Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
7.0 - 12.0 years
15 - 25 Lacs
Chennai
Hybrid
We are looking for a Lead Cybersecurity Engineer with deep technical expertise and leadership experience to drive innovative threat detection solutions and lead a team of security engineers. The ideal candidate will bring hands-on experience in research & development (R&D) , demo environment creation , endpoint security , SIEM operations , and cloud-native tools such as Azure Sentinel and the Microsoft Defender suite . This role will play a strategic part in shaping our security detection roadmap and mentoring a high-performing team. Key Responsibilities: Technical Leadership & Strategy Lead a team of cybersecurity engineers in R&D, detection engineering, and solution design. Define detection strategies and oversee implementation of new use cases across tools. Collaborate with security architects, threat intel, and SOC teams for end-to-end threat coverage. R&D & Security Innovation Drive continuous improvement through security research, PoCs, and new technology evaluations. Analyze evolving threats and proactively build defense strategies and custom detections. Lead the development of security content aligned with frameworks like MITRE ATT&CK. Demo Environment & Simulation Lab Design and lead the creation of demo/test environments to simulate real-world threats. Automate environment deployment for testing security tools, rules, and threat scenarios. Build reusable assets and playbooks for internal enablement and customer-facing demos. Endpoint & SIEM Security Lead implementation and optimization of Microsoft Defender for Endpoint , Defender for Identity , and Defender for Cloud . Oversee the configuration and tuning of Azure Sentinel , including custom KQL queries, analytics rules, and automation via playbooks. Ensure integration of diverse log sources and enrichment for advanced threat detection. People & Process Management Mentor junior engineers and promote skill development across the security engineering team. Establish standards and documentation for security engineering best practices. Drive cross-functional collaboration with IT, Cloud, Compliance, and SOC stakeholders. Required Skills & Experience: 8+ years in cybersecurity roles, with 3+ years in a leadership or senior engineering position . Strong hands-on experience with: Azure Sentinel (KQL, workbooks, playbooks) Microsoft Defender for Endpoint, Identity, and Cloud Endpoint security, EDR, and threat detection Security lab/demo environment setup Excellent understanding of security frameworks (MITRE ATT&CK, NIST, etc.). Strong scripting and automation skills (PowerShell, Python, etc.). Experience managing or mentoring technical teams and delivering complex security projects.
Posted 1 day ago
5.0 - 8.0 years
7 - 10 Lacs
Bengaluru
Work from Office
Whats the role As a Cyber Threat Prevention Advisor in the CyberDefence SecOps team, you'll join the Vulnerability team to manage and oversee vulnerability processes, ensuring they are trackable and measurable with robust tool support. Your team will lead the implementation of these processes within ServiceNow Security Operations (SecOps), establishing standard workflows and integrating them with IT service management processes executed by Line of Defence 1 within IRM. This role leverages market-standard tools and practices to streamline the architecture by reducing dependency on Collective. What youll be doing Asset Discovery: Set-up and lead adequate discovery of new Shell IT assets in Shell's legacy IT network, RES & Portfolio companies, Cloud environments and PCD and Retail environments. Ensure visibility in new areas such as Internet of Things and Cloud and investigate possibilities to keep track of IT assets. Automated Vulnerability Scanning: Maintain a portfolio of tools for automated vulnerability scanning with a focus on Business-Critical systems and systems that are available from the public Internet. Set-up regular scanning and make results available for further analytics in IRM investigation platform. Take appropriate action on vulnerabilities where required. Security Posture Reporting: Use the results from asset discovery, vulnerability scanning, penetration testing and attack simulation to provide an overview of vulnerabilities in Shell IT landscapes for different stakeholders including IRM LT and IDSO LT. Create specific reports for Business, Business Critical applications, IDSO service lines, External perimeters etc. Act as a Subject Matter Expert on implications of a vulnerability in an IT system and establishing the priority of applying security patches. Help creating prioritized overviews of Cyber vulnerabilities and putting these in a context of IT services and Business applications. Take mitigating actions coming out of identified threats or vulnerabilities either directly by the team or agree the actions with other parties in Shell. What you bring Bachelors degree in Computer Science, Information Technology, or related field 5-8 years of total experience in IT Security including at least 3-4 years of experience in Vulnerability Assessment Proficient in analysing network traffic using tools such as tcpdump or wireshark Strong experience in using open-source scanning tools such as nmap, nessus, metasploit and/or commercial tools such as Rapid7 or Qualys Knowledge in integrating Vulnerability Management into modern CI/CD Pipelines with 'shift-left' strategy Understanding of Network Security, Cloud Security, Endpoint Security, Application Security Understanding Cyber Threat Landscape and analyzing Threats from various sources. Assess new threats, rate threat per Shell ratings and collaborate with Threat team on new threat criticality Understanding of CVE id CVSS score and metrics Familiar with application of Cybersecurity Benchmarks, NIST controls, PCI controls Lead security research proposals and Proof Of Concepts for Emerging Technologies and assessing Fit-For-Purpose Tools. Understanding of Cloud Security Posture Management (CSPM) Expertise in operating Application security tools like Rapid7 Appspider, Netsparker Knowledge on CI/CD pipeline able to understand the integration of security tools and guide the developers Understanding of Application security design and providing guidance to developers on secure design. Good understating of SAST/DAST concepts and process Knowledge of Mobile DAST scanning and vulnerabilities and remediation consultation Knowledge of Splunk, SecOps VR, basic querying and creating dashboards Additional Skills (Good to have): PCI-DSS Compliance Scan. SecOps VR Module in ServiceNow. Linux environment experience. Azure/AWS Cloud Console. Wiz.io tool knowledge. Advanced Splunk skills.
