Home
Jobs

281 Endpoint Security Jobs - Page 6

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Fortinet Firewall.

Posted 3 weeks ago

Apply

5.0 - 10.0 years

4 - 9 Lacs

Mumbai, Hyderabad, Chennai

Work from Office

Detailed Job Description: Strong knowledge of networking (Firewalls, routing, TCP/IP, Packet flow and analysis), Operating System (MS Windows, Unix/Linux/Ubuntu), Information Security Concept (Vulnerability, Hardening, OWASP TOP 10, CIA Tried and related controls etc.. • Hands-On experience on different security tools like Network Security (WAF, Network APT, Secure Web Gateway), IAM (PIM, RSA), Endpoint, Security (EDR, DAM, NAC, DLP, FIM, IRM, SIEM/SOAR, Active Directory, Web Application etc. • Good communication, managerial, documentations (i.e presentations, dashboards, HLD/LLD, SOPs, Policies & Configuration etc) and project management skills, should be capable enough to coordinate with different stakeholders. • Experience in Incident management, change management, problem, capacity planning, Migration and availability management etc. • Hand-On experience in automation and optimization (i.e. scripting, ansible, rest API etc) of security tools to minimize manual intervention, human error and faster resolution/response. • Responsible for day-to-day operations and handle technical escalations by L1 and NPCI team, perform root cause analysis, Initiate RMA, follow call closure, assist in internal and external audit, ensure meet SLA as defined, managing L1 team, etc. • Accountable for team building, resource management, skill enhancement, cross function learning and working etc • Certifications: Relevant certifications i.e Certified Endpoint Protection Professional, CEH, CISM, CISSP, CISA, ITIL, COBIT, ISO 27001 etc.

Posted 3 weeks ago

Apply

8.0 - 12.0 years

15 - 25 Lacs

Mohali

Hybrid

Sr. Manager Technology: Sr. Manager Technology is responsible for monitoring the efficiency and performance of the company's technology and oversee the overall Information Technology Operations. He makes sure that the processes defined are adhering and working as per the policies designed to meet the requirement of security and compliance standards of the Organization. KRAs (Technical) Managing and maintaining the overall IT infrastructure of the Organization. End user support as per the SLAs defined. Monitoring and measuring the performance of team members through metrices for the weekly reports. Handling escalations from the business stakeholders/Departments. Oversee the technological changes for the Organization. VAPT (Vulnerability and Penetration testing) / Security rating of the company. Automated Firewalls backup, Server backups, configuration backups. O365 security implementation, SPAM/Security policies to resist the SPAM. O365/SharePoint administration, MS Teams administration. Thorough understanding of end point security like Dell Carbon black and security policies. Technical understanding of Windows/Linux Server administration, Security hardening. MAC OS, iOS platform knowledge. A very good understanding of VOIP infrastructure and Telecom providers for the VOIP services. Hands on to an ITIL/ITSM compliant tool like Fresh Service to manage and maintain the inventory. Knowledge of best security practices and tools to backtrack any security issues like Spamming/Phishing/email headers etc. VPN, IPsec tunnels, security policies implemented at Org level (may include URL filtration as well) Technical exposure to routers/switches/Access points and wireless technologies. Security patching, version control, Change management. Vendor management to choose the right product/services. KRAs (Compliances) Prior experience to work and collaborate as an auditee for ISO 9001 -27001, GDPR, SOC2 Type 2, CPRA, and RFPs filling. Well versed with the security policies as per the ISMS standards. Main auditee for the internal/external audits for the Organization. Ambitious to map the controls with the defined security policies. Good writing skills to draft the policies and procedures. Maintain compliance documents archives and document libraries for different stakeholders/Departments in MS Teams, SharePoint/NAS. Maintain and review the access approvals/approval mechanism aligned with the polices. Maintain the physical security of IT Assets as per compliance and security standards. KRAs (Team Management) A mentor to motivate the team by not only managing the team but showing them the path to achieve the Objectives defined by the Management. Working in a direction with a mutual goal set by the Management. Team player to guide the team for the betterment of the Department/Organization. Positive mindset to handle the conflicts and to guide the team members. A good speaker demonstrating the leadership qualities to motivate the team. Desirable (Communication skills) Must have a fluent speaker to interact with the US folks and top management. Should have an advanced level writing and office grammar skills. Strong PowerPoint presentation skills to present the decks/business cases in the management meetings. Ready to represent the Department in the events/public meetings. Additional skillsets: Microsoft Partnership portal management, Channel partnership management, Software licenses, Azure administration for D365, SendGrid for bulk email sending, mail chimp, MS Visio knowledge for layout diagrams.

