas: General Security (CISSP), Incident Handling (GCIH), Cloud Security (GCLD, Cloud+, CCSK), and Ethical Hacking (CEH)
    + Experience with advanced cyber security tools, network topologies, intrusion detection, and secured networks
    + In-depth understanding of NIST SP 800-61,?SOC 2 AICPA controls and frameworks.
    Working in an evolving healthcare setting, we use our shared expertise to deliver innovative solutions. Our fast-growing team has opportunities to learn and grow through rewarding interactions, collaboration and the freedom to explore professional interests.
    Our associates are given valuable opportunities to contribute, to innovate and create meaningful work that makes an impact in the communities we serve around the world. We also offer a culture of excellence that drives customer success and improves patient care. We believe in giving back to the community and offer a competitive benefits package. To learn more, visit: R1RCM.com .
    R1 RCM Inc. ("the Company") is committed to the principles of equal employment opportunity. The Company's practices and employment decisions, including those regarding recruitment, hiring, assignment, promotion, compensation, benefits, training, discipline, and termination shall not be based on any person's age, color, national origin, citizenship status, physical or mental disability, medical condition, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status or any other characteristic protected by federal, state or local law. Furthermore, the Company is committed to providing a workplace free from harassment based on any of the foregoing protected categories.
    Working in an evolving healthcare setting, we use our shared expertise to deliver innovative solutions. Our fast-growing team has opportunities to learn and grow through rewarding interactions, collaboration and the freedom to explore professional interests.
    Our associates are given valuable opportunities to contribute, to innovate and create meaningful work that makes an impact in the communities we serve around the world. We also offer a culture of excellence that drives customer success and improves patient care. We believe in giving back to the community and offer a competitive benefits package. To learn more, visit: r1rcm.com
    Visit us on Facebook ( is the leading provider of technology-driven solutions that transform the patient experience and financial performance of hospitals, health systems and medical groups. We are the one company that combines the deep expertise of a global workforce of revenue cycle professionals with the industry's most advanced technology platform, encompassing sophisticated analytics, AI, intelligent automation and workflow orchestration.
    Headquartered near Salt Lake City, Utah, R1 employs over 29,000 people globally.
    This advertiser has chosen not to accept applicants from your region.

    Security Analyst

    Indore, Madhya Pradesh Securitybulls Intelligence India Private Limited

    Posted 4 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    About the Role:

    We are looking for a highly curious and logical thinker who understands how modern web and application-level architectures work. This role is perfect for someone who loves breaking things to understand how they work — and then reporting it clearly.


    You don’t need certifications — we value real skills, out-of-the-box thinking, and hands-on experience with the latest attack vectors and tools.


    Responsibilities:


    • Perform manual and automated application penetration testing on web apps, mobile apps, APIs, and thick clients
    • Understand application logic deeply to identify business logic flaws
    • Stay updated with the latest OWASP Top 10, SANS 25, and emerging attack vectors like SSRF chaining, prototype pollution, cloud misconfigurations, and more
    • Write custom scripts and automate repeatable tasks to improve testing efficiency
    • Clearly document vulnerabilities and communicate them effectively to customers, including risk impact and mitigation strategies
    • Work closely with developers and customers to validate fixes and provide secure design suggestions


    Requirements:


    • Strong understanding of web application architecture (frontend, backend, APIs, authentication/authorization flows)
    • Ability to identify and exploit application-level vulnerabilities beyond scanners
    • Knowledge of modern attack techniques (SSRF, IDOR, OAuth misconfig, JWT attacks, etc.)
    • Familiarity with tools like Burp Suite, Postman, custom scripts (Python/bash), and automation frameworks
    • Strong communication skills to report findings professionally and clearly
    • Logical thinking, curiosity, and problem-solving mindset


    This advertiser has chosen not to accept applicants from your region.
    Be The First To Know

    About the latest Threat management Jobs in India !

     

    Nearby Locations

    Other Jobs Near Me

    Industry

    1. request_quote Accounting
    2. work Administrative
    3. eco Agriculture Forestry
    4. smart_toy AI & Emerging Technologies
    5. school Apprenticeships & Trainee
    6. apartment Architecture
    7. palette Arts & Entertainment
    8. directions_car Automotive
    9. flight_takeoff Aviation
    10. account_balance Banking & Finance
    11. local_florist Beauty & Wellness
    12. restaurant Catering
    13. volunteer_activism Charity & Voluntary
    14. science Chemical Engineering
    15. child_friendly Childcare
    16. foundation Civil Engineering
    17. clean_hands Cleaning & Sanitation
    18. diversity_3 Community & Social Care
    19. construction Construction
    20. brush Creative & Digital
    21. currency_bitcoin Crypto & Blockchain
    22. support_agent Customer Service & Helpdesk
    23. medical_services Dental
    24. medical_services Driving & Transport
    25. medical_services E Commerce & Social Media
    26. school Education & Teaching
    27. electrical_services Electrical Engineering
    28. bolt Energy
    29. local_mall Fmcg
    30. gavel Government & Non Profit
    31. emoji_events Graduate
    32. health_and_safety Healthcare
    33. beach_access Hospitality & Tourism
    34. groups Human Resources
    35. precision_manufacturing Industrial Engineering
    36. security Information Security
    37. handyman Installation & Maintenance
    38. policy Insurance
    39. code IT & Software
    40. gavel Legal
    41. sports_soccer Leisure & Sports
    42. inventory_2 Logistics & Warehousing
    43. supervisor_account Management
    44. supervisor_account Management Consultancy
    45. supervisor_account Manufacturing & Production
    46. campaign Marketing
    47. build Mechanical Engineering
    48. perm_media Media & PR
    49. local_hospital Medical
    50. local_hospital Military & Public Safety
    51. local_hospital Mining
    52. medical_services Nursing
    53. local_gas_station Oil & Gas
    54. biotech Pharmaceutical
    55. checklist_rtl Project Management
    56. shopping_bag Purchasing
    57. home_work Real Estate
    58. person_search Recruitment Consultancy
    59. store Retail
    60. point_of_sale Sales
    61. science Scientific Research & Development
    62. wifi Telecoms
    63. psychology Therapy
    64. pets Veterinary
    View All Threat Management Jobs