Posted 2 days ago
3.0 - 8.0 years
1 - 5 Lacs
Gurugram
Work from Office
Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Endpoint Protection Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are seeking a skilled Beyond Trust Endpoint Privilege Management (EPM) Specialist to join our IT security team. The ideal candidate will be responsible for implementing, managing, and optimizing Beyond Trust EPM solutions on Windows 10 and Windows 11 environments. This role focuses on enhancing security by managing and controlling administrative privileges on endpoints, reducing attack surfaces, and ensuring compliance with security policies. Roles & Responsibilities:- Implementation and Configuration:-Deploy and configure Beyond Trust EPM solutions on Windows 10 and Windows 11 systems.-Customize EPM policies to meet organizational security requirements and best practices.-Integrate Beyond Trust EPM with existing IT infrastructure and security tools.-Privilege Management:-Develop and enforce policies for least privilege access on endpoints.-Monitor and manage user and application privileges to prevent unauthorized access.-Create and maintain whitelists and blacklists for applications and processes.-Security and Compliance:-Ensure endpoint security compliance with organizational policies and regulatory requirements.-Conduct regular audits of privileged access and generate compliance reports.-Collaborate with security and compliance teams to address findings and improve security posture.-Monitoring and Reporting:-Set up and maintain monitoring and alerting systems for privileged access activities.-Analyze and respond to security incidents related to privileged access.-Generate regular reports on EPM activities, incidents, and compliance status.-User Training and Support:-Provide training and support to end-users and IT staff on EPM policies and procedures.-Assist in troubleshooting and resolving issues related to EPM solutions.-Develop and update documentation and training materials.-Continuous Improvement:-Stay up to date with the latest security threats, trends, and technologies.-Recommend and implement improvements to EPM policies and configurations.-Participate in security assessments and risk management activities. Professional & Technical Skills: - Bachelors degree in information technology, Computer Science, Cybersecurity, or related field. Relevant certifications and experience may be considered in lieu of a degree.-Proven experience in implementing and managing Beyond Trust EPM solutions.-Strong knowledge of Windows 10 and Windows 11 operating systems.-Experience with endpoint security and privilege management.-Skills and Competencies:-Deep understanding of least privilege access principles and practices.-Proficiency in configuring and managing EPM policies and rules.-Familiarity with Active Directory, Group Policy, and other endpoint management tools.-Excellent troubleshooting and problem-solving skills.-Strong communication and interpersonal skills.-Ability to work independently and as part of a team. Additional Information:- The candidate should have minimum 3 years of experience in Endpoint Protection.- This position is based at our Gurugram office.-Relevant certifications such as Beyond Trust Certified Engineer (BTCE), Certified Information- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 days ago
4.0 - 9.0 years
15 - 18 Lacs
Pune
Hybrid
Hi, Greeting for the Day!!! We found your profile suitable for the below opening, kindly go through the JD and reach out to us if you are interested. About Us Incorporated in 2006, We are an 18 year old recruitment and staffing company, we are a provider of manpower for some of the fortune 500 companies for junior/ Middle/ Executive talent. About Client Hiring for One of the Most Prestigious Multinational Corporations! Job Description Job Title : Endpoint Security Qualification : Any Graduate or Above Relevant Experience : 4+ Required Background: A strong infrastructure background, at least 4-5 years of hands-on experience managing, configuring, and troubleshooting endpoint security using Microsoft Defender for Endpoint, as well as exposure to InTune and mobile device management (MDM) which requires strong technical/logical understanding of Microsoft Intune. Must-Have Skills: Extensive experience providing L2 support for security and modern workplace management tools. Complete knowledge about Security center Portal, Intune Portal and Azure portal. Experience in Microsoft defender for Endpoints and Mobile Device Management. Must demonstrate progressive development of responsibilities, including extensive technical troubleshooting skills. Experience and Hands on in troubleshooting for firewall related Issues Wireshark view, Local firewall rule creation etc. Experience & Knowledge in Mobile Device Management with MacOS & Android. Good amount of Knowledge about BITLOCKER encryption and Storm shield data Security. Well Versed about possible ways to best manage and maintain Microsoft Defender for Endpoint with a strong focus on endpoint Security. Must understand how to identify and recommend industry best practices. The ability to set new standards for quality, performance or productivity. Location: Pune (Only) CTC Range : 15LPA 18 LPA (Lakhs Per Annum) Notice period : Immediate / serving Notice period Mode of Interview : Virtual Joel IT Staffing Analyst Black and White Business solutions PVT Ltd Bangalore, Karnataka, INDIA 8067432474 I joel.manivasan@blackwhite.in I www.blackwhite.in
Posted 2 days ago
2.0 - 7.0 years
1 - 5 Lacs
Gurugram
Work from Office
Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Endpoint Protection Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Tech Support Practitioner, you will act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world-class systems running. You can accurately define a client issue and interpret and design a resolution based on deep product knowledge. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work-related problems.- Provide timely and effective technical support to clients.- Troubleshoot and resolve endpoint protection software issues.- Collaborate with internal teams to enhance system performance.- Document and maintain technical support procedures.- Stay updated on industry trends and best practices. Professional & Technical Skills: - Must To Have Skills: Proficiency in Endpoint Protection.- Strong understanding of cybersecurity principles.- Experience in analyzing and resolving software issues.- Knowledge of network security protocols.- Familiarity with endpoint security solutions. Additional Information:- The candidate should have a minimum of 2 years of experience in Endpoint Protection.- This position is based at our Gurugram office.- A 15 years full-time education is required. Qualification 15 years full time education
Posted 3 days ago
4.0 - 9.0 years
5 - 11 Lacs
Mumbai, Thane, Mumbai (All Areas)
Work from Office
Role & responsibilities Identify potential customers in the Pharma /BFSI /Manufacturing/Healthcare other industries along with the OEMs and build strong relationships with key decision-makers in the OEM and customers. Conduct market research and analysis to identify new business opportunities and stay updated with industry trends and competitors and build repo with CISOs. Deliver product presentations and demonstrations to prospective clients, highlighting the features and benefits of our cybersecurity solutions. Collaborate with the marketing team to develop sales collateral, including presentations, case studies, and proposals as per joint go to strategy with the OEMs. Manage the complete sales cycle, from lead generation to deal closure, ensuring timely follow-ups and effective pipeline management along with the OEMs. Negotiate contracts and pricing agreements with customers, while ensuring profitability and customer satisfaction. Provide regular updates and interlock with the Account management and SE team of focused OEM along with the senior management team. Stay updated with the latest advancements in the cybersecurity industry and continuously enhance product knowledge along with key OEM certifications. Preferred candidate profile The candidate must have experience in "Cyber security Sales".