Posted 3 weeks ago

Apply

5.0 - 10.0 years

15 - 20 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats. Do Design and develop enterprise cyber security strategy and architecture Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses Identify risks associated with business processes, operations, information security programs and technology projects Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge Identify security design gaps in existing and proposed architectures and recommend changes or enhancements Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. Provide support during technical deployment, configuration, integration and administration of security technologies Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity Provide solution of RFP’s received from clients and ensure overall design assurance Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture Depending on the client’s need with particular standards and technology stacks create complete RFPs Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps Evaluate and recommend solutions to integrate with overall technology ecosystem Tracks industry and application trends and relates these to planning current and future IT needs Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers Provide training to employees on issues such as spam and unwanted or malicious emails Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Program Manager/Director Regular reporting & updates Infrastructure (CIS team) For infrastructure support External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming security technologies (e.g. Firewalls, IPS, DDoS, SIEM, WAF, Endpoint etc.) and understanding of compliance regulatory requirement like PCI DSS, HIPAA, etc.- Expert Systems Thinking - Understanding of the Wipro system (interrelatedness, interdependencies and boundaries) and perform problem solving in a complex environment - Expert Leveraging Technology - In-depth knowledge of and mastery over ecosystem technology that commands expert authority respect - Master Technical Knowledge - Certified Information Systems Security Professional (CISSP), Cloud Architect Certification from AWS and Azure, ToGAF or SABSA certification- Master Competency Levels Foundation Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. Competent Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. Expert Applies the competency in all situations and is serves as a guide to others as well. Master Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. Behavioral Competencies Effective Communication Managing Complexity Client centricity Technology Acumen Innovation Problem Solving approach Collaborative Working Execution Excellence Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2. Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led

Posted 3 weeks ago

Apply

10.0 - 15.0 years

12 - 17 Lacs

Pune

Work from Office

Wipro Limited (NYSE:WIT, BSE:507685, NSE:WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role : Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 3 weeks ago

Apply

10.0 - 20.0 years

12 - 22 Lacs

Bengaluru

Work from Office

About The Role : Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led

Posted 3 weeks ago

Apply

5.0 - 10.0 years

12 - 17 Lacs

Hyderabad

Work from Office

About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 3 weeks ago

Apply

10.0 - 20.0 years

12 - 22 Lacs

Hyderabad

Work from Office

About The Role : Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led

Posted 3 weeks ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Hyderabad

Work from Office

About The Role : Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT

Posted 3 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role _x000D_ Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? _x000D_ Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? _x000D_ i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? _x000D_ 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? _x000D_ Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Cloud Security Posture Management_x000D_. Experience8-10 Years_x000D_. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 3 weeks ago

Apply

6.0 - 11.0 years

12 - 17 Lacs

Kolkata

Work from Office

Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Saviynt. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 3 weeks ago

Apply

6.0 - 11.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 3 weeks ago

Apply

3.0 - 5.0 years

4 - 8 Lacs

Bengaluru

Work from Office

About The Role Primary Skill (Technical Skill) Application Packaging Secondary Skill Windows, MECM, Intune ? Experience Level 6 –8 Years (B3) 3 - 5 Years (B2) Location of Posting Chennai Rates Including Mark up - 80 K/M - 90K/M ? Candidate should have the experience of customer facing role Primary Knowledge- Hands-on experience in Creation of MSI, MSIX, Intunewin packages using Flexera Admin Studio/ Install-shield, Microsoft Tools like Win32 Content Prep & MSIX Packaging tool Experience in creating Connection groups and Runvirtual keys Basic to Intermediate know-how and experience towards Scripting – VB script / PowerShell scripting Knowledge of Operating Systems – Win 10, Win11 Experience with SCCM (Microsoft Endpoint Configuration Manager) ? Support the Service & Product Manager across several technical domains Contribute expertise to the management of existing and new IT products and services Define workarounds for known errors and initiate process improvements Strong understanding of performance analysis for Applications packaging process Experience in Testing and implementing Application Packages Establish and implement policies, procedures, and technologies. Familiarity with support processes, including Incident, Problem, Request, Event, and Change Management. ? Mandatory Skills: Application Packaging - Windows. Experience3-5 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 3 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Hyderabad

