Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
10.0 - 15.0 years
35 - 50 Lacs
Bengaluru
Work from Office
Lead digital workforce platforms like messaging, scheduling, virtual workspace. Guide team delivery, platform execution, and agile coordination Required Candidate profile 10–15 yrs in IT delivery, workforce enablement, stakeholder collaboration. Agile/Scrum required.
Posted 1 month ago
5.0 - 10.0 years
0 - 3 Lacs
Navi Mumbai
Work from Office
We are looking for a candidate who could join our Information Technology Team. Technical Skill Set: 1. Should have a knowledge and understanding of TCP/ UDP. 2. Clean and rigid understanding on what is an AV and whats an EDR solution 3. Understanding of EDR functionalities. This knowledge is required to explore features of a solution and understand technical now how. 4. Understanding on EDR logs and log co-relation. 5. Should be able to understand and retrieve information from packet captures. 6. Should have a sane knowledge of SIEM solution. 7. Knowledge on Log parsing would be an added advantage. 8. Knowledge on Advisories, IOCs, IOAs, Adversories. What are these and how are these to be processed and why? 9. Understanding on actions to be done on receiving an advisory. 10. Should keep his/her knowledge updated and should be on the top of current Cyber exploit cases going on, so that actions can be taken proactively to safeguard the environment. Techno-Management Skill set: 1. Should be able to prioritize tasks while processing advisories, incidents, problems and events. 2. How an incident should be tackled, should have a first-hand expertise on deriving a solution and take incident to closure. 3. Prepare dashboard and reports depicting an at-a-glance view of incidents, events, advisories and remedial actions. 4. Work with the 3rd party solution provider for integration purpose. 5. Prepare documentation related to process and Knowledge base for future easy-reference. 6. Be a bridge between the technical and the management team and make sure updates are regularly submitted to higher management and review to the technical team. 7. Vendor management skills. 8. Any earlier experience in crisis situation handling would be an added advantage.
Posted 2 months ago
1.0 - 4.0 years
3 - 6 Lacs
Chennai
Work from Office
Required Skills Behavioral | Aptitude | Communication Technology | Hardware and Networking | Installation, configuration, maintainance and repair Technology | Audio, Video support | Installation and configuration Technology | Windows Operating System | Installation, configuration and management Technology | End Point Security | Antivirus management, data encryption, DLP, desktop firewall, VPN, AD policies Education Qualification : Any Graduate Certification Mandatory / Desirable : Technology | Microsoft 365 Certified | Modern Desktop Administrator Associate 1) Field Services Support Engineers primary responsibility is to provide support to an organization s IT systems to help them meet their business goals, this is done by ensuring that all computers and networks operate efficiently with high uptime. 2) As a desktop engineer, you may need to assemble and install client desktop computers and assist the end-user in securing their hardware. 3) This role also involves hands & feet support for various IT support teams to perform activities related to periodic maintenance to handling individual systems hardware, software, and network queries 4) To support daily technical support activities for computers & all other end point devices. Update the support ticket with the progress, to set up and test desktop computer peripherals. 5) To perform the system changes adhered to organizational policies. 6) Conduct remote desktop troubleshooting to end user issues. Maintain technical documentation in association with other functional departments 7) Technical Skills a. Windows Operating System: b. Ability to Install and troubleshoot different versions of Windows OS independently. E.g. Windows XP. Windows 7, Windows 10 and Windows 11 c. Understanding of desktop applications and how do they work, installation & uninstallation. d. Understanding of domain setup & ability to add / remove computers to domain. update Group policies. carry out Disk management, Disk Encryption, Wireless configuration. check utilization and availability, ability to perform start up and shut down services by following SOP. deploy gold images on multiple desktops using SOP, Ability to install and configure client applications independently 8) In addition to above, support and perform below activities. a. Exchange and Mobility Clients b. Printer management c. Backup and Recovery d. Audio, Video support e. End Point Security/Patch Management f. Hardware and Networking
Posted 2 months ago
7.0 - 12.0 years
7 - 17 Lacs
Chennai
Work from Office
Job Title: Endpoint Security Lead(AV/EDR) Responsibilities: - Design, implement, and maintain endpoint security solutions (AV/EDR) - Monitor and analyze endpoint security event logs - Investigate and respond to security incidents - Develop and maintain endpoint security policies and procedures - Understanding and implementing Application and Device control policies - Collaborate with IT teams for endpoint security integration - Stay up-to-date with emerging threats and technologies - Should present reports to the clients as per requirements. Requirements: - 7+ years of experience in endpoint security (AV/EDR) - Strong knowledge of endpoint security technologies (e.g., McAfee, Symantec, CrowdStrike, Cortex XDR, Microsoft Defender) - Experience in Implementing the AV/EDR solution from scratch - Understanding the client network and implementing the security policies efficiently - Experience with security information and event management (SIEM) systems - Proficiency in query languages (e.g., SQL, KQL, XQL) - Strong analytical and problem-solving skills - Excellent communication and collaboration skills Good to Have: - Experience with cloud security (AWS/Azure) - Knowledge of threat intelligence and incident response - Experience with IT service management (ITSM) tools - Relevant certifications (e.g., CompTIA Security+, CISSP)
Posted 2 months ago
9.0 - 14.0 years
8 - 12 Lacs
Hyderabad
Work from Office
We re on a mission to change the future of clinical research. At Perceptive, we help the biopharmaceutical industry bring medical treatments to the market, faster. Our mission is to change the world but to do this, we need people like you. Apart from job satisfaction, we can offer you: HEALTH: - Medical plan for you and your dependents. - Personal Accident Insurance - Life Insurance - Critical illness cover WEALTH: - Salary structure and Flexi basket - Provident fund of 12% - Gratuity scheme YOURSELF: Internal growth and development programs trainings Key Responsibilities Security Engineering Implementation Deploy, configure, and maintain security technologies, including firewalls, IDS/IPS, endpoint security, and XDR solutions. Work closely with IT and DevOps teams to integrate security into system and application architectures. Threat Detection Incident Response Monitor security alerts and investigate incidents to identify root causes and remediation actions. Support security operations teams in responding to threats and improving detection and response capabilities. Endpoint, Cloud, and Network Security Implement and manage security controls for endpoints, cloud environments, and networks. Work on securing hybrid cloud infrastructures and enforcing Zero Trust principles Vulnerability Patch Management Conduct security assessments and penetration tests to identify vulnerabilities. Work with IT teams to prioritize and apply security patches and remediations. Compliance Risk Management Assist in maintaining compliance with industry regulations (ISO 27001, GDPR, HIPAA). Participate in security audits, risk assessments, and policy development to strengthen the organization s security framework. Security Awareness Collaboration Work closely with internal teams to provide security guidance and training. Contribute to security awareness programs to enhance the organizations security culture. Functional Competencies (Technical knowledge/Skills) Strong knowledge of security frameworks (NIST, ISO 27001, CIS Controls). Hands-on experience with security tools such as firewalls, IDS/IPS, EDR, and XDR solutions. Understanding of cloud security in AWS, Azure, or GCP. Experience with vulnerability management and penetration testing. Knowledge of IAM, PAM, and Zero Trust security principles. Strong analytical skills and problem-solving capabilities. Effective communication skills to work with technical and non-technical teams. Experience, Education, and Certifications 9+ years of experience in cybersecurity, with hands-on expertise in security engineering. Bachelors degree in Computer Science, Cybersecurity, or a related field. Relevant certifications such as CISSP, CEH, OSCP, or equivalent are preferred. Experience in security operations, incident response, and vulnerability management. Strong understanding of regulatory and compliance requirements in cybersecurity. Come as you are. Were proud to be a Equal Employment Opportunity employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
Posted 2 months ago
10.0 - 12.0 years
2 - 3 Lacs
Mumbai
Work from Office
1. Sales & Business Development - Identify and pursue new business opportunities incybersecurity solutions, including network security, endpoint security, cloud security andthreat intelligence. - Develop and execute sales strategies to achieve revenuetargets. - Generate leads through networking, cold calling, industryevents, and referrals. - Conduct sales presentations and demos for clients toshowcase cybersecurity solutions. - Respond to RFPs (Request for Proposals) and createcompelling proposals for potential clients. 2. Client Relationship Management - Develop and maintain strong relationships with keydecision-makers (CISOs, IT Heads, CTOs, CIOs). - Conduct regular account management activities to drivecustomer satisfaction and long- term partnerships. 3. Market & Industry Analysis - Stay updated with industry trends, cybersecurity threats,and evolving technologies. - Identify competitive threats and developcounter-strategies. xbiz - Provide insights on market demands and customer painpoints to internal teams for product/service improvement. 4. Collaboration & Reporting - Work closely with marketing, and product / technical teamsto develop sales strategies. - Provide regular sales forecasts, reports, and pipelineupdates to senior management. - Represent the company at cybersecurity conferences, tradeshows, and networking events. Key Requirements Education & Experience - Bachelordegree in business, IT, Computer Science, or arelated field. - 4-8 years of experience in B2B sales, business developmentin the cybersecurity or IT solutions space. Technical & Sales Skills - Strong understanding of cybersecurity solutions(firewalls, endpoint security, SIEM, SOC, identity & access management, cloud security, etc.). - Proven track record in meeting or exceeding sales targetsin a cybersecurity or IT solutions company.
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: ForgeRock Identity Manager. Experience8-10 Years.
Posted 2 months ago
8.0 - 12.0 years
12 - 17 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
Noida
Work from Office
Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: PingFederate. Experience8-10 Years.
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
Noida
Work from Office
Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: SailPoint Identity Mgmt and Governance. Experience8-10 Years.
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Active Directory. Experience8-10 Years.
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: GRC Technology. Experience8-10 Years.
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
Coimbatore
Work from Office
Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: F5 Load Balancers. Experience8-10 Years.
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
Noida
Work from Office
Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.
Posted 2 months ago
5.0 - 8.0 years
8 - 12 Lacs
Bengaluru
Work from Office
Job Title:Architect Experience5-8 Years Location:Bangalore : Data Management and Integration:The data architect will be responsible for managing and defining/integrating data from various sourcesacross regionto ensure seamless data flow and accuracy. This includes addressing data security and privacy concerns, integration challenges, and ensuring real-time data accuracy AI Integration:A significant component of the CMO360 project is the integration of AI to provide insights and support user actions. The data architect will play a crucial role more from “Data” perspective for implementing AI features and ensuring they are effectively integrated into the system Collaboration with Teams:The data architect will work closely with various teams, including CMO, Engineering, across the organization to ensure that the data architecture aligns with the project's objectives and requirements. This includes participating in workshops and meetings to identify pain points and prioritize requirements Technical Assessment and Risk Management:The data architect will be involved in conducting technical assessments and managing risks associated with data security, integration, and user adoption. Mitigation plans will need to be developed and implemented to address these risks Documentation and Communication:The data architect will be responsible for documenting the data architecture and communicating it to relevant stakeholders. This includes creating and maintaining documentation that outlines the data architecture, data flow, and integration points LocationIndia – Bangalore
Posted 2 months ago
3.0 - 7.0 years
2 - 6 Lacs
Bengaluru
Work from Office
Drive projects and initiatives to improve and expand existing DLP platform capabilities. Implement and manage DLP solutions, including data labeling technologies. Work directly with stakeholders to define requirements and develop security solutions. Ensure the security of endpoint devices, including data protection and behavior analysis. Deploy and manage endpoint DLP solutions, such as those offered by Proofpoint. Manage email security policies and configurations, including DLP for email. Detect and prevent data loss through email channels, such as by identifying sensitive content and usebehavior. Gain deep knowledge of the Proofpoint platform, including its various modules (e.g., Endpoint DLP, Email DLP) Be proficient in using the Proofpoint console to manage alerts, investigate incidents, and analyze user behavior. Primary Skills DLP Endpoint Security Email Security Secondary Skills Data Labeling Behavior Analysis Incident Response
Posted 2 months ago
6.0 - 9.0 years
4 - 8 Lacs
Bengaluru
Work from Office
Experience in designing, implementing, and managing SCCM and Intune solutions. Strong understanding of endpoint management concepts, including device provisioning, software distribution, patch management, and security. Experience with Microsoft Endpoint Manager (SCCM and Intune) integration, configuration, and administration. Familiarity with modern management concepts, such as cloud-based management, autopilot, and zero-touch deployment. Experience working with PC/Mac infrastructure as an engineer level SCCM & Intune Certification. Experience with system provisioning and imaging using tools such as DEP and SCCM. Experience with managing 802.1x on MacOS/Windows (for wifi and wired network connections). Experience with end point management client software deployment (SCCM + Intune), inventory, antivirus and end point security solution. Familiarity with configuration profile and working with preference files (.plist) Experience with Azure/AWS, Network troubleshooting, Background in server administration, networking, troubleshooting, scripting, automation Experience with Active Directory including user and group management, group policies Experience with desktop operating systems including Windows 10/11 and OS X Scripting via PowerShell, BASH, and others. Excellent analytical, problem-solving, and communication skills. Primary Skills Operating System Deployment SCCM Intune Secondary Skills Mircosoft Endpoint Patching
Posted 2 months ago
4.0 - 8.0 years
6 - 8 Lacs
Coimbatore
Work from Office
We are seeking a Cloud Engineer to design, implement, and maintain cloud infrastructure (AWS, Azure, GCP). Key responsibilities include cloud architecture, system administration, automation, security, cost management, and documentation. Experience with migrating Exchange and SharePoint to cloud solutions is required. Collaborate with, cross-functional teams to design, implement, and maintain cloud infrastructure solutions. Provide technical guidance and support to resolve complex issues related to cloud services, Cyber Security, Networks. Perform regular assessments and audits to ensure the security, reliability, and efficiency of cloud environments. Participate in planning and executing cloud migration projects, including workload assessments, resource provisioning, and data migration strategies. Work as a Technical Consultant for Various Microsoft Technologies and its Security products. Hosted Exchange and Online Exchange Migration - SharePoint and OneDrive Migration - Teams, Enterprise Roaming Profile and Intune Deployment - Spam Filters and Endpoint Security, EDR, XDR, NDR, MDR - Work with Pass-through, Federated auth, SSO, Hybrid access, Cloud Sync, Delegation, Self Service. - MFA, Conditional Policies, PIM, Vulnerabilities and risk assessment. - Encryption, Risk Asses, Incidence management, VA, Penetration test, IDS/IPS, compliance.
Posted 2 months ago
2.0 - 5.0 years
6 - 10 Lacs
Mumbai
Work from Office
About The Role Inside Sales ConsultantExperience 2 to 5 Years (B2B Sales) Location Mumbai (Malad West)- As an Inside Sales Consultant, you will play a critical part in our fast-growing Cyber Security business servicing our customers. You will be part of a smart, innovative team that is changing the way customers buy and manage their IT infrastructure. Candidates with high energy, entrepreneurial-spirited people who settle for nothing less than selling world class solutions & services. The successful candidate will be responsible for driving revenue growth by effectively engaging with prospects and nurturing relationships. - Lead Generation Researching potential customers and identifying decision-makers within target organizations. This involves using various tools and methods to generate leads such as cold calling, email campaigns, social media outreach, and leveraging inbound inquiries. - Qualifying Leads Assessing the viability of leads based on criteria such as budget, authority, need, and timeline (BANT). This helps prioritize efforts towards leads most likely to convert into customers. - Customer Relationship Management Building and maintaining strong relationships with customers throughout the sales process and beyond. This includes following up on sales inquiries, providing ongoing support, and ensuring customer satisfaction. - Sales Reporting and Analysis Tracking sales activities, pipeline development, and forecasting using CRM (Customer Relationship Management) systems. Analyzing sales data to identify trends, opportunities, and areas for improvement. - Collaboration with Other Teams Working closely with sales and technical teams to align sales strategies with overall business objectives. Providing feedback from customers to help improve products and services. - Continuous Learning and Improvement Staying updated on industry trends, market conditions, and competitive activities. Continuously improving sales techniques and product knowledge to enhance effectiveness in generating sales. Key Skills - Bachelor's degree/Master's Degree - preferably IT Industry - Excellent written and verbal communication skills. - Ability to multi-task, organize, and prioritize work. - Excellent presentation skills. - Ability to approach adversity with a positive attitude. Ideal Candidate - Minimum 2-5 years of B2B sales experience working with senior level decision makers (CTO, CIO, CISO and IT Managers) within key verticals, understanding of sales revenue cycle and buying behavior. - Preferred Experience in strategic/solution selling in technologies like Endpoint Security & EDR/XDR, Encryption, Gateway Security, Web Proxy Solution, Data Loss prevention Solution, Email Gateway Security, CASB, IRM/DRM, MDM etc. This job opening was posted long time back. It may not be active. Nor was it removed by the recruiter. Please use your discretion.
Posted 2 months ago
4.0 - 8.0 years
6 - 10 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
We are seeking a highly motivated and detail-oriented Cybersecurity Analyst to join our remote team in India You will be responsible for identifying vulnerabilities, monitoring security systems, and defending against cyber threats This role requires a proactive mindset, critical thinking, and the ability to work independently in a fast-paced environment, Key Responsibilities: Monitor networks and systems for security breaches, intrusions, or anomalies Analyze security incidents and provide incident response Conduct regular vulnerability assessments and penetration tests Implement and maintain security tools such as firewalls, antivirus, SIEM, etc Collaborate with IT teams to improve overall security posture Create detailed reports on security incidents and risks Stay updated with the latest cyber threats, trends, and best practices ???? Required Skills & Qualifications: Bachelor's degree in Computer Science, IT, Cybersecurity, or related field 2+ years of experience in cybersecurity or information security Proficiency in tools like SIEM (Splunk, QRadar, etc ), IDS/IPS, and antivirus systems Strong knowledge of firewalls, VPNs, proxy servers, and endpoint security Familiarity with frameworks such as NIST, ISO 27001, or OWASP Analytical mindset with excellent problem-solving skills Good communication and documentation skills Preferred (Bonus): Certifications: CEH, CompTIA Security+, CISSP (or working towards it) Experience with cloud security (AWS, Azure, or GCP) Understanding of scripting languages (Python, PowerShell, Bash)
Posted 2 months ago
3.0 - 5.0 years
20 - 25 Lacs
Gurugram
Work from Office
Must Have Skills Data Loss Prevention (DLP) Administration & Implementation Experience : 3-5 years relevant Deploy, configure, and manage DLP solutions (eg, Forcepoint, Symantec, McAfee). Design and implement DLP policies for email, endpoints, cloud storage, and web traffic. Integrate DLP with SIEM, CASB, and other security tools for centralized monitoring. Conduct proof-of-concept (PoC) testing for new DLP features and updates. Work with IT teams and business units to align DLP configurations with organizational security policies. Regularly review and fine-tune DLP policies to reduce false positives and negatives. Conduct data classification and discovery scans to identify sensitive information. Establish role-based access controls (RBAC) to manage DLP policy enforcement. Investigate DLP alerts and incidents, identifying root causes and recommending corrective actions. Hands-on experience with DLP tools (eg, Symantec DLP, Forcepoint DLP, Microsoft Purview, McAfee DLP, Digital Guardian, Netskope). Strong understanding of data classification, encryption, and regulatory compliance frameworks. Expertise in network security, endpoint security, and cloud security. Experience in SIEM integration, CASB solutions, and data discovery tools. Knowledge of incident response frameworks and forensic investigation techniques.
Posted 2 months ago
4.0 - 9.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Diverse Lynx is looking for Splunk Professional to join our dynamic team and embark on a rewarding career journey Collaborate with stakeholders to understand data requirements, use cases, and objectives for Splunk deployments Design and implement data ingestion processes, including data collection, parsing, normalization, and indexing in Splunk Develop custom Splunk queries, search strings, and data models to extract meaningful insights from machine-generated data Create interactive dashboards, reports, and visualizations using Splunk's search processing language (SPL) and visualization tools Implement and maintain Splunk apps, add-ons, and configurations to support specific use cases or data sources Automate data analysis workflows and alerting mechanisms to identify and respond to critical events and anomalies Optimize Splunk deployments for performance, scalability, and search efficiency Monitor and troubleshoot Splunk infrastructure and resolve issues related to data ingestion, search performance, and system availability Collaborate with security and operations teams to develop and implement Splunk-based security monitoring, log analysis, and incident response solutions Ensure data privacy and security by implementing access controls, data encryption, and compliance with relevant regulations Stay updated with Splunk product releases, new features, and best practices to recommend and implement improvements in Splunk deployments Provide training and support to end-users on utilizing Splunk for data analysis and visualization
Posted 2 months ago
3.0 - 5.0 years
6 - 7 Lacs
Noida
Work from Office
Design, implement, and maintain Zero Trust Architecture using Zscaler and related security frameworks. Develop and enforce app segmentation strategies to isolate and secure internal applications based on user roles and access needs. Monitor and troubleshoot endpoint connectivity issues, ensuring consistent performance and reliability across devices. Collaborate with security, infrastructure, and application teams to align Zscaler solutions with enterprise IT strategies. Maintain and enhance endpoint security postures through Zscaler integrations with MDM and EDR platforms. Configure and deploy Zscaler Client Connector across diverse device environments (Windows, macOS, mobile). Perform regular audits and compliance checks to validate secure access and policy adherence. Analyze traffic logs, identify anomalies in collaboration with other teams. Support change management and documentation processes related to endpoint networking and Zscaler configuration. Provide subject matter expertise (SME) in Zscaler and Zero Trust principles during security architecture reviews and planning sessions.Stay updated with the latest advancements in endpoint security and Zero Trust Network Access (ZTNA) technologies. We re looking for someone with: Bachelor s/Master s degree in Information Technology or related field. Minimum 3-5 years of experience with Zscaler Products Possess deep knowledge of Networking concepts like DNS, IP subnets, Firewall etc. Manage and optimize Zscaler Private Access (ZPA) and Zscaler Client Connector (ZCC) policies to ensure secure/seamless user access and security Policy management. Certification - Zscaler Certified ZIA/ZPA Administrator/Zscaler Certified Cloud Expert (ZCCX)
Posted 2 months ago
7.0 - 10.0 years
12 - 16 Lacs
Gurugram
Work from Office
Job Description : We are seeking a dynamic andresults-driven Channel Sales Manager to join our growing team. The idealcandidate will have a proven track record of building and managing channelpartner relationships, driving revenue growth through partner channels, and achievingsales targets. The ideal candidate will have a strong background in IT/ITESsales, extensive experience in channel partner management, and a proven trackrecord of driving revenue growth. This role requires a strong understanding ofthe cybersecurity market, excellent communication and negotiation skills, andthe ability to work effectively in a fast-paced and dynamic environment. Role & Responsibilities : Channel Partner Identification : Identify and onboard channel partnerswith a proven track record in IT/ITES sales, particularly for similar products(like \u2013 Firewall/End point security products). Evaluate potential partnersbased on their market expertise, customer base, and sales capabilities. Contract Negotiation : Negotiate contractual agreements with new channel partners, ensuringmutually beneficial terms and conditions that align with our businessobjectives. Onboarding and Training : Conduct comprehensive product and sales training sessions for newlyonboarded channel partners to equip them with the necessary knowledge andskills to effectively market and sell our solutions. Relationship Building : Build and maintain strong, long-term relationships with keystakeholders, including management, owners, and founders of channel partnerorganizations. Act as a trusted advisor and liaison between our company and thechannel partners. Sales Support : Collaborate closely with channel partners to support lead generationefforts, facilitate deal closures, and provide timely assistance to addresscustomer inquiries and concerns. Sales Strategy Development : Develop tailored sales strategies and initiatives to empower channelpartners in driving both top-line and bottom-line growth. Utilize marketinsights and trends to identify opportunities for revenue enhancement. Marketing and Promotions : Design and implement targeted marketing campaigns, promotionalactivities, and incentive programs to drive product awareness and demand amongchannel partners and end customers. Sales Metrics Monitoring : Establish key performance indicators (KPIs) and sales metrics tomonitor channel partner performance, track growth, and identify areas forimprovement. Regularly analyze data to measure the effectiveness of salesstrategies and initiatives. Individual Sales Contribution : Actively engage in sales activities,including prospecting, lead generation, and deal closure, to contribute tooverall revenue targets. Lead by example and demonstrate best practices insales execution. \u200b Team Leadership Experience : Demonstrate leadership capabilities by having previously led a team of5 or more salespersons. Provide mentorship, guidance, and support to teammembers to foster their professional development and drive collective Requirements 1.Total 7-10 years of experience in a similar profile. 2.Minimum of 4 years\u2019 experience in B2B Sales, of Industry sectors \u2013 Retail/Education/Hospitality/IT Technology/ IT Services/ IT hardware organization where in managing resellers/ franchisees/ channel partners. 3.Strong negotiation skills and the ability to cultivate strategic partnerships with channel partners. 4.Excellent communication and interpersonal skills, with the ability to build rapport and influence stakeholders at all levels. 5.Demonstrated leadership experience, including managing a team of sales professionals, in the past, for providing guidance and support to drive individual and collective success. 6.Good understanding of cybersecurity products and industry trends, with a passion for technology and innovation. 7.Strategic thinker with the ability to develop and execute sales and marketing strategies to achieve business objectives. 8.Analytical mindset with the ability to leverage data and metrics to drive informed decision-making. 9.Proactive and results-oriented approach, with a focus on delivering exceptional customer experiences and driving revenue growth. 10.A willingness to learn technical details of the product. 11.Experience in B2B SAAS is preferred. 12.Should be process-oriented and disciplined. Benefits Our Benefits Include: Health Insurance, Performance-Based Bonuses (For Specific Roles), Wellness Programs \u2013 Access to mental health support, meditation sessions, and ergonomic workspaces to ensure a healthy and productive work environment, Team Lunches & Celebrations \u2013 Regular team lunches, parties, and win celebrations to foster a collaborative and fun work culture.
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
31458 Jobs | Dublin
Wipro
16542 Jobs | Bengaluru
EY
10788 Jobs | London
Accenture in India
10711 Jobs | Dublin 2
Amazon
8660 Jobs | Seattle,WA
Uplers
8559 Jobs | Ahmedabad
IBM
7988 Jobs | Armonk
Oracle
7535 Jobs | Redwood City
Muthoot FinCorp (MFL)
6170 Jobs | New Delhi
Capgemini
6091 Jobs | Paris,France