Posted 3 days ago
0.0 - 2.0 years
3 - 4 Lacs
Hyderabad
Work from Office
We have urgent requirement for security positions Company : Mphasis Job Type : Full Time Skill: Email security,ATP, Network security, Cloud security Exp : 0 to 8 Yrs Np: Immediate -30Days Location : Any Mphasis If you are interested share your details. Exp: Rel Exp: Company: Payroll Company: Current CTC: ECTC: Any Offers(mention offered CTC): Notice Period(LWD If serving): Current Loc: Preferred Loc: Have you Applied before for Mphasis(Yes/No): Are you available for Video call interview ?
Posted 3 days ago
3.0 - 6.0 years
20 - 25 Lacs
Pune
Work from Office
Experienced Data Analyst skilled in Python, Tableau, and Power BI with exposure to Intune/SCCM. Strong in IT/endpoint data reporting, compliance insights, and dashboarding. Suitable for hybrid Pune-based UEM analytics roles. Required Candidate profile Looking for a Data Analyst with experience in IT systems or Intune/SCCM. Must know Python, Tableau/Power BI. UEM or endpoint data experience is a plus.
Posted 3 days ago
8.0 - 13.0 years
8 - 12 Lacs
Bengaluru
Work from Office
Cybersecurity Incident Manager is responsible for managing and mitigating enterprise-level cybersecurity incidents leading the coordination and communication of incident response efforts. The main priorities are ensuring timely detection, containment, eradication, and recovery from cyber threats while minimizing operational disruptions. Key Responsibilities Monitor, detect, and respond to security incidents using various security tools and technologies. Execute containment, eradication, and recovery procedures during incidents to minimize impact and restore normal operations. Develop and maintain incident response playbooks and escalation procedures to ensure a consistent and efficient response to incidents. Collaborate with other IT and security teams to remediate vulnerabilities and improve the overall security posture. Prepare detailed and accurate incident reports and documentation for internal use and for external stakeholders, if necessary. Stay current with the latest threats, vulnerabilities, and security technologies to ensure effective detection and response capabilities. Serve as the primary coordinator during cybersecurity incidents, aligning efforts across technical and business teams. Conduct real-time analysis and correlation of security events from multiple sources including SIEM, IDS/IPS, firewalls, and endpoint security solutions. Perform in-depth investigation and analysis of security incidents, including malware analysis, forensic investigations, and reverse engineering. Participate in threat hunting activities to proactively identify and mitigate potential security risks. Stay informed about new threats and trends in cybersecurity to enhance response skills. Ensure compliance with the organization's incident response framework and regulatory requirements. Coordinate with Enterprise Risk Management, SOC, Legal, IT, Data Privacy, and other functions for a unified response. Collaborate with third-party vendors and MSSPs as needed. Act as the primary contact for incident updates to executive leadership and stakeholders. Generate comprehensive reports during and after incidents, including root cause analysis and mitigation strategies. Supervise the creation of post-incident reports and ensure that lessons learned are integrated into future planning strategies. Propose security improvements to prevent the reoccurrence of incidents. Perform regular tabletop exercises and simulations to train and prepare teams. Qualifications Bachelors degree in Computer Science, Information Security, or a related field, or equivalent work experience. At least 12+8 years of experience in a SOC or similar security-focused environment. Experience in managing large-scale cybersecurity incidents. Understanding of regulatory requirements and industry standards (e.g. GDPR, HIPAA, PCI-DSS). Proficient written and verbal communication skills. Strong hands-on experience with SIEM platforms (e.g. Palo Alto XSIAM, Splunk, QRadar), IDS/IPS systems, firewalls, endpoint security tools and service management tools (e.g. ServiceNow) Proficiency in conducting forensic investigations and malware analysis. Experience with scripting and automation tools (e.g., Python, PowerShell) to streamline incident response tasks. Deep understanding of network protocols, operating systems, and common attack vectors. Relevant certifications such as CISSP, CISA, CISM, CEH, or GIAC are highly desirable. Excellent problem-solving skills and the ability to work under pressure in a fast-paced environment. Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 4 days ago
7.0 - 12.0 years
20 - 25 Lacs
Pune
Work from Office
Mandate Skills- SIEM, PAM, Endpoint security & Vulnerability assessment. Key Responsibilities Incident Response and Management: Lead the incident response process, including identification, containment, eradication, and recovery. Analyze and respond to complex security incidents and breaches. Conduct post-incident analysis and develop reports with recommendations to prevent future incidents. Security Monitoring and Analysis: Oversee the continuous monitoring of security alerts and events. Analyze logs and data from various sources (e.g., SIEM, firewalls, EDR, IDS/IPS) to identify suspicious activity. Perform advanced threat hunting and forensic analysis. Vulnerability Management: Conduct regular vulnerability assessments. Identify, prioritize, and remediate security vulnerabilities in systems and applications. Collaborate with IT and development teams to implement security patches and updates. Security Architecture and Engineering: Design and implement security solutions to protect the organization's networks, systems, and data. Develop and maintain security policies, standards, and procedures. Evaluate and recommend new security technologies and tools. Compliance and Risk Management: Ensure compliance with relevant regulatory requirements and industry standards (e.g., ISO 27001, NIST). Perform risk assessments and develop mitigation strategies. Document and maintain security controls and frameworks. Required Skills and Qualifications Technical Expertise: Advanced knowledge of cybersecurity principles, techniques, and technologies. Proficiency in using security tools such as SIEM, IDS/IPS, firewalls, and endpoint protection solutions. Experience with vulnerability management, penetration testing, and forensic analysis. Experience: Minimum of 7-10 years of experience in cybersecurity, with at least 2-3 years in an L3 or senior role. Proven track record of handling complex security incidents and leading incident response efforts. Experience in designing and implementing security architectures and solutions. Certifications: Relevant certifications such as CISSP, CISM, CEH, GIAC, or equivalent are highly desirable. Analytical and Problem-Solving Skills: Strong analytical skills with the ability to identify and mitigate security threats. Excellent problem-solving skills and the ability to think critically under pressure. Communication and Collaboration: Strong communication skills, both written and verbal. Ability to collaborate effectively with cross-functional teams and stakeholders. Preferred Skills and Qualifications Experience with cloud security (e.g., AWS, Azure, Google Cloud). Knowledge of scripting and automation tools (e.g., Python, PowerShell). Familiarity with regulatory requirements and standards (e.g., GDPR, HIPAA).