Work from Office

About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: ForgeRock Identity Manager. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 3 weeks ago

Apply

8.0 - 12.0 years

15 - 20 Lacs

Bengaluru

Work from Office

About The Role _x000D_ Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? _x000D_ Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? _x000D_ i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? _x000D_ 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? _x000D_ Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led

Posted 3 weeks ago

Apply

8.0 - 13.0 years

16 - 22 Lacs

Noida, Gurugram, Delhi / NCR

Hybrid

Role & responsibilities Lead - Endpoint Security & Tooling The Lead - Endpoint Security & Tooling plays a pivotal role in overseeing and optimizing a diverse array of endpoint security tools and technologies. The Lead will spearhead the configuration, troubleshooting, and maintenance of security tools, develop and implement robust security policies, conduct in-depth threat intelligence analysis, design secure endpoint architectures, and assess and mitigate risks to endpoints. Roles and Responsibilities Expertise in Security Tools: Lead the management and optimization of the Zscaler suite of applications, including Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), Browser Isolation, Firewall (Tunnel 2.0), Deception, and other endpoint security tools. Demonstrate proficiency in Microsoft Intune for advanced endpoint security management, encompassing policy configuration, device management, compliance enforcement, and performance optimization. Exhibit familiarity with Endpoint Detection and Response (EDR) solutions, encompassing advanced threat detection, configuration management, policy enforcement, and performance monitoring. Display proficiency in Application Control solutions for managing and controlling application execution on endpoints, including policy management and application behavior monitoring. Endpoint Security Tooling Management: Oversee the configuration, troubleshooting, and maintenance of security tools to ensure optimal performance and effectiveness. Conduct regular assessments and audits of endpoint security configurations. Stay updated with new releases, versions, changes, and breaking changes in Microsoft Intune and other endpoint security tools. Assess the impact of new releases and changes on endpoints and security policies. Security Policy Development: Lead the development and implementation of comprehensive endpoint security policies, configurations, and best practices. Ensure strict compliance with industry standards and regulations. Secure Architecture Design: Apply expert security architecture principles to design and implement highly secure endpoint architectures. Implement sophisticated network segmentation, access controls, and secure configurations for endpoints. Risk Assessment and Mitigation: Conduct comprehensive risk assessments for endpoints to identify potential risks and vulnerabilities. Lead the implementation of robust risk mitigation strategies and controls to reduce risks to endpoints. Communication and Collaboration: Collaborate seamlessly with cross-functional teams, including IT, security, compliance, and business stakeholders. Communicate complex technical concepts related to endpoint security effectively to non-technical audiences. Continuous Learning and Adaptability: Stay at the forefront of the latest trends, threats, and technologies in endpoint security. Adapt swiftly to the evolving security landscape and emerging threats in endpoint security. Problem-solving and Critical Thinking: Apply advanced problem-solving skills and critical thinking to analyze and resolve complex security issues related to endpoints. Lead the troubleshooting of endpoint security incidents and drive the development of innovative solutions. Preferred candidate profile Bachelor's degree in Computer Science, Information Technology, or related field (Master's degree preferred). Proven leadership experience (7+ years) in endpoint security management, including extensive expertise in Microsoft Intune and other endpoint security tools. Advanced understanding of endpoint security principles, technologies, and best practices. Familiarity with network security concepts, firewalls, VPNs, and secure web gateways. Outstanding analytical, problem-solving, and communication skills. Ability to lead collaboratively in a team environment, manage multiple projects simultaneously, and drive results effectively. Advanced skills in threat intelligence analysis, incident response, security architecture design, risk assessment, communication, continuous learning, adaptability, problem-solving, and critical thinking. Good to have : Certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Endpoint Security Professional (CESP). Benefits Benefits which make us unique At EZ, we know that great people are what makes a great firm. We value our people and offer employees a comprehensive benefits package. Learn more about what working at Egon Zehnder can mean for you! Benefits Highlights: 5 Days working in a Fast-paced work environment Work directly with the senior management team Reward and Recognition Employee friendly policies Personal development and training Health Benefits, Accident Insurance Potential Growth for you! We will nurture your talent in an inclusive culture that values diversity. You will be doing regular catchups with your Manager who will act as your career coach and guide you in your career goals and aspirations. EZ commitment to Diversity & Inclusion Egon Zehnder aims for a diverse workplace and strive to continuously lead with our firm values. We respect personal values of every individual irrespective of race, national or social origin, gender, religion, political or other opinion, disability, age and sexual orientation as warranted by basic rights enshrined in the UN Declaration of Human Rights. We believe diversity of our firm is central to the success and enables us to deliver better solutions for our clients. We are committed to creating an inclusive environment and supportive work environment, where everyone feels comfortable to be themselves and treated with dignity and respect and there is no unlawful discrimination related to employment, recruitment, training, promotion, or remuneration. Egon Zehnder is an Equal Opportunity Employer Egon Zehnder provides equal employment opportunities to all applicants and employees without regard to race, color, creed, religion, sex, sexual orientation, gender identity, marital status, citizenship status, age, national origin, disability, or any other legally protected status and to affirmatively seek to advance the principles of equal employment opportunity.

