1,432 Threat Management jobs in India

Information Protection Lead (Insider Threat/Risk Management Expert)

Pune, Maharashtra ZS

Posted today

Job Viewed

Tap Again To Close

Job Description

ZS is a place where passion changes lives. As a management consulting and technology firm focused on improving life and how we live it, our most valuable asset is our people. Here you’ll work side-by-side with a powerful collective of thinkers and experts shaping life-changing solutions for patients, caregivers and consumers, worldwide. ZSers drive impact by bringing a client first mentality to each and every engagement. We partner collaboratively with our clients to develop custom solutions and technology products that create value and deliver company results across critical areas of their business. Bring your curiosity for learning; bold ideas; courage and passion to drive life-changing impact to ZS.

Our most valuable asset is our people .

At ZS we honor the visible and invisible elements of our identities, personal experiences and belief systems—the ones that comprise us as individuals, shape who we are and

make us unique. We believe your personal interests, identities, and desire to learn are part of your success here. about our diversity, equity, and inclusion efforts and the networks ZS supports to assist our ZSers in cultivating community spaces, obtaining the resources they need to thrive, and sharing the messages they are passionate about. 

Information Protection Lead

We are seeking a highly motivated and experienced professional to build and lead our Insider Threat & Risk Management team within the Information Security group. This role is critical in identifying, assessing, and mitigating insider risks to protect our firm’s critical data, intellectual property, and operational integrity.

The Lead will develop and execute an insider threat program, leveraging behavioral analytics, security tools, and cross-functional collaboration to proactively detect and respond to threats.

What You'll Do:

  • Program Development & Leadership: Design and implement a comprehensive insider threat and risk management program aligned with business and security objectives.
  • Threat Detection & Response: Utilize data analytics, behavioral indicators, and security tools (e.g., UEBA, DLP, SIEM) to monitor and investigate potential insider threats.
  • Risk Assessment & Mitigation: Conduct insider risk assessments, define detection methodologies, and recommend mitigation strategies.
  • Collaboration & Stakeholder Engagement: Work closely with Legal, HR, IT, Security Operations, and Compliance teams to develop policies, response frameworks, and training initiatives.
  • Incident Handling & Investigations: Lead investigations into potential insider threats, ensuring timely response and remediation while adhering to privacy and legal considerations.
  • Security Awareness & Training: Drive awareness programs to educate employees and leaders about insider risks and best practices.
  • Regulatory & Compliance Alignment: Ensure the program aligns with industry standards (e.g., NIST, ISO 27001, SOC2) and regulatory requirements.
  • Continuous Improvement: Regularly assess and refine the program to adapt to evolving threats and business needs.
  • What You'll Bring:

  • Bachelor’s degree in information security, Cybersecurity, or related field.
  • 6+ years of experience in information security, with a focus on information protection, DLP and data protection.
  • Strong understanding of information security frameworks, regulations, and standards (e.g., ISO 27001, NIST, GDPR).
  • Familiarity with network security, endpoint protection, and cloud security principles.
  • Ability to balance proactive prevention with reactive incident response.
  • High ethical standards and discretion when handling sensitive information.
  • Demonstrated ability to build and lead teams, with excellent communication and interpersonal skills.
  • Experience with security technologies such as data classification, DLP, encryption, SIEM, and access controls.
  • Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or equivalent.
  • Excellent analytical and problem-solving skills, with the ability to assess risks and recommend effective solutions.
  • Strong communication and interpersonal skills to collaborate with various teams and stakeholders.
  • Proven track record of successfully implementing and managing information protection programs.
  • Perks & Benefits: ZS offers a comprehensive total rewards package including health and well-being, financial planning, annual leave, personal growth and professional development. Our robust skills development programs, multiple career progression options and internal mobility paths and collaborative culture empowers you to thrive as an individual and global team member. We are committed to giving our employees a flexible and connected way of working. A flexible and connected ZS allows us to combine work from home and on-site presence at clients/ZS offices for the majority of our week. The magic of ZS culture and innovation thrives in both planned and spontaneous face-to-face connections.Travel: Travel is a requirement at ZS for client facing ZSers; business needs of your project and client are the priority. While some projects may be local, all client-facing ZSers should be prepared to travel as needed. Travel provides opportunities to strengthen client relationships, gain diverse experiences, and enhance professional growth by working in different environments and cultures.
    This advertiser has chosen not to accept applicants from your region.

    Security Analyst

    Hyderabad, Andhra Pradesh NTT America, Inc.

    Posted 4 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    **Responsibilities**
    As a member of the incident/Workorder/Change handling team , you will have the following accountabilities:
    + Will be working as an SME for Zscaler Support in Operations for ZIA, ZPA and ZDX.
    + Assess and orchestrate the current and planned security posture for NTT data's Security infrastructure, providing recommendations for improvement and risk reduction.
    + Identify and propose process improvements and identify opportunities for new processes and procedures to reduce risk.
    + Support security incident response as required; First line responder to reported or detected incidents.
    + Perform security research, analysis, security vulnerability assessments and penetration tests.
    + Provide security audit and investigation support
    + Monitor and track security systems for Vulnerability and respond to potential security Vulnerability.
    + Provide support for the Vulnerability management program.
    + Provide 24x7 support as operations team working in shifts.
    + Participate in on-call system administration support including but not limited to weekends, holidays and after-business hours as required to service the needs of the business.
    **Skills and Experience**
    + 4 to 5 years+ in Information Security space.
    + Strong experiance in Service Now Ticketing tool, Dashboards and Integration.
    + Strong experience with Zscaler ZIA, ZPA and ZDX.
    + Strong experience with Vulnerability Management Program.
    + Strong experience with Qualys Vulnerability Management Tool.
    + Some good to have Experience with Crowdstrike EDR and SIEM.
    + Strong experience with multiple network operating systems, including two or more of the following: Cisco iOS, Juniper ScreenOS or Junos, Fortinet FortiOS, CheckPoint GAiA, or Palo Alto Networks PAN-OS; Tanium, Rapid 7, Nessus, Nitro ESM, Symantec SEP, Symantec Message labs, Thales encryption, Allgress, Forecpoint, Blue coat, Firepower, Cisco ISE, Carbon Black, Titus, Encase
    + Strong oral, written, and presentation abilities.
    + Experiance with M365 Copilot.
    + Some experience with Unix/Linux system administration.
    + Strong experience with logging and alerting platforms, including SIEM integration.
    + Current understanding of Industry trends and emerging threats; and Working Knowledge of incident response methodologies and technologies.
    **Desirable**
    + Zscaler Certifications Associate and Professional for ZIA, ZPA and ZDX.
    + Excellent Experiance in Zscaler ZIA, ZPA and ZDX.
    + Experiance in Vulnerability Management Program.
    + Experiance in Qualys Vulnerability Management Tool.
    + Well-rounded background in network, host, database, and application security.
    + Experience implementing security controls in a bi-modal IT environment.
    + Experience driving a culture of security awareness.
    + Experience administering network devices, databases, and/or web application servers.
    + Professional IT Accreditations (CISM, CCSA, CCSE, JNCIA, CCNA, CISSP, CompTIA Security) Good to have.
    **Abilities**
    + Non customer facing role but an ability to build strong relationships with internal teams, and security leadership, is essential act as Incident co-ordinator, for reviewing all security tools, ingesting incident data, tracking incident status, coordinating with internal and external assets to fulfill information requirements, and initiating escalation procedures.
    + Document daily work and new processes.
    + Embrace a culture of continuous service improvement and service excellence.
    + Stay up to date on security industry trends.
    This advertiser has chosen not to accept applicants from your region.

    Security Analyst

    Hyderabad, Andhra Pradesh NTT DATA North America

    Posted 4 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    **Responsibilities**
    As a member of the incident/Workorder/Change handling team , you will have the following accountabilities:
    + Will be working as an SME for Zscaler Support in Operations for ZIA, ZPA and ZDX.
    + Assess and orchestrate the current and planned security posture for NTT data's Security infrastructure, providing recommendations for improvement and risk reduction.
    + Identify and propose process improvements and identify opportunities for new processes and procedures to reduce risk.
    + Support security incident response as required; First line responder to reported or detected incidents.
    + Perform security research, analysis, security vulnerability assessments and penetration tests.
    + Provide security audit and investigation support
    + Monitor and track security systems for Vulnerability and respond to potential security Vulnerability.
    + Provide support for the Vulnerability management program.
    + Provide 24x7 support as operations team working in shifts.
    + Participate in on-call system administration support including but not limited to weekends, holidays and after-business hours as required to service the needs of the business.
    **Skills and Experience**
    + 4 to 5 years+ in Information Security space.
    + Strong experiance in Service Now Ticketing tool, Dashboards and Integration.
    + Strong experience with Zscaler ZIA, ZPA and ZDX.
    + Strong experience with Vulnerability Management Program.
    + Strong experience with Qualys Vulnerability Management Tool.
    + Some good to have Experience with Crowdstrike EDR and SIEM.
    + Strong experience with multiple network operating systems, including two or more of the following: Cisco iOS, Juniper ScreenOS or Junos, Fortinet FortiOS, CheckPoint GAiA, or Palo Alto Networks PAN-OS; Tanium, Rapid 7, Nessus, Nitro ESM, Symantec SEP, Symantec Message labs, Thales encryption, Allgress, Forecpoint, Blue coat, Firepower, Cisco ISE, Carbon Black, Titus, Encase
    + Strong oral, written, and presentation abilities.
    + Experiance with M365 Copilot.
    + Some experience with Unix/Linux system administration.
    + Strong experience with logging and alerting platforms, including SIEM integration.
    + Current understanding of Industry trends and emerging threats; and Working Knowledge of incident response methodologies and technologies.
    **Desirable**
    + Zscaler Certifications Associate and Professional for ZIA, ZPA and ZDX.
    + Excellent Experiance in Zscaler ZIA, ZPA and ZDX.
    + Experiance in Vulnerability Management Program.
    + Experiance in Qualys Vulnerability Management Tool.
    + Well-rounded background in network, host, database, and application security.
    + Experience implementing security controls in a bi-modal IT environment.
    + Experience driving a culture of security awareness.
    + Experience administering network devices, databases, and/or web application servers.
    + Professional IT Accreditations (CISM, CCSA, CCSE, JNCIA, CCNA, CISSP, CompTIA Security) Good to have.
    **Abilities**
    + Non customer facing role but an ability to build strong relationships with internal teams, and security leadership, is essential act as Incident co-ordinator, for reviewing all security tools, ingesting incident data, tracking incident status, coordinating with internal and external assets to fulfill information requirements, and initiating escalation procedures.
    + Document daily work and new processes.
    + Embrace a culture of continuous service improvement and service excellence.
    + Stay up to date on security industry trends.
    This advertiser has chosen not to accept applicants from your region.

    Security Analyst

    Pune, Maharashtra Exela Technologies

    Posted 1 day ago

    Job Viewed

    Tap Again To Close

    Job Description

    Job Description


    Global - Risk & Compliance - Senior Security Analyst will play a significant role in our SOX Compliance


    Department to standardize and operationalize our Regulatory and internal Compliance framework.


    Job Details:

    • Role: Global - Risk & Compliance - Senior Security Analyst
    • Work Location: Pune
    • Work Type: Work From Office


    Responsibilities:

    • Collaborate with internal stakeholders to facilitate and review documentation for certifications like ISO 27001, PCI, SOC, and HiTrust.
    • Own and Initiate process improvement to Streamline Internal Assurance Process
    • Point of Contact for Client Security Questionnaires and RFP/RFI responses
    • Create and maintain Security Control documentation and knowledge repository
    • Develop, Contribute and participate in internal controls awareness within the organization
    This advertiser has chosen not to accept applicants from your region.

    Security Analyst

    Delhi, Delhi Softcell Technologies Global Pvt. Ltd.

    Posted 6 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    Job Title

    Security Analyst


    Location

    Delhi & Bangalore


    Employment Type

    Full-time


    Position Summary

    Softcell Global Technologies Pvt. Ltd. is looking for a passionate and skilled Security Analyst with at least 2-3 years of experience in vulnerability assessment, penetration testing and code review. The ideal candidate should have a foundational understanding of cybersecurity, good hands-on skills with security tools, and hold certifications such as OSCP, CRTP, eJPT, CPENT, CEH or equivalents. The role involves supporting offensive security operations, assisting in analysis and reporting, and collaborating with senior analysts during engagements.


    Key Responsibilities

    • Hands-on Technical Assessment & Exploitation
    • Conduct in-depth penetration tests on web apps, APIs, networks, cloud, AD and OT environments.
    • Conduct comprehensive manual reviews to identify security flaws, insecure patterns, and logical vulnerabilities – SAST and DAST.
    • Chain vulnerabilities to simulate end-to-end real-world attack scenarios and provide POCs.
    • Act as a collaborator for VAPT projects, ensuring timely delivery and quality assurance.
    • Interface directly with clients to present findings and suggest remediation strategies.
    • Collaborate to manage testing schedules, reporting timelines, and workflows to ensure on-time delivery.
    • Draft detailed vulnerability reports with actionable remediation.


    Mandatory Requirements

    • Minimum 2-3 years of experience in vulnerability assessment and penetration testing support.
    • Strong grasp of OWASP Top 10, MITRE ATT&CK, and real-world threat simulation.
    • Scripting proficiency in Python, PowerShell, or Bash.
    • Exposure to tools like Nmap, Wireshark, Burp Suite, Metasploit, BloodHound, SonarQube, Checkmarx, etc
    • Bachelor’s degree in Computer Science, Cybersecurity, or related field.
    • Excellent communication, documentation, and collaboration skills.


    Additional Details

    • Immediate Joiners Preferred
    • Practical Skills are a Must
    • Location: Delhi and Bangalore (Onsite Only)
    • Bonus points for published CVEs, bug bounty recognition, open-source security tools, research contributions, or participation in industry events, workshops, and communities.

    Preferred Certifications

    • OSCP – Offensive Security Certified Professional
    • OSWE – Offensive Security Web Expert
    • CRTP – Certified Red Team Professional
    • CRTE – Certified Red Team Expert
    • CPENT – Certified Penetration Testing Professional
    • CEH – Certified Ethical Hacker
    • eJPT, eCPTX, CBBH, PNPT – or equivalent certifications in advanced adversarial simulation.


    Why Join Softcell?

    • Be part of a CERT-In empaneled cybersecurity team delivering critical security services.
    • Get exposure to real-world attack simulations, internal security assessments, and VAPT projects.
    • Learn and grow under certified red teamers and penetration testers.
    • Access lab environments, tools, and mentoring to grow your skills.


    About Softcell

    Softcell Global Technologies Pvt. Ltd. is a leading IT services provider with over 30 years of experience in infrastructure solutions, cybersecurity, cloud, and engineering. Trusted by top banks, enterprises, and government institutions, Softcell is a CERT-In empaneled organization at the forefront of cybersecurity service delivery.


    Regards

    HR Team

    This advertiser has chosen not to accept applicants from your region.

    Security Analyst

    Hyderabad, Andhra Pradesh SHI | Locuz - An SHI Company

    Posted 6 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    Greetings !


    We are looking for a skilled Splunk Administrator with hands-on experience in deploying and managing Splunk Enterprise and Splunk Cloud. The ideal candidate should have experience in Splunk Enterprise Security (ES), Splunk UBA, and IT Service Intelligence (ITSI). This role requires strong technical skills, along with the ability to communicate effectively with customers.


    Roles & Responsibilities:

    Splunk Deployment & Administration:

    • Install, configure, and manage Splunk Enterprise and Splunk Cloud.
    • Handle indexers, search heads, forwarders, and clustering.
    • Optimize Splunk performance, storage, and scalability.

    Security & Splunk Monitoring Solutions:

    • Implement and manage Splunk Enterprise Security (ES), Splunk UBA, and ITSI.
    • Configure correlation searches, threat intelligence feeds, risk-based alerting (RBA), and dashboards.
    • Troubleshoot security-related issues within Splunk.

    Customer Interaction & Troubleshooting:

    • Engage with customers to understand their requirements and provide technical guidance.
    • Troubleshoot and resolve Splunk-related issues, logs ingestion, parsing, and data onboarding.

    Splunk Architecture & Implementation:

    • Design, deploy, and optimize Splunk Enterprise and Splunk Cloud environments.
    • Lead end-to-end Splunk implementations, migrations, and upgrades.
    • Manage search head clustering, indexer clustering, and data retention policies.

    Security & Observability Solutions:

    • Architect and configure Splunk Enterprise Security (ES), Splunk UBA, and ITSI.
    • Implement risk-based alerting (RBA), custom correlation searches, and advanced analytics.
    • Integrate Splunk with SOAR, cloud platforms (AWS, Azure, GCP), and third-party security tools.

    Team Leadership & Customer Engagement:

    • Lead and mentor a team of Splunk Administrators & Engineers.
    • Interact with customers to gather requirements, design solutions, and conduct workshops etc.
    • Review and improve Splunk use cases, dashboards, and data models.

    Optimization & Automation:

    • Develop custom scripts (Python, Bash, PowerShell) for automation and orchestration.
    • Tune Splunk performance, search queries, and indexing strategies.
    • Implement best practices for data onboarding, parsing, and CIM compliance.


    Interested can share their updated resume to along with the below mentioned details.

    Current CTC:

    Expected CTC:

    Notice Period:

    This advertiser has chosen not to accept applicants from your region.

    Security Analyst

    Bengaluru, Karnataka Zyoin Group

    Posted 6 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    Role: Security Analyst

    Experience: 8-12 yrs


    Skills:

    • Vulnerability management,
    • Incident Response, Monitoring
    • SIEM, EDR, Firewall Analysis
    • L2 support
    • Logs and Remediation


    Security Analyst/ Engineer


    As a Security Analyst/Engineer, you will be responsible for supporting the security

    operations of our organization by assisting in the monitoring, detection, and response to

    security incidents. This role offers a blend of security analysis and engineering tasks. This

    position offers a progression from foundational knowledge to more advanced

    responsibilities, allowing you to contribute significantly to the organization's cybersecurity

    efforts.


    Key Responsibilities:

    Security monitoring and analysis

    • You assist in monitoring security events and alerts from various sources such as

    SIEM, IDS/IPS, antivirus systems, and endpoint detection platforms

    • You conduct initial analysis of security events to determine their nature and

    potential impact on the organization

    • You collaborate with senior analysts to investigate and respond to security

    incidents, including malware infections, phishing attempts, and unauthorized

    access attempts.

    Incident response

    • You contribute to incident response activities by providing technical assistance

    during security incidents, including containment, eradication, and recovery efforts

    • You document incident response procedures, develop post-incident reports, and

    conduct lessons learned sessions to improve incident handling capabilities

    • You implement proactive measures to enhance incident detection and response

    capabilities, such as developing playbooks for common attack scenarios.

    Vulnerability management

    • You support the vulnerability management process by assisting in vulnerability

    scanning, assessment, and remediation efforts

    • You help prioritize and track the resolution of identified vulnerabilities in systems

    and applications

    • You collaborate with system owners and IT teams to ensure timely patching and

    mitigation of identified vulnerabilities, leveraging automation and orchestration

    where possible

    • You conduct security assessments and penetration tests to identify weaknesses in

    systems, applications, and network infrastructure.

    Security tool

    • You assist in the administration and configuration of security tools and

    technologies, such as firewalls, intrusion detection/prevention systems, and

    endpoint security solutions

    • You participate in the evaluation and testing of new security technologies to

    enhance the organization's security posture

    • You optimize the configuration and tuning of security tools and technologies to

    improve detection accuracy, reduce false positives, and enhance overall

    effectiveness

    • You evaluate emerging security technologies and solutions, recommending and

    implementing enhancements to the security toolset based on industry best

    practices and organizational requirements.

    Security awareness and training

    • You support security awareness and training initiatives by assisting in the

    development of educational materials and delivering security awareness briefings

    to staff.

    Qualifications and Skills:

    • Bachelor's degree in computer science, Information Security, or related field

    • Minimum 8 years of experience in a cybersecurity role with progressively increasing

    responsibilities

    • Strong understanding of cybersecurity principles, threat landscape, and attack

    methodologies

    • Proficiency in security tools and technologies such as SIEM, EDR, IDS/IPS, firewalls,

    and vulnerability scanners

    • Excellent analytical, problem-solving, and decision-making skills

    • Effective communication and stakeholder management abilities

    • Certifications such as CompTIA Security+, CEH (Certified Ethical Hacker), or

    equivalent are a plus.


    Experience

    • Demonstrated experience in conducting security analysis, incident response, and

    vulnerability management in a complex environment

    • Hands-on experience with security tool optimization, security assessments, and

    penetration testing

    • Proven track record of incident response efforts and effectively managing security

    incidents from detection to resolution.

    This advertiser has chosen not to accept applicants from your region.
    Be The First To Know

    About the latest Threat management Jobs in India !

     

    Nearby Locations

    Other Jobs Near Me

    Industry

    1. request_quote Accounting
    2. work Administrative
    3. eco Agriculture Forestry
    4. smart_toy AI & Emerging Technologies
    5. school Apprenticeships & Trainee
    6. apartment Architecture
    7. palette Arts & Entertainment
    8. directions_car Automotive
    9. flight_takeoff Aviation
    10. account_balance Banking & Finance
    11. local_florist Beauty & Wellness
    12. restaurant Catering
    13. volunteer_activism Charity & Voluntary
    14. science Chemical Engineering
    15. child_friendly Childcare
    16. foundation Civil Engineering
    17. clean_hands Cleaning & Sanitation
    18. diversity_3 Community & Social Care
    19. construction Construction
    20. brush Creative & Digital
    21. currency_bitcoin Crypto & Blockchain
    22. support_agent Customer Service & Helpdesk
    23. medical_services Dental
    24. medical_services Driving & Transport
    25. medical_services E Commerce & Social Media
    26. school Education & Teaching
    27. electrical_services Electrical Engineering
    28. bolt Energy
    29. local_mall Fmcg
    30. gavel Government & Non Profit
    31. emoji_events Graduate
    32. health_and_safety Healthcare
    33. beach_access Hospitality & Tourism
    34. groups Human Resources
    35. precision_manufacturing Industrial Engineering
    36. security Information Security
    37. handyman Installation & Maintenance
    38. policy Insurance
    39. code IT & Software
    40. gavel Legal
    41. sports_soccer Leisure & Sports
    42. inventory_2 Logistics & Warehousing
    43. supervisor_account Management
    44. supervisor_account Management Consultancy
    45. supervisor_account Manufacturing & Production
    46. campaign Marketing
    47. build Mechanical Engineering
    48. perm_media Media & PR
    49. local_hospital Medical
    50. local_hospital Military & Public Safety
    51. local_hospital Mining
    52. medical_services Nursing
    53. local_gas_station Oil & Gas
    54. biotech Pharmaceutical
    55. checklist_rtl Project Management
    56. shopping_bag Purchasing
    57. home_work Real Estate
    58. person_search Recruitment Consultancy
    59. store Retail
    60. point_of_sale Sales
    61. science Scientific Research & Development
    62. wifi Telecoms
    63. psychology Therapy
    64. pets Veterinary
    View All Threat Management Jobs