Posted 4 days ago
2.0 - 3.0 years
3 - 6 Lacs
Bengaluru
Work from Office
Suprajit Engineering Ltd. is looking for Network Security Engineer to join our dynamic team and embark on a rewarding career journey Maintaining LAN, WLAN and architecture of the server as per the business policy Reporting the security analysis of findings Maintaining the regulatory systems about ISMS policy (Information System Management Systems) Developing the security authentication protocol Maintaining server and switches Maintaining & implementation of the SOP for Network securityKnowledge of performing routing protocols (MPLS, HAIPE/IP, QOS and WAN) Monitoring of web security gateways, perimeter security, network access controls, endpoint security
Posted 4 days ago
5.0 - 10.0 years
14 - 24 Lacs
Hyderabad, Chennai
Hybrid
JD Background in Data Analysis Experience in training Artificial Intelligence models, with special focus on prompt engineering Two years related work experience in Data Loss Prevention (DLP), and/or Cybersecurity. For DLP, experience providing recommendations for tuning content detection rules to improve accuracy, a plus Able to learn and apply new concepts quickly Proven analytical and problem solving abilities Able to learn and apply new concepts quickly Proven analytical and problem solving abilities Strong communications skills Responsibilities: train Machine Learning (AI) models in answering Data Loss Prevention topics Be an advocate of users of Artificial Intelligence (AI): understand and give prompts from user perspective. generate metrics for AI responses Evaluate AI responses and generate comprehensive feedback about the prompt and the responses Document and articulate the AI feedback into guide books Communicate the AI feedback across stakeholders and drive continuous improvements The JD for the DLP role is still accurate. We want candidates who has domain knowledge in using DLP module of compliance tools such as: MS Purview ProofPoint ForcePoint Symantec DLP others
Posted 4 days ago
5.0 - 7.0 years
8 - 12 Lacs
Chennai
Work from Office
Role & responsibilities Design, implement, and manage endpoint security solutions, including antivirus, EDR, NDR, XDR and intrusion detection prevention systems. Expertise required on DLP and DAM solution to build up the protection policies and deployment with hands on troubleshooting skills Monitor endpoint security systems to detect and respond to security incidents. Conduct regular security assessments and vulnerability scans to identify potential security weaknesses. Ensure that endpoint security systems are configured and maintained in accordance with security best practices and industry standards. Collaborate with other IT teams and systems administrators to ensure that endpoint security solutions are integrated into the organization s overall security posture. Research and evaluate new security technologies and make recommendations for implementation. Develop and implement security policies and procedures for end users, including guidelines. Provide training and support to end users on how to use endpoint security solutions effectively. Respond to security incidents and participate in incident response efforts as required. Stay up to date on the latest security trends and developments and maintain a high level of technical expertise in the field of endpoint security. Required troubleshooting skills for all end point security system such as AV, NDR,VA and NAC solution Expertise on OS Linux, windows and MAC.. Managing the systems and keep them up to date with the latest patches. Strong Skills required related to network component such as routing, Switch Requirements and skills Proven hands-on 5 to 7 years as Endpoint security engineering experience Certification in endpoint security products such EDR, DLP & Deception technology. Deep understanding of endpoint security products (e.g., Sentinel one, Force point,Trendmicro) Solid understanding of the OSI or TCP/IP model Hands-on experience with monitoring, diagnostic and analytics tools Degree in Computer Science. Immediate availability is preferred Perks and benefits
Posted 4 days ago
10.0 - 15.0 years
20 - 30 Lacs
Chennai
Work from Office
As the Chief Information Security Officer (CISO) at Galaxy Health Insurance, you will lead the development and implementation of a robust cybersecurity strategy to safeguard digital assets and data. This role ensures compliance with Indian regulations (IRDAI, DPDPA) while mitigating risks in cloud infrastructure, APIs and third-party ecosystems. Role & responsibilities Cybersecurity Strategy & Execution Design and execute a comprehensive enterprise-wide information security strategy aligned with IRDAI guidelines, ISO 27001, and global best practices. Secure core systems including APIs, applications, databases and cloud workloads. Integrate cybersecurity into digital transformation, DevSecOps, and product lifecycle initiatives. Policies & Governance Define, develop, implement, and maintain information security policies, standards, and procedures. Ensure policy enforcement across departments through regular audits, compliance reviews and corrective action plans. Review and update policies in response to threat landscape changes and regulatory updates. Embed policy controls in business processes, vendor SLAs and IT operations. Regulatory Compliance & Risk Management Ensure compliance with IRDAI cybersecurity regulations, DPDPA, HIPAA (as applicable), and ISO 27001. Conduct risk assessments, privacy impact assessments, and internal security audits. Monitor and manage cybersecurity risks related to third parties and APIs. Security Operations & Incident Response Lead the Security Operations Center (SOC), incident response team, and threat monitoring processes. Establish and maintain robust incident response and disaster recovery plans. Ensure timely breach detection, containment, investigation, and regulatory reporting, especially for PII and financial data breaches. Collaboration & Stakeholder Engagement Work closely with IT, application owners, operations, legal, compliance, and external providers to ensure secure operations. Serve as the key liaison with regulators (e.g., IRDAI), auditors, and industry bodies on security matters. Oversee security due diligence for partnerships, vendor onboarding, and mergers/acquisitions. Training & Awareness Build and maintain an organization-wide security awareness program, including phishing simulations and secure data handling training. Promote a culture of security and data privacy across all levels of the organization. Reporting & Metrics Provide regular reports and dashboards to executive leadership and the board on the organizations security posture, key risks, and ongoing initiatives. Track key risk indicators (KRIs), audit findings, and mitigation timelines. Requirements and skills Bachelors or Masters degree in Information Security, Computer Science, Information Technology, or a related field. 10–15 years of progressive experience in information security, with at least 5 years in a leadership or CISO role, preferably within the insurance sector. Strong understanding of IRDAI cybersecurity regulations, HIPAA, NIST, and ISO/IEC 27001 standards. Hands-on expertise in cloud security, Identity and Access Management (IAM), data privacy, SOC operations, Vulnerability Assessment and Penetration Testing (VAPT) and security monitoring tools. Demonstrated success in managing security program governance, risk management initiatives, and regulatory audit readiness. Industry-recognized certifications such as CISSP, CISM, CISA, CRISC, HCISPP, or ISO 27001 Lead Implementer are highly preferred. Excellent leadership, communication, and stakeholder engagement skills. Immediate availability is preferred Perks and benefits