Posted 3 weeks ago

Apply

1.0 - 3.0 years

3 - 5 Lacs

Jalandhar, Ludhiana, Patiala

Work from Office

[{"Salary":null , "$read_only_job":true , "Remote_Job":false , "Posting_Title":"Network Engineer","City":"S.A.S.Nagar (Mohali)" , "Industry":"Technology" , "Job_Description":" Job Title: NetworkEngineer Location: Chandigarh, India Department: Technology Reports To: Chief Operation Officer Job Type: Full-Time About Us: TRU IT is a Global Leading Organization dedicated toleveraging cutting-edge technology to drive business innovation and growth.Were architects of online experiences, innovators in the digital landscape,and partners in our clients success stories. Our journey began with a simpleyet powerful vision \u2014 to transform businesses through strategic and creativedigital solutions. At TRU IT , we prideourselves on a holistic approach to digital excellence. We dont just createwebsites or run marketing campaigns; we craft immersive digital journeys thatresonate with audiences. From the inception of an idea to its execution, webring together a team of passionate professionals who thrive on pushingboundaries and challenging the status quo. Our global team comprises ofindustry experts hailing from Canada and APAC realms including India andIndonesia having creative and innovative minds. We are tech-savvy enthusiastsand bring a wealth of intelligence and expertise to the table. Whether its webdevelopment, design, digital marketing, or emerging technologies, were here tonavigate the complexities and deliver solutions that make a lasting impact. Position Overview: We are seeking a skilled and dedicated IT professional to manage and support our Endpoint Security Systems (EPS), firewall configurations, and MacBook hardware and software troubleshooting. The ideal candidate will be responsible for maintaining robust security across our endpoints, ensuring seamless network protection, and quickly resolving any technical issues related to MacBook hardware and applications. Additionally, the role requires flexibility in working hours to address urgent technical issues and support critical system updates. Job Location and Address: This requirement is Full Timeand working from the office only. No Hybrid or Remote is available. TheIncumbent is required to work in the following location: Plot No E 275, Industrial Area, Sector 75, Sahibzada Ajit Singh Nagar, Punjab 160071 Responsibilities: EndpointSecurity System (EPS): Configure,monitor, and maintain Endpoint Security Systems. Ensure compliance withsecurity policies and mitigate endpoint vulnerabilities. Respond to and resolveendpoint security alerts and incidents. FirewallImplementation and Configuration: Plan,deploy, and configure firewalls to secure networks. Conduct regular audits andupdates to firewall rules and settings. Monitor network traffic and addressanomalies or unauthorized activities.\\ TroubleshootingMacBook Hardware and Applications: Diagnoseand repair hardware-related issues on MacBooks, including peripherals. Resolvesoftware-related problems, ensuring minimal downtime. Collaborate with teammembers or external support to solve complex technical issues. FlexibleWorking Hours: Be available toaddress urgent technical issues outside standard hours. Adapt to shift-based oron-call work schedules as necessary support critical system updates or incidentresponses during non-standard hours. Requirements 1. Technical Expertise: Proven experience with at least one Endpoint Security System (e.g., Symantec, CrowdStrike, McAfee, etc.). Strong understanding of firewall technologies (e.g., Cisco ASA, Palo Alto, Fortinet) and their configurations. Hands-on experience in troubleshooting and repairing MacBook hardware and applications. 2. Problem-Solving Skills: Ability to diagnose and resolve security and system-related issues efficiently. Excellent troubleshooting skills for both hardware and software. 3. Communication Skills: Clear and professional communication when interacting with team members and stakeholders. Ability to document troubleshooting steps and solutions effectively. 4. Flexibility: Willingness to work irregular hours, including evenings as needed. Strong analytical and troubleshooting skills. Ability to think creatively to resolve complex technical issues. Up-to-date with emerging technologies and industry trends. Benefits Competitivesalary and benefits package. Opportunities forprofessional growth and development. A collaborativeand innovative work environment. " , "Work_Experience":null , "Job_Type":"Full time" , "Job_Opening_Name":"" , "State":"Punjab" , "Country":"India" , "Zip_Code":"160071" , "id":"343000001188770" , "Publish":false , "Date_Opened":"2024-12-20" , "Keep_on_Career_Site":true , "Job_Status_Category":true}]

Posted 3 weeks ago

Apply

7.0 - 12.0 years

9 - 14 Lacs

Hyderabad

Work from Office

Skill: Netskope, EDR,XDR,AV,Proxy Work Location: Hi Tech City ,Hyderabad Work Mode: Work from Office Only (Includes rotational shifts) JD: Device Management Technologies- Endpoint Security B3-1 (L2) Minimum 7 years relevant experience with BCA/BSc-IT or 5 years relevant experience with B.E/B.Tech/MCA qualification Should have minimum CEH/ CHFI/ GSEC/ GMON/ ITIL as well as OEM certification in minimum 1 technology as mentioned in Annexure-I Primary Skill: Technology OEM Make & Model Anti- Virus / XDR Cortex XDR & Symantec JD: L2 (Sr. Security Administrator) Minimum 7 years relevant experience with BCA/BSc-IT or 5 years relevant experience with B.E/B.Tech/MCA qualification Should have minimum CEH/ CHFI/ GSEC/ GMON/ ITIL as well as OEM certification in minimum 1 technology as mentioned in Annexure-I. Monitors systems activities and fine tune system parameters and configuration to optimize performance and ensure security of systems. Install and tests new hardware and software releases. Evaluate and install patches (on devices in scope), perform system upgrades and resolves security issues. Action on advisories Strong background in supporting the development of information security awareness training materials. Ability to ensure the adoption and governance of standard operating procedures. Perform assessments and make recommendations to improve security tools operations and performance with develop quarterly status reports. Perform lifecycle maintenance of security tools with stay up to date on new features and enhancements in corning releases. Develop reports and alerting within the security tools to ensure agent coverage Review endpoint policies for effectiveness at mitigating current threats. Provide technical expertise/support for Health assessment on the products in scope & implementing health assessment recommendation

Posted 3 weeks ago

Apply

6.0 - 8.0 years

7 - 8 Lacs

Pune

Work from Office

Diverse Lynx is looking for Network Security Engineer to join our dynamic team and embark on a rewarding career journey Maintaining LAN, WLAN and architecture of the server as per the business policy Reporting the security analysis of findings Maintaining the regulatory systems about ISMS policy (Information System Management Systems) Developing the security authentication protocol Maintaining server and switches Maintaining & implementation of the SOP for Network security Knowledge of performing routing protocols (MPLS, HAIPE/IP, QOS and WAN) Monitoring of web security gateways, perimeter security, network access controls, endpoint security Experience with Ansible for automation and configuration management

Posted 3 weeks ago

Apply

2.0 - 6.0 years

6 - 8 Lacs

Chennai

Work from Office

Hi , We are hiring for the ITES Company for Carbon Black Role. Overview The Carbon Black Specialist is responsible for supporting and managing Carbon Black security products, with experience and certification in one or more Carbon Black solutions. This role involves independently working with customers through virtual platforms like Webex, providing expert training, mentoring, and exceptional customer service. The Carbon Black Cyber Security professional specializes in deploying, managing, and optimizing Carbon Black endpoint security solutions to protect organizations from cyber threats. Their responsibilities include monitoring security alerts, analyzing threats, and responding to incidents to ensure robust endpoint protection. Attention to detail, professionalism, and adaptability are key, with analysis, debugging, and programming in the enterprise security domain. Key Skills : Any Graduate Minimum 2 years of experience working with all Carbon Black products. Deeper knowledge with at least one of the Carbon Black products Familiarity with analysis and debugging skill a plus Programming experience a plus To Apply, WhatsApp 'Hi' @ 9151555419 Follow the Steps Below: >Click on Start option to Apply and fill the details >Select the location as Other ( to get multiple location option ) a) To Apply for above Job Role ( Chennai ) Type : Job Code # 274 Job description: Minimum 2 years of experience working with all Carbon Black products. Deeper knowledge with at least one of the Carbon Black products Certification obtained on the product(s) of expertise Ability and motivation to work with customers independently via Webex Excellent training and mentoring skills Team motivator who currently serves as an example for their team mates Consistently exceeds personal goal expectations Certification in the enterprise security space Good time management skills and ability to multi task Adaptable, professional, courteous, motivated and works well on their own or as a member of a team Excellent Customer Service skills and a demonstrated success exceeding customer expectations Strong communication (verbal and written) and customer handling skills Strong attention to detail and focus on producing quality work products and results Familiarity with analysis and debugging skill a plus Programming experience a plus

Posted 3 weeks ago

Apply

1.0 - 3.0 years

1 - 5 Lacs

Pune

Work from Office

Technical SupportMake sure they have all the following experience. Must have Installed and Configured Firewalls - Palo Alto/ Checkpoint/ Fortinet / etc Must have Installed and Configured Load balancers - F5/Citrix Netscaler Hands-on experience in Endpoint Security components Hands-on experience in Content Filtering/Proxy

Posted 3 weeks ago

Apply

15.0 - 20.0 years

15 - 20 Lacs

Bengaluru

Work from Office

Project Role : Solution Architect Project Role Description : Translate client requirements into differentiated, deliverable solutions using in-depth knowledge of a technology, function, or platform. Collaborate with the Sales Pursuit and Delivery Teams to develop a winnable and deliverable solution that underpins the client value proposition and business case. Must have skills : Solution Architecture Good to have skills : NAMinimum 18 year(s) of experience is required Educational Qualification : 15 years full time education Summary :The individual will be responsible for developing Network Security Practice within the space. While the role envisages business development and solution architecture responsibilities, the focus would be more on growing top-line and creating innovative solutions from the existing network security portfolio and alliance partners. The role would also support Client Management, Increasing the Sales Pipeline, and managing P&L for their respective accounts/portfolio through ideas of business transformation. Roles & Responsibilities:-Business Development and Relationship Management for clients, such as Service Providers -Identify key customer requirements and define the right solution to meet these requirements.-Track and solve technical issues with customers.-Solutioning of IT and Network CyberSecurity opportunities, cultivate, allocate and coordinate resources to improve the delivery of projects with a high success rate.-Develop and strengthen customer relationships by organizing various marketing activities. Professional & Technical Skills: -Responsible to craft differentiating solutions in Telco Security domain-Ability to drive solutions across system security design, architecture, consulting, training, implementation & auditing of various cybersecurity domains.-Well-versed in the cyber security domains across host and network solutions, including security technologies ranging from the endpoint to the cloud, e.g., EDR, XDR, Host and Network Intrusion Prevention Systems, Gateway Protection Systems, Data Loss Prevention Systems, etc.-Be the Lead Solution Architect and drive activities such as deal qualification, effort estimations, pricing validation, CCI adherence, internal approvals, etc., for the proposed client solution-Follow trends and market requirements to define product strategy in specific areas.-Promote Organizations Network Services offering and solutions in the market. Expertise in Endpoint Security, Data Protection, Vulnerability Assessment & Management, Network & Host IPS, Email & Web Security, Cyber threat intelligence & deception technologies including honeynet, Dark Web monitoring & research, Mobile device security and mobile device management. -Working closely with Region Sales Team to consistently achieve sales targets.-Define solution/product sales strategy, roadmap and implement through frequent communications with customers.-Prepare bidding materials (technical proposal, soc, quotation) for tenders-RFI-RFQ-RFP responses etc.-General solutioning skills (bring solution components together with all contributing experts e.g; Technology, Analytics, Digital, MC etc.-Innovation catalyst mindset-Development of new industry solutions based on market needs. Managing internal business operations processes (myISP, MMS, MME, MMR etc.) Tracking business/project KPIs and delivering the Sales/Revenue/CCI meeting/exceeding the target.-Should be an Industry/business-oriented person from the CMT cyber security industry, with Key experience in Solutions/Presales/design or delivery of Cybersecurity solutions in the CMT industry OR Enterprise OR Security OEMs in the in this industry. Should have an understanding and experience of networks, that shall be relevant for clients. Identifying existing service offerings that can be leveraged in the India, ASEAN and APAC markets.-Understanding of the business functions and processes within the industry-Identifying emerging market and industry trends and issues, potential game changers to the current business models -Internal Collaboration:Working closely with project teams to ensure successful outcomes for the clients-Deal Shaper Good understanding of deal construct, commercial strategy, exploiting established alliances and adding new ones as appropriate Additional Information:-A minimum of 20-25 years of experience in developing and delivering Cybersecurity solutions in Telco and Enterprise landscape -This position is based at our Bengaluru office.-A 15 years full time education is required. Qualification 15 years full time education

Posted 3 weeks ago

Apply

3.0 - 5.0 years

15 - 19 Lacs

Bengaluru

Work from Office

Not Applicable Specialism Risk Management Level Senior Associate & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential threats to an organisations security, as well as managing vulnerabilities to prevent cyber attacks. You will play a crucial role in safeguarding sensitive information and enabling the resilience of digital infrastructure. At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purposeled and valuesdriven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations & Summary A career within Cybersecurity and Privacy services, will provide you with the opportunity to help our clients implement an effective cybersecurity programme that protects against threats, propels transformation, and drives growth. As companies pivot toward a digital business model, exponentially more data is generated and shared among organisations, partners and customers. We play an integral role in helping our clients ensure they are protected by developing transformation strategies focused on security, efficiently integrate and manage new or existing technology systems to deliver continuous operational improvements and increase their cybersecurity investment, and detect, respond, and remediate threats Responsibilities Minimum 35 years of experience Strong communication and presentation skills Basic knowledge on Cybersecurity and Network concepts. Good understanding and working exposure towards endpoint security, data security, network security and cloud security. Previous or current experience in managing a highlevel corporate breach. Understanding of Mitre Framework and Cyber kill chain techniques and how to implement it in the client infrastructure to detect and mitigate threats, Exposure towards technologies such as SIEM, EDR, Email Security, DLP, Vulnerability Management and Network Monitoring technologies (CrowdStrike, Palo Alto, Digital Guardian, Proofpoint) Good to have knowledge and experience on malware analysis, reverse engineering and performing deep dive forensic investigations. Willing to learn and put in the thought process to solve complex problems within the Security domain. Willing to work in 24/7 rotational shift. Good to have certifications such as CEH, GCIH, Network & Security Fundamentals. Mandatory Skill Sets SIEM , EDR , Crowdstike , Mitre , DLP , Proofpoint Preferred Skill Sets SIEM , EDR , Crowdstike , Mitre , DLP , Proofpoint Years of Experience 3+ Years Educational Qualification BE, B.Tech, M.Tech, MCA, MBA graduates. Education Degrees/Field of Study required Bachelor of Technology, Bachelor of Engineering, Master of Business Administration Degrees/Field of Study preferred Required Skills SoCs Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Cloud Security, Communication, Conducting Research, Creativity, Cyber Defense, Cyber Threat Intelligence, Embracing Change, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Learning Agility, Malware Analysis, Malware Detection Tools {+ 16 more} No

Posted 3 weeks ago

Apply

5.0 - 10.0 years

4 - 8 Lacs

Gurugram

Work from Office

We are looking for a highlyskilled and experienced Microsoft Security SME/Architect to join our team. Theideal candidate will have extensive expertise with the Microsoft securitysuite, specifically Microsoft Defender for Cloud and Microsoft Defender forOffice 365. This role involves leading the configuration of endpoint securitysolutions, ensuring integration with existing infrastructure, and aligning withsecurity best practices. What you'll do: Microsoft Security Suite Expertise Serve as theSubject Matter Expert (SME) for Microsoft security suite, with specialistresponsibilities in Microsoft Defender for Cloud and Microsoft Defender forOffice 365. Lead theconfiguration, deployment, and management of endpoint security solutions usingMicrosoft Defender. Ensureintegration of Microsoft Defender solutions with existing IT infrastructure andsecurity tools. Provide expertguidance on the configuration, optimization, and maintenance of MicrosoftDefender to enhance security posture. Endpoint Security Management Lead the designand implementation of endpoint security solutions, ensuring alignment withindustry best practices and organizational security policies. Collaborate withIT and security teams to ensure the secure configuration of endpoints,including OS hardening and application of security policies. Conduct regularassessments of endpoint security configurations to identify and remediatevulnerabilities. Develop andmaintain documentation for endpoint security configurations, policies, andprocedures. Security Strategy and Architecture Understand andapply the principles of network and endpoint security, current threat andattack trends, and security best practices such as defense in depth. Work closely withsecurity teams to explain the impacts of security configurations on end userdevices and ensure alignment with overall security strategy. Develop andmaintain a comprehensive security architecture framework for endpoint security. Provide strategicrecommendations to enhance the security posture of the organization through theeffective use of Microsoft security solutions. Training and Support Provide trainingand support to IT and security teams on the use and management of MicrosoftDefender solutions. Act as a point ofescalation for complex security issues related to Microsoft Defender. Stay up-to-datewith the latest developments in Microsoft security technologies and threatlandscape. Conduct knowledgesharing sessions and workshops to disseminate security best practices withinthe organization. What we offer: Insurance Group Medical Coverage, Group Personal Accident, Group Term Life Insurance

Posted 3 weeks ago

Apply

5.0 - 10.0 years

4 - 7 Lacs

Mumbai

Work from Office

Experiencein M365 platform and Modern Work (remote work security, compliance, teamwork,insights, meeting and calling) preferred. Demonstratedknowledge of identity, authentication, security, privacy, and compliance(including the EU General Data Protection Regulation) and how they factor intocloud and hybrid solutions Shouldpossess a solid understanding of Advanced Microsoft security features such asMDE, CASB, IRM, IB, Intune Suite, Identity governance etc. Broadknowledge of and ability to explain key end-user scenarios and technicalarchitecture for communications solutions required Strongleadership to influence key technical decision makers, influencers, seniorexecutives, industry decision makers and or boards Experiencein SaaS based collaboration platforms of Microsoft 365 Experiencein Productivity and Mobility solutions of Microsoft 365 Thoroughknowledge of in Audio, Video conferencing technologies Agood understanding of the architectural principals of cloud-based platformsthat include SaaS components. Provenability to design and deliver complex solutions utilizing best practices inserver selection, virtualization design and deployment, highly redundant/highavailability server configurations Substantialprevious experience in technical roles within a systems integrationenvironment Strongunderstanding of IT industry environment and business needs Demonstrate knowledge of market, verticals, horizontals, business administration andbusiness change Abilityto lead technical design workshops with the client and Softlinestakeholders Abilityto establish and manage processes and practices through collaboration and theunderstanding of business Abilityto manage urgent and complex tasks simultaneously MS-900Microsoft 365 Fundamentals Certified or prepared to attain within 3 months ofjoining. Demonstrateinterpersonal skills with the ability to develop and maintain strongstakeholder relationships. Excellentwritten and verbal communication skills with specific ability to explaincomplex technical concepts in layman terms along with impactful presentationskills. What you ll do: Helpcustomers make technical decisions to build tomorrows business and IT Solutionsbased on Microsoft online services and solutions. Youwill be the subject matter expert on your local sales team leading technicalpresentations, demonstrations, workshops, architecture design sessions,production ready pilots for the Microsoft 365 suite, with a focus on customeracquisition efforts Youwill own winning the technical decision for sales opportunities and usagescenarios, through tailoring your message, bringing ideas to customers, engaging with them to show our technology differentiation, and delivering proofand secure their agreement that our solutions meet the success criteria fortheir decision to adopt the M365 Platform solutions Prepare technical insights and key scenarios required to drive the right technical andbusiness solution outcomes

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies