Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
8 - 10 years
12 - 17 Lacs
Bengaluru
Work from Office
About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: PKI - Certificate Management. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 2 months ago
8 - 10 years
12 - 17 Lacs
Bengaluru
Work from Office
About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Symantec DLP. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 2 months ago
8 - 12 years
13 - 18 Lacs
Mumbai
Work from Office
About The Role Role Purpose The purpose of this role is to design the organisation??s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP??s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client??s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Cloud Security Posture Management. Experience>10 YEARS. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 2 months ago
8 - 10 years
12 - 17 Lacs
Bengaluru
Work from Office
About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: SailPoint Identity Now. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 2 months ago
8 - 10 years
12 - 17 Lacs
Hyderabad
Work from Office
About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Cloud Security Posture Management. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 2 months ago
3 - 8 years
11 - 13 Lacs
Pune
Work from Office
Knowledge of operating systems, system administration, and application security. Proficiency in security tools and technologies Experience with incident response methodologies. Strong knowledge of IT security protocols, data privacy standards Required Candidate profile Certified Information Systems Security Professional (CISSP) Vulnerability Scanner/Nessus, CrowdStrike, Cisco Meraki, Forcepoint One. Experience with cloud security and network security.
Posted 2 months ago
5 - 10 years
4 - 9 Lacs
Nagpur
Work from Office
Job Title: Lead Engineer Email Gateway Experience: 5 to 6 Years Location: Nagpur Education: Bachelor of Engineering (BE) Bachelor of Technology (BTech) Master of Technology (M.Tech) Industry Type: IT Services & Consulting / Cybersecurity Employment Type: Full Time, Permanent Role Category: IT Infrastructure Services / Security Job Description: We are hiring a Lead Engineer Email Gateway to manage and secure enterprise email infrastructure. The role involves hands-on operational support, enhancement of email security measures, and collaboration with vendors to ensure robust and secure email services. Key Responsibilities: Act as the primary contact for operational ticket resolution for email security issues Manage and maintain Trend Micro Email Gateway (DDEI and IMSVA) Daily monitoring of mail services, patch management, and server performance Perform email threat analysis : phishing, spoofing, spam, malware Conduct patching, upgrades, and implementation of email gateways Monitor SPF, DKIM, DMARC configurations for email authentication Troubleshoot mail delivery issues and prepare Root Cause Analysis (RCA) Ensure proper documentation and support during audits Work with vendors to resolve escalations and system improvements Basic networking and DNS records knowledge is a must Required Skills: Strong knowledge of email authentication protocols : SPF, DKIM, DMARC Experience in patching, upgrading, and implementing secure email gateways Knowledge of spam, phishing, and spoofing mitigation Hands-on experience with Trend Micro Email Security Solutions Familiarity with DNS records , networking basics RCA preparation and ticket management Desired Candidate Profile: 5+ years of experience in email infrastructure or email security roles Strong communication and troubleshooting skills Team player with ability to handle pressure and time-sensitive tasks Experience working in enterprise environments and with vendor support Interested cadidates fill the details below and share on Anurag.Yadav@softenger.com Updated Resume : Total Experience : Relevant Experience : Current CTC : Expected CTC : Notice Period : Are you willing to relocate to Nagpur location:
Posted 2 months ago
3 - 8 years
19 - 22 Lacs
Bengaluru
Work from Office
Job location - Mumbai Kalwa OR Pune A Snapshot of Your Day As an OT Senior Engineer (f-m-d) you will develop features for highly complex systems in the energy sector industry and the system according to requirement specifications. How You'll Make an Impact Develop features for highly complex systems in the energy sector industry. Develop system according to requirement specifications. Assume responsibility for the development from the initial idea to documentation, testing until site implementation. Continuous improvement and optimization of the product performance Maintaining and continuous improvement of internal software and tools Summarize and present development results to stakeholders. Self-dependent design and development of IT/OT solutions Planning, design, configuration, administration, and support of high available IT/OT infrastructures with corresponding databases and backup systems Act as an Expert as inside of an international team for projects. Write, execute, and document manual test cases, detailed test reports and describe potential improvements / required modifications. You work in an international development team. We don"™t need superheroes, just super minds . Deep knowledge in Microsoft Windows Server OS (Active Directory, DNS, GPO, Certification Authority, WSUS, MS Defender, Remote Desk Services) Deep knowledge in network architecture (SCALANCE switches portfolio, another vendors portfolio is an advantage) Deep knowledge in firewalling (Windows internal firewall, Fortigate, PaloAlto) Experience with tools such as Powershell. Experience in working using agile methodology. Experience in cyber security architecture and design according OT requirements (e.g, ISO27001, ISA99, IEC62443). Experience in architecture, designing concepts and development of OT solutions (specially for critical infrastructures) Knowledge in VMWare Virtualization is an advantage. Knowledge in Veeam Backup is an advantage. Basic knowledge in PCS 7 is an advantage. Basic knowledge in industrial communication protocolsModbus, OPC, serial communication (e.g., RS4857 is an advantage) Readiness for occasional worldwide traveling (e.g., Engineering, Consulting, Commissioning) University degree in Engineering or Information Technology related or similar education, preferably with a focus on information management solutions. Expert communication skills in English.
Posted 2 months ago
5 - 6 years
11 - 15 Lacs
Thane
Work from Office
OT Cybersecurity Engineer for Digital Industries Customer Services, India About Siemens Accelerating transformation for industries For us, it all starts and ends with our customers. Maximizing value for them is what drives us! Combining the real world of automation with the digital world of information technology opens up completely new possibilities for our customers in all industries, empowering them to make better decisions and enable them to accelerate their transformation to become a Digital Enterprise. With our unique portfolio, we can make a decisive contribution to sustainable industrial innovation transforming the everyday and creating a better tomorrow for societies and people around the world. Cybersecurity for Industry We give Cybersecurity for Industry the highest priority in successful digitalization, so we place it at the center of our development of innovative products, solutions, and services. We rely on the multilayer Defense in Depth concept strengthened by Zero Trust principles. This ensures reliable and always up-to-date protection on all levels, thanks to three pillars plant security, network security, and system integrity including Industrial Cybersecurity Services. At Digital Industries we create and implement digital manufacturing concepts for our vertical customer based on the Digital Enterprise software suite, TIA, MindSphere, Industrial Edge and Industrial cybersecurity offerings from Digital Industries. Are you passionate about safeguarding critical infrastructure and ensuring the security of industrial control systems? Join our team as a Cybersecurity Engineer and play a pivotal role in protecting our ICS and SIS systems, networks, and information. About The Role Key Responsibilities: Security MeasuresEngineer, implement, and monitor robust security measures to protect ICS and SIS systems, related networks, and sensitive information. System Security RequirementsIdentify and define system security requirements to ensure comprehensive protection. Security ArchitectureDesign and develop detailed cybersecurity architectures and designs, adhering to industry-standard blueprints and best practices. Implementing Backup Solutions and ManagementImplement and manage system backup technologies like Acronis, Veritas, Veeam and other providers, overseeing installation and deployment. Threat Detection and Vulnerability monitoringImplement solution like Claroty or Nozomi at ICS for the customers. Installing remediation to risk score for the customer. Endpoint SecurityDeploy and manage endpoint security and application control solutions from providers like McAfee, as well as SIEM solutions such as McAfee, Splunk, and Q-radar etc. Network SecurityImplement and manage network-based firewalls (e.g., Siemens, Fortinet, Palo Alto, CISCO), network troubleshooting, and intrusion detection products. Network ManagementInstall and manage network management solutions like SiNEC NMS, SolarWinds, WhatsUp Gold etc. Firmware UpdatesConduct firmware updates for various automation control systems, switches, and firewalls. Domain Controller ConfigurationConfigure and deploy domain controller settings and policies to defined computer groups as per approved list for ICS. Host-Based SecurityImplement host-based security technologies, including antivirus, data leakage prevention, host IPS, whitelisting, and anomaly detection. Installation and TestingPerform installation, configuration, and testing activities at both factory and customer sites, with experience in Factory Acceptance Testing (FAT) and Site Acceptance Testing (SAT). DocumentationPrepare comprehensive system documentation, including functional design specifications, backup systems documentation, firewall configurations, network diagrams, system architectures, asset inventory, FAT and SAT procedures, and operation & maintenance manuals. Experience 5 to 6 years of experience in working for OT Security systems design, implementation and consulting with at least some experience in industrial automation systems design. Proven experience in cybersecurity, particularly in ICS. Strong understanding of cybersecurity principles and best practices. Proficiency in managing backup technologies, endpoint security, SIEM solutions, and network-based firewalls. Hands-on experience with network management solutions and firmware updates. Ability to configure domain controllers and implement host-based security technologies. Excellent documentation skills and experience with FAT and SAT procedures. Education o Bachelor"™s degree in engineering (Electrical Engineering, Computer Engineering, or related field). A degree in Cybersecurity is preferred. o Valid certification in OT security (e.g., CISSP, GICSP, OSCP) would be additional advantage. Business Travel You will be in the delivery and implementation team and hence should be willing to travel and experience various manufacturing sites across India
Posted 2 months ago
6 - 8 years
7 - 8 Lacs
Hyderabad
Work from Office
Diverse Lynx is looking for Network Security Engineer to join our dynamic team and embark on a rewarding career journey Maintaining LAN, WLAN and architecture of the server as per the business policy Reporting the security analysis of findings Maintaining the regulatory systems about ISMS policy (Information System Management Systems) Developing the security authentication protocolMaintaining server and switches Maintaining & implementation of the SOP for Network security Knowledge of performing routing protocols (MPLS, HAIPE/IP, QOS and WAN) Monitoring of web security gateways, perimeter security, network access controls, endpoint security
Posted 2 months ago
5 - 9 years
4 - 8 Lacs
Bengaluru
Work from Office
Understand the existing security controls (including Endpoint Detection & Response, anti-malware and incident response) Engage with other IT teams including Network Engineering, Data Center, Service Desk to ensure a consistent approach for organizational support across the enterprise Understand the current state of the technology components in the IT stack ranging from networking, storage, compute (virtualization, containers), applications & security mgmt Establish non-production and production environments for testing and hosting the applications Adhere to the Scaled Agile Framework methodologies and tools that exists in the environment Participate in daily stand-up of Compliance & Security release train and contribute to bi-weekly sprints Learn System Engineering concepts to analyze existing environment and find more efficient ways Identify ways of doing things with full automation, AI and ML which needs knowing/learning the concepts of these technologies. Endpoint Security
Posted 2 months ago
2 - 5 years
11 - 16 Lacs
Sahibzada Ajit Singh Nagar
Work from Office
About Zscaler Serving thousands of enterprise customers around the world including 40% of Fortune 500 companies, Zscaler (NASDAQ: ZS) was founded in 2007 with a mission to make the cloud a safe place to do business and a more enjoyable experience for enterprise users. As the operator of the world’s largest security cloud, Zscaler accelerates digital transformation so enterprises can be more agile, efficient, resilient, and secure. The pioneering, AI-powered Zscaler Zero Trust Exchange™ platform, which is found in our SASE and SSE offerings, protects thousands of enterprise customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Named a Best Workplace in Technology by Fortune and others, Zscaler fosters an inclusive and supportive culture that is home to some of the brightest minds in the industry. If you thrive in an environment that is fast-paced and collaborative, and you are passionate about building and innovating for the greater good, come make your next move with Zscaler. At Zscaler, our Customer Success Organization is a global, customer-focused team dedicated to delivering high-impact experiences and identifying innovative solutions. We leverage valuable data and research to provide expert, hands-on support starting from the implementation phase and beyond, ensuring customers achieve their goals and leverage our technology to its fullest potential. Together, we create a customer-centric culture that fosters success, adoption, and continuous growth. We're looking for an experienced DLP Engineer to join our Customer Success team. Reporting to the Product Support Manager, you'll be responsible for: Providing Level II technical support for DLP solutions, including incident resolution, troubleshooting, and root cause analysis Assisting customers with DLP-related issues via phone, email, and remote sessions, ensuring timely and effective resolution Managing and prioritizing support cases, ensuring SLAs are met and customer satisfaction is maintained while resolving the customers’ issues Maintaining detailed documentation of support activities, including case notes, troubleshooting steps, and resolutions Contributing to the development and maintenance of a knowledge base, including creating and updating technical articles and FAQs What We're Looking for (Minimum Qualifications) Bachelor’s degree in Computer Science, Information Technology, or a related field, or equivalent work experience Minimum of 3-5 years of experience in technical support, with at least 2 years focused on DLP/CASB solutions Proficiency in DLP technologies and tools (e.g., Symantec DLP, McAfee DLP, Forcepoint DLP, etc.) What Will Make You Stand Out (Preferred Qualifications) Relevant certifications (CompTIA Security+, DLP vendor certifications) are a plus #LI-HYBRID #LI-RR1 At Zscaler, we are committed to building a team that reflects the communities we serve and the customers we work with. We foster an inclusive environment that values all backgrounds and perspectives, emphasizing collaboration and belonging. Join us in our mission to make doing business seamless and secure. Our Benefits program is one of the most important ways we support our employees. Zscaler proudly offers comprehensive and inclusive benefits to meet the diverse needs of our employees and their families throughout their life stages, including: Various health plans Time off plans for vacation and sick time Parental leave options Retirement options Education reimbursement In-office perks, and more! By applying for this role, you adhere to applicable laws, regulations, and Zscaler policies, including those related to security and privacy standards and guidelines. Zscaler is committed to providing equal employment opportunities to all individuals. We strive to create a workplace where employees are treated with respect and have the chance to succeed. All qualified applicants will be considered for employment without regard to race, color, religion, sex (including pregnancy or related medical conditions), age, national origin, sexual orientation, gender identity or expression, genetic information, disability status, protected veteran status, or any other characteristic protected by federal, state, or local laws. See more information by clicking on the Know Your Rights: Workplace Discrimination is Illegal link. Pay Transparency Zscaler complies with all applicable federal, state, and local pay transparency rules. Zscaler is committed to providing reasonable support (called accommodations or adjustments) in our recruiting processes for candidates who are differently abled, have long term conditions, mental health conditions or sincerely held religious beliefs, or who are neurodivergent or require pregnancy-related support.
Posted 2 months ago
4 - 8 years
10 - 15 Lacs
Hyderabad
Work from Office
Arcadis is the world's leading company delivering sustainable design, engineering, and consultancy solutions for natural and built assets. We are more than 36,000 people, in over 70 countries, dedicated toimproving quality of life. Everyone has an important role to play. With the power of many curious minds, together we can solve the worlds most complex challenges and deliver more impact together. Role accountabilities: Collaboration Proactively engages with Key Business Users to receive feedback, gauge satisfaction with system integrations, and address issues or concerns. Collaborates with OTE Application & Extension Manager to gather requirements and prioritize data transformation projects. Collaborates with OTE Team to deliver efficient and well-run processes. Application & Extension Services Supports development including: RequiredAPI Management RequiredDatabase Schema Design Ensures API endpoints conform to industry best practices and Oracle guidelines with focus on enterprise security and data privacy. Responsible for solution capacity planning, technical documentation, design review, refactoring and consolidation, upgrades and lifecycle for solutions. Establishes proactive application monitoring, alerting, and automating which adheres to industry best practices to ensure availability and performance to meet business demands. Coordinates with release manager the schedule of release activities across environments, teams, and vendors, identifying and resolving conflicts to minimize risk of business disruption. Accountable for incident and problem responses and resolutions, as well as service request queues to deliver high end-user satisfaction. Vendor Management Coordinates with 3rd parties who provide support for product enhancements, upgrades, patches and application monitoring. Key Profile Requirements Minimum of 8 years experience developing API endpoints, at least 4 of which with Oracle Cloud application services. Demonstrated experience successfully planning and implementing Cloud application services in a global company with a multi-national, multi-vendor environment. "‹Proven track record of achieving service excellence, including maintaining positive stakeholder relationships and coordinating multi-disciplinary teams with internal and external resources. Why Arcadis? We can only achieve our goals when everyone is empowered to be their best. We believe everyone's contribution matters. Its why we are pioneering a skills-based approach, where you can harness your unique experience and expertise to carve your career path and maximize the impact we can make together. Youll do meaningful work, and no matter what role, youll be helping to deliver sustainable solutions for a more prosperous planet. Make your mark, on your career, your colleagues, your clients, your life and the world around you. Together, we can create a lasting legacy. Join Arcadis. Create a Legacy. Our Commitment to Equality, Diversity, Inclusion & Belonging We want you to be able to bring your best self to work every day, which is why we take equality and inclusion seriously and hold ourselves to account for our actions. Our ambition is to be an employer of choice and provide a great place to work for all our people.
Posted 2 months ago
3 - 8 years
7 - 11 Lacs
Gurugram, Delhi / NCR
Work from Office
Job description We have a great opportunity available for a highly qualified Cloud Presales Solutions Engineer focused on Microsoft Azure in India. This role will provide technical expertise in support of pre-sales activities. The successful candidate will develop general knowledge across all IT areas and assist in the assessment, architectural reviews, design, demonstration, and enhancement of technology solutions as required. If you have a successful track record helping organizations navigate their journey to cloud-based platforms, this is a great chance to excel at what you love doing. Key Responsibilities • Work closely with the Sales team to provide full presales assistance in support of the successful achievement of sales targets. • Illustrate the value of the company's solution to prospects in a compelling manner. • Responsible for aligning the company's capabilities (products and services) with client business requirements through a professional and ethical business approach. • Involve in Proof-Of-Concept (POC) activities in order to assist sales in closing deals • Work closely with sales team to generate leads and opportunities • Assisting Internal Development team to develop cloud Native Application to deploy the solution using best practices • Develop Cloud-native technical approach and proposal plans identifying the best practice solutions meeting the requirements for a successful proposal. Create, edit, and review documents, diagrams, and other artifacts in response to RPPs RFQs and Contribute to and participate in presentations to customers regarding proposed solutions. • Cloud Architecture: Develop Public/Hybrid cloud reference architecture, Define target state cloud architecture, Experience with private and public cloud architectures, pros/cons, and migration considerations, Microservices architecture, and Hybrid cloud integration architecture. • Cloud Deployment: Hybrid Cloud architecture design, integration, and security, experience in cloud platforms - AWS, Azure, Google Cloud Platform, Cloud Foundry, Open Shift, Docker, etc. • Design deployment architecture for IaaS / SaaS /PaaS that will address our client's business needs and lead teams that will implement them for our clients. • Experience in Virtualization Platforms (e.g. VMWare, Hyper-V, etc.) is good to have • Experience with workload migration automation tools (multi-cloud) • Infrastructure provisioning and management (Ansible, Chef, Puppet, Chef) • Cloud native logging and monitoring stacks (ELK, EFK, ELE etc) • Cloud architect certified (GCP, Azure, AWS etc.) • DevOps and Agile methodologies, processes and tools. Requirements: Any Graudate - Grauduation is must • 3 years to more of experience ( Must have Azure Expereince with Any Sales experience If applicant have Intune tech expereince will give hike in Salary Package ) spanning at least two cloud IT disciplines including technical architecture, network management, application development, middleware, database management, or operations • Experience creating, deploying, and operating large scale applications on AWS/Azure/GCP • An advanced level Cloud Certification is an added advantage • Understanding of microservices and serverless architecture is an added advantage • Coding experience in one or more scripting languages e.g. Java, Python, NodeJS, bash etc. • Excellent communication, presentation, and writing skills • Should have hands-on experience of working on Cloud (AWS, Azure). • Should understand the costing of different cloud services and optimizations. • Should have experience with all major AWS (or) Azure services. • Conduct proof of concept (POC) and implement the design in AWS / Azure. • Azure Certifications is a must. Key Personal Attributes: • A strong stage presence and ability to manage client interactions, requirement gathering discussions, etc. • Ability to work independently with minimal direction providing technical and non-technical support to multiple users • Proficient in technology consulting, training and development • A strong people motivator with prominent levels of energy • Proactiveness - Be proactive in understanding the needs of our customers/clients • Relentless learner and the passion to pick up recent technologies Application Process: Interested candidates should submit their resume and a cover letter detailing their relevant experience on the below mention details . SHARIQ @ HR @ 9250383253 Sana @ 7065126218 / cv4voiceprofile@gmail.com No Fees No Charges Saturday Sunday Fixed Fixed Day shift Role & responsibilities Preferred candidate profile
Posted 2 months ago
4 - 9 years
12 - 17 Lacs
Bengaluru
Work from Office
We are looking for a highly skilled and experienced Cyber Triage and Forensics professional with 4 to 9 years of experience to join our team as a Shift Lead. The ideal candidate will have a strong background in cybersecurity, excellent leadership skills, and the ability to work effectively in a fast-paced environment. ### Roles and Responsibility Manage day-to-day operations and performance of CTF Analysts. Ensure prompt and efficient response to email and case queues. Distribute workload among threat hunting teams and oversee their activities. Participate in security event analysis and triage. Provide technical leadership and mentorship to junior analysts. Set clear performance expectations and manage team performance. Report case status and significant incident updates to the global lead. Update Standard Operating Procedures (SOPs) and drive continuous improvement within the team. Coordinate with the Technical Lead for incident and investigation support as needed. ### Job Requirements Bachelor's degree in Computer Science, Information Systems, Information Security, or equivalent work experience. Minimum 4-5 years of experience in a Security Monitoring/Security Operations Center environment (SOC), investigating security events, threats, and/or vulnerabilities. Understanding of electronic investigation and log correlation with proficiency in the latest intrusion detection platforms. Working knowledge of Linux and/or Windows systems administration, including Active Directory. Scripting or programming skills (Shell scripting, Python, PowerShell, Perl, Java, etc.). Familiarity with network and endpoint security principles, current threat trends, and a basic understanding of the OSI model. Working knowledge of Defense in depth strategies. Understanding Information Security Principles, Technologies, and Practices. Demonstrable experience with multiple security event detection platforms. Thorough understanding of TCP/IP and basic IDS/IPS rules to identify and/or prevent malicious activity. Demonstrated integrity in a professional environment. Good social, communication, and technical writing skills. Comfortable navigating and troubleshooting Linux and Windows system issues. Desired certifications such as SSCP, CEH, GCIH, GCFA, GCIA, GSEC, GIAC, Security+. Previous leadership experience as a team lead or supervisor is preferred.
Posted 2 months ago
2 - 5 years
5 - 6 Lacs
Chennai
Work from Office
Hi We are hiring for ITES Company for the Network Support Role (L1/L2 Position) Note : CCNA Certification is mandate Job Description: Provide first level support on both network outages and network-related projects. 2+ years of experience in Networking (LAN/ WAN & Security) Bachelor's Degree required; Cisco Certifications such as CCNA, CCNP is Required Demonstrable experience with Cisco Firewalls, Routers, Switches, Fortigate UTM and implementation experience of these devices. in .NET web framework 4.0 & 4.5 and object-oriented programming required. Deep knowledge with proven expertise of Cisco, Brocade networking products, Firewalls, Routers, Switches , Wifi (Cisco/Fortinet/Aruba), maintaining and troubleshooting Expertise in networking concepts such as IPLCs, Leased Lines, MPLS, TI/T3/ E1, VoIP, VPN tunnels etc. Provide 24x7 L1 network operational support of existing network, capacity planning, conduct infrastructure audits, configure security policies/VPNs Provide troubleshooting support to maintain all network systems and monitor them proactively to ensure that production downtime is minimized and SLAs are achieved Ensure an effective communication process is in place with all the stakeholders including vendors, server, voice and desktop support teams. Advanced level understanding of at least one of the following technologies and Intermediate level understanding of a secondary technology Storage (FC, ISCI, etc.) Concepts of Firewall / ACL / Load Balancer / Endpoint Security like McAfee / TrendMicro / Palo Alto Networks Skills / Symantec Linux/Windows Server To Apply WhatsApp 'Hi' @ 9151555419 and Follow the Steps Below: a) For Position in Chennai Search : Job Code # 251
Posted 2 months ago
4 - 8 years
7 - 9 Lacs
Bengaluru
Work from Office
Job Summary We are seeking a skilled IT professional with hands-on experience in managing Google Workspace, securing email infrastructure, and handling endpoint/user device management. The ideal candidate will be responsible for ensuring smooth collaboration through Google Workspace, protecting email systems from threats, and maintaining secure and compliant end-user computing environments. Skill Set 4 - 8 years of experience in IT systems administration or similar role. Proven experience managing Google Workspace for a mid-to-large user base. Solid understanding of email security protocols (SPF, DKIM, DMARC). Experience with email security platforms and endpoint management tools. Strong troubleshooting skills and familiarity with ITIL-based service management. Excellent communication and documentation skills . Roles and Responsibilities Google Workspace Administration Manage user accounts, groups, and organizational units. Implement and maintain Google Workspace security and compliance settings (DLP, Vault, SSO, etc.). Automate routine administration tasks using GAM or Google Admin SDK. Email Security & Compliance Deploy and manage email security tools (e.g., Mimecast, Proofpoint, Google Advanced Protection). Monitor and respond to email-based threats such as phishing, spoofing, and malware. Define and enforce SPF, DKIM, DMARC policies. Collaborate with the InfoSec team for email compliance and retention policies. Endpoint/User Device Management Manage and monitor endpoints across operating systems (Windows, macOS, ChromeOS). Deploy and manage MDM/EMM solutions (e.g., Google Endpoint Management, Intune, Jamf). Enforce device compliance policies, encryption, and remote wipe capabilities. Provide Tier 2/3 support for device-related issues. Operational & Security Hygiene Maintain IT asset inventory and ensure timely patching and updates. Document system configurations, procedures, and support materials. Participate in incident response and root cause analysis for device and email-related incidents.
Posted 2 months ago
3 - 6 years
5 - 8 Lacs
Bengaluru
Work from Office
BE, B-TEch, BCA, MCA, BSC, MSC computer science, Any technical graduate/post graduate. . Hands-on experience with DLP tools (e.g., Symantec DLP, Forcepoint DLP, Microsoft Purview, McAfee DLP, Digital Guardian, Netskope). Strong understanding of data classification, encryption, and regulatory compliance frameworks. Expertise in network security, endpoint security, and cloud security. Experience in SIEM integration, CASB solutions, and data discovery tools. Knowledge of incident response frameworks and forensic investigation techniques.
Posted 2 months ago
8 - 12 years
20 - 35 Lacs
Chennai, Bengaluru, Mumbai (All Areas)
Work from Office
Preferred candidate profile End Point Security Defender , Trend Micro - Server Identity and Access Management Sailpoint , Dilenea PAM , Microsoft PKI , Active directory Data Security Data Classification , DLP - MS pureview ,Imperva - Database activitiy monitoring , Data encryiption and clous app security
Posted 2 months ago
3 - 6 years
5 - 8 Lacs
Ambattur
Work from Office
Greetings from Datamark !!! Postion : Information Security Analyst Experience : 3 to 5 Yrs in Experience Location: Ambattur Industrial Estate , Chennai Position Overview: The Information Security Analyst is responsible for the administration of the organizations information and data security policies and practices of the overall internal security audit program to ensure that the Company is protected in terms of security, compliance and confidentiality. Primary Responsibilities: Coordinates and assists with security activities for the enterprise Operate, maintain, and validate vulnerability scanning of Infrastructure, Applications, and APIs Review daily threat intelligence. Ensures compliance to security standards for assigned sites Schedules and administers internal security audits for Client and Physical Site Audits Follows up on remediation plans Support the management and maintenance of security tools with an emphasis on Security Information and Event Monitoring (SIEM) tools. Assist with the review of technical deployments for risk prior to deployment across the campus. Recommends risk mitigation solutions based on audit findings Maintains Security and Compliance Metrics monthly Assists in the development and delivery of IT risk and security awareness and compliance training programs Willingness to travel to DATAMARK global sites as necessary Other duties as assigned Minimum Qualifications: Education Requirements: Bachelors degree in Computer Science or related field, experience in lieu of degree can be considered Field Experience: At least four years of experience in Information Security Position Experience: At least four years of experience in an Information Security Analyst position, or similar position Demonstrated experience with traditional vulnerability analysis: identify, categorize, prioritize, track, and validate remediation of known vulnerabilities by accountable IT teams Other Qualifications: Certification in IT Security required Knowledge in Information Security policies and practices Knowledge of third-party auditing and risk assessment methodologies Experience in an IT Security related environment preferred Required Skills: Extremely organized and detail oriented. Capable of holding team members accountable to timely delivery of audit evidences. Practices and methods of IT strategy, enterprise architecture and security architecture Excellent analytical and problem-solving abilities to identify and remediate security risks Team-work mentality to develop security solutions in collaboration with other IT professionals If you are interested please share your updated resume to jagadish.jayavel@datamark.net or contact us 9500681139
Posted 2 months ago
12 - 17 years
14 - 19 Lacs
Gurugram
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Palo Alto Networks Prisma Access Secure Access Service Edge (SASE) Good to have skills : NA Minimum 12 year(s) of experience is required Educational Qualification : 15 years full time education "Primary Skill :Good experience in security architecture design in Cloud and on-prem.Team management, Delegating responsibilities, Capablity development, Motivating team."Design and implementation in NGFW (PA/Fortinet/Checkpoint/cisco),Web Security( Zscaler, Symantec), in on-prem and Cloud, End point protection, multi-factor authenticationFirewall rule migration using tool and Data center migrationGood Hand-on Experience in AWS, Azure, GCP," Design and implementation experience of network security technologies - Next Generation Firewall (NGFW), Web Application Firewall (WAF), Intrusion Prevention / Detection System (IPS/IDS) - Fortigate / PaloAlto, F5, Imperva, Design and implementation experience of Endpoint Security Solutions - Antivirus, AntiMalware, Endpoint Detection and Response (EDR), Device Control, Vulnerability Protection, Application Control - Trend Micro, Crowdstrike, Sentinel One Design and implementation experience of Cloud Proxy Servers (Zscaler/NetSkope/ForcePoint/PaloAlto Prisma/McAfee) Design and implementation experience of Data Protection Solutions (Endpoint DLP, Network DLP (Email & Web), CASB) Design and implementation experience of Firewall Rule-set Analyzer Tools like Skybox / Algosec / Firemon / Tufin. Design and implementation experince of NAC solution ( Cisco ISE, Aruba) Data center migration experince and firewall rule migration using various tools." Hand-on experience in Azure/AWS design , Installation & configuration of various NGFW such as Paloalto, FortiGate, Checkpoint, Cisco, Prisma Cloud. End point protection as Symantec, Mcafee, Trend micro, EDR solution. Good Hands on experience and troubleshooting experience in NGFW such as Paloalto, Prisma, fortigate, Checkpoint, Cisco. End point protection as Symantec, Mcafee, Trend micro, EDR solution. Design and hands on experience to skybox, firemon, Tufin Firewall rule review tool, Firewall on-boarding Checkpoint, Cisco, Palo alto Certification, Cloud certification Experince on Infra Security tools Assessment and security standards like (NIST, CIS, ISO HIPPA & PCI DSS ) NAC, Cisco ISE, CASB Solution Netscope, Web security technologies as Zscaler,SymantecWeb security technologies as Zscaler, Symantec. Good conceptual and working knowledge around Workflow, Approval process.* Manageing and leading the team.* Good Articulation and presentation skills B.E or MCA or M.Sc with Good Computer Science Background with good academic record of 65% and above Presentation skill Qualifications 15 years full time education
Posted 2 months ago
3 - 6 years
5 - 8 Lacs
Bengaluru
Work from Office
Job Title - Security Delivery Associate Management Level: L13 or L12 Associate Location: Bengaluru Must have skills: Data Loss Prevention Good to have skills Understanding of computer hardware / operating systems (Windows, Linux, OS X, iOS/Android, etc.), IT Security, is a plus Job Summary :Accenture's Cyber Incident Response Team (CIRT) monitors the cyber threat landscape, coordinates prevention, detection, and corrective activities, and manages vulnerabilities and incidents. Within this organization, is the Data Loss Prevention team. This team responds to cyber-security incidents identified through the Data Loss Prevention (DLP) tool. By following a set process, the team is responsible for analyzing, collecting relevant details, determining the type of security incident, and escalating accordingly. The team works closely with other functions within CIRT to handle incidents. The team is also responsible for coordinating with numerous other teams who are involved with conducting follow-up investigations to such incidents. Roles & Responsibilities: Review DLP alerts appropriately, escalate and close cases in accordance with the team's defined process. Liaise with different functions within CIRT to gather information including Investigations, Infrastructure, ASOC, and Cyber Threat Intelligence. Coordinate with various teams during the escalation process, including Technology Support teams, Legal teams, HR, and other teams as defined in the escalation process. Keep all tracking and recording tools current and update incidents in tracking database with appropriate details in a timely manner. Perform incident accuracy checks within Incident Tracking database and update details when necessary. Effectively work and collaborate with a global team. Adapt to continuous process improvements and change requests as needed. Have strong communication skills; attention to detail and accuracy of information is paramount. Professional & Technical Skills: Above average problem-solving skills Excellent oral and written English communication skills Ability to manipulate and present data using MS Office and Excel Strong sense of ethics & values, ability to handle confidential situations with discretion Must be able to work collaboratively across physical locations or geographies Ability to multi-task and prioritize assigned workload Additional Information: Security+ Certification Experience working in Information Security domain Willing to work overtime, rotating shifts, work during weekends and holidays, as necessary
Posted 2 months ago
5 - 10 years
7 - 12 Lacs
Gurugram
Work from Office
Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Endpoint Protection Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Job Summary :We are seeking a skilled Beyond Trust Endpoint Privilege Management (EPM) Specialist to join our IT security team. The ideal candidate will be responsible for implementing, managing, and optimizing Beyond Trust EPM solutions on Windows 10 and Windows 11 environments. This role focuses on enhancing security by managing and controlling administrative privileges on endpoints, reducing attack surfaces, and ensuring compliance with security policies.Key Responsibilities: Implementation and Configuration:oDeploy and configure Beyond Trust EPM solutions on Windows 10 and Windows 11 systems.oCustomize EPM policies to meet organizational security requirements and best practices.oIntegrate Beyond Trust EPM with existing IT infrastructure and security tools. Privilege Management:oDevelop and enforce policies for least privilege access on endpoints.oMonitor and manage user and application privileges to prevent unauthorized access.oCreate and maintain whitelists and blacklists for applications and processes. Security and Compliance:oEnsure endpoint security compliance with organizational policies and regulatory requirements.oConduct regular audits of privileged access and generate compliance reports.oCollaborate with security and compliance teams to address findings and improve security posture. Monitoring and Reporting:oSet up and maintain monitoring and alerting systems for privileged access activities.oAnalyze and respond to security incidents related to privileged access.oGenerate regular reports on EPM activities, incidents, and compliance status. User Training and Support:oProvide training and support to end-users and IT staff on EPM policies and procedures.oAssist in troubleshooting and resolving issues related to EPM solutions.oDevelop and update documentation and training materials. Continuous Improvement:oStay up to date with the latest security threats, trends, and technologies.oRecommend and implement improvements to EPM policies and configurations.oParticipate in security assessments and risk management activities. Qualifications: Education:oBachelor's degree in information technology, Computer Science, Cybersecurity, or related field. Relevant certifications and experience may be considered in lieu of a degree. Experience:oProven experience in implementing and managing Beyond Trust EPM solutions.oStrong knowledge of Windows 10 and Windows 11 operating systems.oExperience with endpoint security and privilege management. Skills and Competencies:oDeep understanding of least privilege access principles and practices.oProficiency in configuring and managing EPM policies and rules.oFamiliarity with Active Directory, Group Policy, and other endpoint management tools.oExcellent troubleshooting and problem-solving skills.oStrong communication and interpersonal skills.oAbility to work independently and as part of a team. Certifications:oRelevant certifications such as Beyond Trust Certified Engineer (BTCE), Certified Information Qualifications 15 years full time education
Posted 2 months ago
4 - 9 years
8 - 12 Lacs
Bengaluru
Work from Office
locationsIndia, Bangalore time typeFull time posted onPosted 30+ Days Ago job requisition idJR0035120 Job Title: Senior Staff Software Engineer About Trellix: Trellix, the trusted CISO ally, is redefining the future of cybersecurity and soulful work. Our comprehensive, GenAI-powered platform helps organizations confronted by todays most advanced threats gain confidence in the protection and resilience of their operations. Along with an extensive partner ecosystem, we accelerate technology innovation through artificial intelligence, automation, and analytics to empower over 53,000 customers with responsibly architected security solutions. We also recognize the importance of closing the 4-million-person cybersecurity talent gap. We aim to create a home for anyone seeking a meaningful future in cybersecurity and look for candidates across industries to join us in soulful work. More at . Role Overview: We are looking for a Senior Engineer to work on the Endpoint Detection and Response product line. About the Role : Design, build and maintain efficient ,reusable, and reliable C++ code. Good understanding of software architecture and design patterns. Strong Object-Oriented Programming principles. Strong in data structures and algorithms Gather technical requirements and specifications from customers and business stakeholders and develop technical specifications according to which solutions are defined and delivered. Deliver solutions that meet the timeline, quality and costs for the projects and deliverable elements. Solutions must meet the preset goals for quality, security, and performance. About You : You are a Technical Leader with 14+ years of relevant experience Proficiency in C++ coding and very strong debugging skills - Kernel and user space You have relevant exposure to Endpoint security products Knowledge of Windows User Mode and kernel mode programming and internals You have exposure in working on multiple platforms - Windows, Linux and Mac. Good understanding of software architecture and design patterns. Strong Object-Oriented Programming principles. Strong in data structures and algorithms Good knowledge of operating system internals. You have sufficient exposure to attack techniques across operating systems. Working knowledge of tools like WinDbg, Coverity, Application Verifier, etc. Strong communication skills Good organisational and time-management skills You keep yourself updated with the latest technology trends in Security Software and Cybersecurity as an industry. Meticulous at both analysis and execution Ability to collaborate and work with multiple teams across different time-zones Company Benefits and Perks: We work hard to embrace diversity and inclusion and encourage everyone to bring their authentic selves to work every day. We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees. Retirement Plans Medical, Dental and Vision Coverage Paid Time Off Paid Parental Leave Support for Community Involvement We're serious about our commitment to diversity which is why we prohibit discrimination based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.
Posted 2 months ago
3 - 5 years
6 - 10 Lacs
Bengaluru
Work from Office
locationsIndia, Bangalore time typeFull time posted onPosted 30+ Days Ago job requisition idJR0034909 Job Title: SDET About Trellix: Trellix, the trusted CISO ally, is redefining the future of cybersecurity and soulful work. Our comprehensive, GenAI-powered platform helps organizations confronted by todays most advanced threats gain confidence in the protection and resilience of their operations. Along with an extensive partner ecosystem, we accelerate technology innovation through artificial intelligence, automation, and analytics to empower over 53,000 customers with responsibly architected security solutions. We also recognize the importance of closing the 4-million-person cybersecurity talent gap. We aim to create a home for anyone seeking a meaningful future in cybersecurity and look for candidates across industries to join us in soulful work. More at . Role Overview: Trellix is looking for SDETs who are self-driven and passionate to work on Endpoint Detection and Response (EDR) line of products. The team is the ultimate quality gate before shipping to Customers. Tasks range from manual and, automated testing (including automation development), non-functional (performance, stress, soak), solution, security testing and much more. Work on cutting edge technology and AI driven analysis. About the role: Peruse requirements documents thoroughly and thus design relevant test cases that cover new product functionality and the impacted areas Execute new feature and regression cases manually, as needed for a product release Identify critical issues and communicate them effectively in a timely manner Familiarity with bug tracking platforms such as JIRA, Bugzilla, etc. is helpful. Filing defects effectively, i.e., noting all the relevant details that reduces the back-and-forth, and aids quick turnaround with bug fixing is an essential trait for this job Identify cases that are automatable, and within this scope segregate cases with high ROI from low impact areas to improve testing efficiency Hands-on with automation programming languages such as Python, Java, etc. is advantageous. Execute, monitor and debug automation runs Author automation code to improve coverage across the board Willing to explore and increase understanding on Cloud/ On-prem infrastructure About you: 3-5 years of experience in a SDET role with a relevant degree in Computer Science or Information Technology is required Show ability to quickly learn a product or concept, viz., its feature set, capabilities, functionality and nitty-gritty Solid fundamentals in any programming language (preferably, Python or JAVA) and OOPS concepts. Also, hands-on with CI/CD with Jenkins or similar is a must RESTful API testing using tools such as Postman or similar is desired Familiarity and exposure to AWS and its offerings, such as, S3, EC2, EBS, EKS, IAM, etc., is required. Exposure to Docker, helm, argoCD is an added advantage Strong foundational knowledge in working on Linux based systems. This includes, setting up git repos, user management, network configurations, use of package managers, etc. Hands-on with non-functional testing, such as, performance and load, is desirable. Exposure to Locust or JMeter tools will be an added advantage Any level of proficiency with prometheus, grafana, service metrics, would be nice to have Understanding of Endpoint security concepts around Endpoint Detection and Response (EDR) would be advantageous. Company Benefits and Perks: We work hard to embrace diversity and inclusion and encourage everyone to bring their authentic selves to work every day. We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees. Retirement Plans Medical, Dental and Vision Coverage Paid Time Off Paid Parental Leave Support for Community Involvement We're serious about our commitment to diversity which is why we prohibit discrimination based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
31458 Jobs | Dublin
Wipro
16542 Jobs | Bengaluru
EY
10788 Jobs | London
Accenture in India
10711 Jobs | Dublin 2
Amazon
8660 Jobs | Seattle,WA
Uplers
8559 Jobs | Ahmedabad
IBM
7988 Jobs | Armonk
Oracle
7535 Jobs | Redwood City
Muthoot FinCorp (MFL)
6170 Jobs | New Delhi
Capgemini
6091 Jobs | Paris,France