Posted 4 days ago
12.0 - 15.0 years
25 - 30 Lacs
Bengaluru
Work from Office
The IT Infrastructure Security Lead is responsible for managing and overseeing the security of the organization's IT infrastructure, including office environments and data centres. This role focuses on safeguarding hardware Required Candidate profile Protection of IT assets, including hardware, data centers, and network infrastructure. Proactive identification and mitigation of infrastructure vulnerabilities. Close collaboration with the IT team
Posted 5 days ago
10.0 - 20.0 years
35 - 50 Lacs
Bengaluru
Work from Office
Design, implement, and assess cybersecurity controls across IT and OT environments. Conduct vulnerability assessments, develop secure architectures, and ensure compliance with standards Required Candidate profile Experienced in hands-on cybersecurity engineering and threat assessment with exposure to IT and OT. Strong in vulnerability scanning, architecture reviews, and cross-functional collaboration.
Posted 6 days ago
5.0 - 8.0 years
8 - 12 Lacs
Thane
Work from Office
Qualifications. Proven experience in information security management roles. In-depth knowledge of information security principles and practices. Experience in developing and implementing information security policies and procedures. Familiarity with regulatory requirements and industry standards related to information security. Strong understanding of network security, cryptography, identity and access management, and security architecture. Experience with security risk assessments and vulnerability management. Knowledge of security technologies, such as firewalls, intrusion detection/prevention systems, antivirus, and endpoint security. Excellent communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams. Bachelor’s degree or higher in Information Security, Computer Science, or a related field. Relevant certifications (e.g., CISSP, CISM, CISA) are a plus. Demonstrated leadership skills and the ability to mentor and guide a team. Show more Show less
Posted 6 days ago
3.0 - 7.0 years
8 - 12 Lacs
Gurugram
Work from Office
Dentsply Sirona is the world’s largest manufacturer of professional dental products and technologies, with a 130-year history of innovation and service to the dental industry and patients worldwide. Dentsply Sirona develops, manufactures, and markets a comprehensive solutions offering including dental and oral health products as well as other consumable medical devices under a strong portfolio of world class brands. Dentsply Sirona’s products provide innovative, high-quality and effective solutions to advance patient care and deliver better and safer dentistry. Dentsply Sirona’s global headquarters is located in Charlotte, North Carolina, USA. The company’s shares are listed in the United States on NASDAQ under the symbol XRAY.. Bringing out the best in people. As advanced as dentistry is today, we are dedicated to making it even better. Our people have a passion for innovation and are committed to applying it to improve dental care. We live and breathe high performance, working as one global team, bringing out the best in each other for the benefit of dental patients, and the professionals who serve them. If you want to grow and develop as a part of a team that is shaping an industry, then we’re looking for the best to join us.. Working At Dentsply Sirona You Are Able To. Develop faster with our commitment to the best professional development.. Perform better as part of a high-performance, empowering culture.. Shape an industry with a market leader that continues to drive innovation.. Make a difference -by helping improve oral health worldwide.. Scope. The Senior Security Analyst is responsible for maintaining security systems, implementing process automation, and responding to security incidents. They must have a thorough understanding of both cloud-based and on-prem environments and threats. They serve as an escalation point for incident response and the support of security toolsets. They must be capable of working on multiple projects and alerts with general supervision.. Key Responsibilities. Administer, monitor, and maintain cloud-based and on-prem security systems.. Coordinate the implementation and upgrade of security systems.. Administer, monitor, and maintain automated security response tools.. Develop and maintain automated security processes and workflows.. Investigate and remediate security related alerts for both cloud-based and on-prem systems.. Investigate and remediate security policy violations.. Research threat actors, tactics, techniques, procedures, malware, and other IOCs.. Engineer and tune custom alerts for security systems.. Research emerging security technologies and make recommendations to influence security initiatives.. Assist with documentation and training related to security systems.. Act as an escalation point and mentor for junior analysts.. Act as an escalation point and oversee relationship with hosted SOC.. Act as a technical point of contact during security incidents.. Prepare security reports for benchmarking security efficiency.. Collaborate with cross-functional teams to support security initiatives of varying complexity.. Typical Background. Education: BS/BA Degree in Computer Information Systems, Computer Science, Information Systems Management, or equivalent professional experience. Certifications/Licensing: COMPTIA Security+, CEH, CISSP, GIAC Security Essentials, CCNA Security, Google Professional Cloud Security Engineer. Years and Type of Experience: 6+ years of experience in Information Systems with at least 2 years of formal experience in Cyber Security.. Excellent English written and spoken communication skills with the ability to explain technical information to non-technical people.. Key Required Skills, Knowledge And Capabilities. Experience with the Microsoft Suite of Security Tools.. Experience with configuration and management of security solutions for Google Cloud, Microsoft Azure, and/or Amazon Web Services.. Experience with configuration and management of endpoint security solutions including EDR and DLP.. Experience with process and security automation.. Experience with SIEM configuration, alert tuning, and KQL.. Experience with configuration and management of Office 365 services and security solutions.. Experience with incident response.. Must have excellent technical writing and research skills.. Experience with Microsoft Windows, Linux, and macOS.. Willing to work non-standard hours and be on-call.. Team player.. Ability to work with ambiguity.. Resilience to change.. Communication skills.. Integrity.. Open minded, respectful, empathetic ability to work in a multicultural environment.. Analytical thinking, problem solving.. DentsplySirona is an Equal Opportunity/ Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, sexual orientation, disability, or protected Veteran status. We appreciate your interest in DentsplySirona.. If you need assistance with completing the online application due to a disability, please send an accommodation request to careers@dentsplysirona.com. Please be sure to include “Accommodation Request” in the subject.. Show more Show less
Posted 6 days ago
2.0 - 5.0 years
11 - 15 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
About Us. At SentinelOne, we’re redefining cybersecurity by pushing the limits of what’s possible—leveraging AI-powered, data-driven innovation to stay ahead of tomorrow’s threats.. From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We’re looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you’re excited about solving complex challenges in bold, innovative ways, we’d love to connect with you.. What are we looking for?. If you’re passionate about enabling customer success through leading and facilitating successful deployments of our highest value accounts, this role is for you. SentinelOne is growing its Customer Success team and looking for a technically skilled project manager. Responsibilities include managing project milestones and timelines in coordination with the customer as well as with internal cross-functional resources in Technical Account Management, Product Management, and Professional Services. The role requires facilitating a partnership between our customers and internal teams to define and implement project KPIs and parameters that will realize optimal ‘time to value’ and enable long-term success and growth.. What will you do?. The key responsibility of this role will be to facilitate a partnership between customers and internal teams, creating an engaging and productive deployment experience for customers throughout their solution adoption phase. Additional responsibilities will include regular cadence reporting on key metrics as defined by CS leaders (ex, indicators of feature adoption or deployment progress), pre-sales support on services, and collaboration with service delivery teams to tailor service offerings to client requirements.. Onboard key customers through full deployment, with a focus on structured project management combined with white-glove relationship management.. Work cross-functionally within SentinelOne with Support, Product Management, Engineering & other teams to provide customers with insight while advocating for their needs. Communicate expectations, project timelines, requirements, and potential blockers to key stakeholders, both internal and external. Lead the deployment project teams in removing obstacles and addressing technical challenges when necessary, including ensuring issues are escalated and actively managed. Expand the client engagement by collaborating with key decision-makers and stakeholders to understand their requirements and continually position our services as the optimal solution for net new, upsell, and renewal opportunities.. Strategic Pre-Sales Support on Services: Collaborate with the Sales, Solution Engineering, & Customer Success Management and service leaders to help with the positioning of our Services offerings and meet sales targets while ensuring ‘right-fit’.. Achieving trusted advisor status by understanding all aspects of the Services portfolio, including MDR, DFIR, Threat Hunting, Strategic Advisory, and Deployment Services.. Demonstrate the value of service positions by executing compelling presentations and demonstrations of our services to prospective clients. Articulate the value proposition of our Services and how they address specific client needs and challenges.. Collaborate with the service delivery teams and customers to ensure alignment between sales, solution engineering, and service execution, and when relevant, provide initial scoping along with the Services team.. What skills and knowledge should you bring?. At least 7 years of prior experience at an enterprise software company (preference to those with Endpoint Protection experience) in related roles (Customer Success, Support, Training, etc.). Experience with managing highly complex implementations and technical engagements for a diverse set of customers, including identifying customer requirements. Customer-focused with experience in customer-facing roles (Customer Success, Support, Professional Services, Customer Onboarding, etc.). Experience with Salesforce and with project management tools like Asana/Atlassian.. Requirement for an existing understanding of customer IT/security architecture and continued learning related to the technical landscape and deployment specifics of SentinelOne product and service offerings. Knowledge of security technologies, architecture, and operations and experience in advising customers on best practices. Knowledge of Windows, MacOS and Linux operating systems as well as containerized environments. Display a talent for building strong relationships and managing customer expectations resulting in high customer satisfaction. Cross-functional excellence with a track record of getting teams to work together on accomplishing complex operational goals. Ability to lead, support, and drive on-going projects and meet deadlines in a complex and dynamic environment. Impeccable written and verbal communication skills. Thrives in a multitasking environment and can adjust priorities on-the-fly. Strategic and creative thinker with well-developed problem-solving and analytical skills. Experience with a structured project management methodology which may include; Agile Methodologies (Including Scrum or Kanban), Lean, Traditional Waterfall, Six Sigma, PMBOK, or a hybrid of these or other methodologies. Experience in the IT or Cybersecurity industry, especially Endpoint Security and SIEM, with host base (endpoint agent) security solutions is preferred. Why us?. You will be joining a cutting-edge company, where you will tackle extraordinary challenges and work with the very best in the industry.. Industry leading gender-neutral parental leave. Paid Company Holidays. Paid Sick Time. Employee stock purchase program. Disability and life insurance. Employee assistance program. Gym membership reimbursement. Cell phone reimbursement. Numerous company-sponsored events including regular happy hours and team building events. SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.. SentinelOne participates in the E-Verify Program for all U.S. based roles.. Show more Show less
Posted 6 days ago
0.0 - 6.0 years
2 - 8 Lacs
Gurugram
Work from Office
Required Skills Behavioral | Aptitude | Communication Technology | Hardware and Networking | Installation, configuration, maintainance and repair Technology | Audio, Video support | Installation and configuration Technology | Windows Operating System | Installation, configuration and management Technology | End Point Security | Antivirus management, data encryption, DLP, desktop firewall, VPN, AD policies Education Qualification : Any Graduate Certification Mandatory / Desirable : Technology | Microsoft 365 Certified | Modern Desktop Administrator Associate 1) Field Services Support Engineers primary responsibility is to provide support to an organization s IT systems to help them meet their business goals, this is done by ensuring that all computers and networks operate efficiently with high uptime. 2) As a desktop engineer, you may need to assemble and install client desktop computers and assist the end-user in securing their hardware. 3) This role also involves hands & feet support for various IT support teams to perform activities related to periodic maintenance to handling individual systems hardware, software, and network queries 4) To support daily technical support activities for computers & all other end point devices. Update the support ticket with the progress, to set up and test desktop computer peripherals. 5) To perform the system changes adhered to organizational policies. 6) Conduct remote desktop troubleshooting to end user issues. Maintain technical documentation in association with other functional departments 7) Technical Skills a. Windows Operating System: b. Ability to Install and troubleshoot different versions of Windows OS independently. E.g. Windows XP. Windows 7, Windows 10 and Windows 11 c. Understanding of desktop applications and how do they work, installation & uninstallation. d. Understanding of domain setup & ability to add / remove computers to domain. update Group policies. carry out Disk management, Disk Encryption, Wireless configuration. check utilization and availability, ability to perform start up and shut down services by following SOP. deploy gold images on multiple desktops using SOP, Ability to install and configure client applications independently 8) In addition to above, support and perform below activities. a. Exchange and Mobility Clients b. Printer management c. Backup and Recovery d. Audio, Video support e. End Point Security/Patch Management f. Hardware and Networking
Posted 6 days ago
6.0 - 8.0 years
7 - 10 Lacs
Ahmedabad
Work from Office
Experience: 6+ Years Key Responsibilities: Design, implement, and manage secure network solutions including firewalls, VPNs, IDS/IPS, and endpoint protection. Monitor and analyze network traffic to identify suspicious behavior and respond to threats. Perform vulnerability assessments and penetration testing to identify risks and provide mitigation strategies. Maintain and update security systems, hardware, and software, including firewalls, routers, switches, and antivirus platforms. Respond to and investigate security incidents, breaches, and alerts. Develop and enforce network security policies, procedures, and best practices. Collaborate with other IT teams to ensure overall system security and performance. Conduct security audits and prepare reports for management and compliance. Keep up to date with the latest cybersecurity trends, threats, and technology solutions. Requirements: Education & Experience: Bachelors degree in Computer Science, Information Technology, or related field. 6+ years of experience in network security or IT security-related roles. Technical Skills: Strong knowledge of network protocols, firewalls (e.g., Palo Alto, Fortinet, Cisco ASA), IDS/IPS, and SIEM tools. Proficiency in configuring and managing routers, switches, and network appliances. Experience with VPNs, SSL, IPsec, and secure remote access solutions. Familiarity with industry standards and frameworks (e.g., NIST, ISO 27001, CIS Controls). Scripting skills (e.g., Python, Bash) are a plus. Soft Skills: Excellent problem-solving and analytical skills. Strong communication and documentation abilities. Ability to work independently and in a team environment.
Posted 1 week ago
2.0 - 5.0 years
8 - 8 Lacs
Bengaluru
Work from Office
Role: Microsoft Defender/MAC Endpoint Vulnerability Management Specialist Role Summary: He/She will be responsible for managing vulnerability remediation activities using Microsoft Defender, with a strong focus on endpoint security and management. Additionally, should possess expertise in Mobile Device Management (MDM) solutions such as Intune, and demonstrate advanced troubleshooting skills at the Windows OS level. Scripting knowledge is considered a plus. Location: Bangalore Preferred Duration: 3 Months(Extendable Project) Date : Immediate Joining also preferred Key Responsibilities: - Review vulnerabilities report, analyze the solutions available and execute vulnerability remediation activities using Microsoft Defender. - Collaborate with the Security Team to assess vulnerabilities and implement mitigation strategies. - Manage endpoint security configurations and policies through Microsoft Defender. - Implement solutions through Mobile Device Management solutions, Intune/WS1/SCCM. - Develop policies as required in collaboration with Product Owners and Security team. - Provide L3 level support for Windows OS-related issues. - Diagnose complex system problems and work towards resolution swiftly. - Utilize scripting languages (e.g., PowerShell) to automate or deploy solutions as needed. - Develop scripts to enhance monitoring capabilities or streamline solution deployment processes. - Maintain comprehensive documentation of processes, incidents, resolutions, and changes implemented. Qualifications: - Proven experience in managing Microsoft Defender Endpoint solutions. - Expertise in MDM tools like Intune/WS1/SCCM. - Strong troubleshooting skills at the Windows OS level. - Proficiency in scripting languages such as PowerShell. - Excellent analytical skills with attention to detail. - Strong communication skills; ability to collaborate effectively with cross-functional teams. - Ability to work independently while managing multiple priorities efficiently. - Work experience with monitoring tools like Nexthink is an advantage.onsibilities
Posted 1 week ago
1.0 - 4.0 years
3 - 6 Lacs
Bengaluru
Work from Office
Job Title: SOC Analyst Location: Bangalore (on site) Experience Level: 1 to 4 years The candidate must be willing to work in rotational shifts 24/7. About ColorTokens At ColorTokens , we empower businesses to stay operational and resilient in an increasingly complex cybersecurity landscape. Breaches happen but with our cutting-edge ColorTokens Xshield platform , companies can minimize the impact of breaches by preventing the lateral spread of ransomware and advanced malware. We enable organizations to continue operating while breaches are contained, ensuring critical assets remain protected. Our innovative platform provides unparalleled visibility into traffic patterns between workloads, OT/IoT/IoMT devices, and users, allowing businesses to enforce granular micro-perimeters, swiftly isolate key assets, and respond to breaches with agility. Recognized as a Leader in the Forrester Wave : Microsegmentation Solutions (Q3 2024) , ColorTokens safeguards global enterprises and delivers significant savings by preventing costly disruptions. Join us in transforming cybersecurity. Learn more at www.colortokens.com . Our culture We foster an environment that values customer focus, innovation, collaboration, mutual respect, and informed decision-making. We believe in alignment and empowerment so you can own and drive initiatives autonomously. Self-starters and highly motivated individuals will enjoy the rewarding experience of solving complex challenges that protect some of the world s impactful organizations - be it a children s hospital, or a city, or the defense department of an entire country. Company Overview: ColorTokens is a fast-growing cybersecurity product company that is redefining the way enterprises protect their digital assets. Our market-leading Xshield platform enables Zero Trust microsegmentation and real-time visibility into application traffic, ensuring robust protection against modern cyber threats. We are looking for passionate and driven individuals to join our mission in building cutting-edge security products. Job Description: Skills and Experience: 1 to 4 years of experience in Cyber Incident response and investigations. Correlate and analyze events using the Splunk/Log Rhythm/Qradar and stellar cyber SIEM tool to detect IT security incidents. Knowledge of network and endpoint security, threat intelligence, and vulnerabilities. Conduct analysis of log files, including forensic analysis of system resource access. Monitor multiple security technologies, such as SIEM, IDS/IPS, Firewalls, Switches, VPNs, networking, and other security threat data sources. Knowledge of sandbox and malware analysis. Knowledge of Cyber Kill Chain and MITRE ATT&CK frameworks functionality. Possible attack activities, such as scans, man in the middle, sniffing, DoS, DDoS, etc. and possible abnormal activities, such as worms, Trojans, viruses, etc. CCNA, CEH, CISSP, GCA, GCIA, GCIH, SANS certification would be preferable. High level of integrity, professionalism, and attention to detail Ability to communicate complex security issues to peers and management alike. A motivated, self-managed individual who can demonstrate above average analytical skills and work professionally with peers and customers even under pressure. Roles & Responsibilities: Investigate alerts, triage, deep dives, and come up with proper action items and remediation plans. Conduct investigation, containment, and other response activities with business stakeholders and groups. Compose incident analysis and find reports for management, including gap identification and recommendations for improvement. Recommend or develop new detection logic and tune existing sensors/security controls. Participate in security incident response through in-depth, technical (log, forensic, malware, packet) analysis. Provide oversight of security alert detection and analysis capabilities across multiple technologies to ensure that security incidents are identified in a timely manner. Escalate and support potential security incidents in line with appropriate processes. Support communications of potential security incidents via multiple channels. Participate in the response to potential security incidents by identifying and communicating relevant supplementary information. Identify and analyze new and emerging threats to determine impacts to G-P and provide guidelines and recommendations pertaining to opportunities to strengthen G-P security posture. Assist with information security due diligence requests as needed. Provide security recommendations to other team members, management, and business stakeholders for solutions, enhancements to existing systems, and new security tools to help mitigate security vulnerabilities and automate repeatable tasks. Conduct security reviews, perform vulnerability assessments, recommend remediation actions, and manage security policies and access controls to monitor, protect, and govern data and applications across private and cloud environments. Qualifications: Education: Bachelor s degree in information technology, Computer Science, Business, Engineering required, or equivalent experience. Certifications: Advanced certifications such as OSCP, GCIH, GSOC, or GCIA. Incident Response Experience: 1 to 4 years of experience in Cyber Incident response and investigations. Strong interpersonal skills with the ability to collaborate well with others. And, strong written, verbal and communication skills must be needed. Why Join Us? Work on a cutting-edge cybersecurity product in a fast-paced startup environment. Collaborate with a world-class team of engineers and security experts. Opportunity to learn, grow, and make a real impact from day one.
Posted 1 week ago
5.0 - 10.0 years
8 - 12 Lacs
Thane
Work from Office
Pre-Sales Engineer (Cyber Security) Experience: 3 5+ years of relevant experience in the design or pre-sales domain - Very strong background in routing switching firewall, and most recent 2 3 years in the Security domain. - Strong knowledge of consultancy services on network security and endpoint security (DLP, EDR/ADR/XDR/MDR, email security, MDM , SSE ). - Solid technical support experience in large-scale cybersecurity projects and mission-critical infrastructures is an advantage Educational Qualifications: Degree in Engineering, C.Sc., or equivalent. Recognized certifications such as CCIE (Security, RS) or equivalent Pre-Sales Engineer (Cyber Security) Experience: 3 5+ years of relevant experience in the design or pre-sales domain - Very strong background in routing switching firewall, and most recent 2 3 years in the Security domain. - Strong knowledge of consultancy services on network security and endpoint security (DLP, EDR/ADR/XDR/MDR, email security, MDM , SSE ). - Solid technical support experience in large-scale cybersecurity projects and mission-critical infrastructures is an advantage Educational Qualifications: Degree in Engineering, C.Sc., or equivalent. Recognized certifications such as CCIE (Security, RS) or equivalent Experience: 3 5+ years of relevant experience in the design or pre-sales domain Experience: - Very strong background in routing switching firewall, and most recent 2 3 years in the Security domain. - Strong knowledge of consultancy services on network security and endpoint security (DLP, EDR/ADR/XDR/MDR, email security, MDM , SSE ). - Solid technical support experience in large-scale cybersecurity projects and mission-critical infrastructures is an advantage Educational Qualifications: Degree in Engineering, C.Sc., or equivalent. Recognized certifications such as CCIE (Security, RS) or equivalent Educational Qualifications:
Posted 1 week ago
3.0 - 5.0 years
15 - 16 Lacs
Bengaluru
Work from Office
Strong understanding of VM principles, methodologies, Microsoft Defender for Endpoint(MDE). scripting languages (e.g., PowerShell, Python) & ServiceNow Intune/Microsoft Endpoint Manager (MEM)
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6462 Jobs | Ahmedabad
Amazon
6351 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane