Home
Jobs

270 Endpoint Security Jobs - Page 9

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 8.0 years

10 - 15 Lacs

Navi Mumbai

Work from Office

Naukri logo

Role & responsibilities Preferred candidate profile

Posted 1 month ago

Apply

2.0 - 7.0 years

4 - 9 Lacs

Pune, Ahmedabad, Mumbai (All Areas)

Work from Office

Naukri logo

We are looking L2 & L3 engineers for clients - Palo-Alto-Juniper is mandatory Basic Desktop support, Basic Network Support work with installation, configuration, and ongoing usability of desktop. work as per the established standards and guidelines. Required Candidate profile Ready to Join in 15 days, Pic-up - Drop ,Food Facilities are optional (If available) Telephonic interview is possible for other Pune Mumbai Location

Posted 1 month ago

Apply

10.0 - 15.0 years

35 - 50 Lacs

Bengaluru

Work from Office

Naukri logo

Lead digital workforce platforms like messaging, scheduling, virtual workspace. Guide team delivery, platform execution, and agile coordination Required Candidate profile 10–15 yrs in IT delivery, workforce enablement, stakeholder collaboration. Agile/Scrum required.

Posted 1 month ago

Apply

5.0 - 10.0 years

0 - 3 Lacs

Navi Mumbai

Work from Office

Naukri logo

We are looking for a candidate who could join our Information Technology Team. Technical Skill Set: 1. Should have a knowledge and understanding of TCP/ UDP. 2. Clean and rigid understanding on what is an AV and whats an EDR solution 3. Understanding of EDR functionalities. This knowledge is required to explore features of a solution and understand technical now how. 4. Understanding on EDR logs and log co-relation. 5. Should be able to understand and retrieve information from packet captures. 6. Should have a sane knowledge of SIEM solution. 7. Knowledge on Log parsing would be an added advantage. 8. Knowledge on Advisories, IOCs, IOAs, Adversories. What are these and how are these to be processed and why? 9. Understanding on actions to be done on receiving an advisory. 10. Should keep his/her knowledge updated and should be on the top of current Cyber exploit cases going on, so that actions can be taken proactively to safeguard the environment. Techno-Management Skill set: 1. Should be able to prioritize tasks while processing advisories, incidents, problems and events. 2. How an incident should be tackled, should have a first-hand expertise on deriving a solution and take incident to closure. 3. Prepare dashboard and reports depicting an at-a-glance view of incidents, events, advisories and remedial actions. 4. Work with the 3rd party solution provider for integration purpose. 5. Prepare documentation related to process and Knowledge base for future easy-reference. 6. Be a bridge between the technical and the management team and make sure updates are regularly submitted to higher management and review to the technical team. 7. Vendor management skills. 8. Any earlier experience in crisis situation handling would be an added advantage.

Posted 1 month ago

Apply

1.0 - 4.0 years

3 - 6 Lacs

Chennai

Work from Office

Naukri logo

Required Skills Behavioral | Aptitude | Communication Technology | Hardware and Networking | Installation, configuration, maintainance and repair Technology | Audio, Video support | Installation and configuration Technology | Windows Operating System | Installation, configuration and management Technology | End Point Security | Antivirus management, data encryption, DLP, desktop firewall, VPN, AD policies Education Qualification : Any Graduate Certification Mandatory / Desirable : Technology | Microsoft 365 Certified | Modern Desktop Administrator Associate 1) Field Services Support Engineers primary responsibility is to provide support to an organization s IT systems to help them meet their business goals, this is done by ensuring that all computers and networks operate efficiently with high uptime. 2) As a desktop engineer, you may need to assemble and install client desktop computers and assist the end-user in securing their hardware. 3) This role also involves hands & feet support for various IT support teams to perform activities related to periodic maintenance to handling individual systems hardware, software, and network queries 4) To support daily technical support activities for computers & all other end point devices. Update the support ticket with the progress, to set up and test desktop computer peripherals. 5) To perform the system changes adhered to organizational policies. 6) Conduct remote desktop troubleshooting to end user issues. Maintain technical documentation in association with other functional departments 7) Technical Skills a. Windows Operating System: b. Ability to Install and troubleshoot different versions of Windows OS independently. E.g. Windows XP. Windows 7, Windows 10 and Windows 11 c. Understanding of desktop applications and how do they work, installation & uninstallation. d. Understanding of domain setup & ability to add / remove computers to domain. update Group policies. carry out Disk management, Disk Encryption, Wireless configuration. check utilization and availability, ability to perform start up and shut down services by following SOP. deploy gold images on multiple desktops using SOP, Ability to install and configure client applications independently 8) In addition to above, support and perform below activities. a. Exchange and Mobility Clients b. Printer management c. Backup and Recovery d. Audio, Video support e. End Point Security/Patch Management f. Hardware and Networking

Posted 1 month ago

Apply

7.0 - 12.0 years

7 - 17 Lacs

Chennai

Work from Office

Naukri logo

Job Title: Endpoint Security Lead(AV/EDR) Responsibilities: - Design, implement, and maintain endpoint security solutions (AV/EDR) - Monitor and analyze endpoint security event logs - Investigate and respond to security incidents - Develop and maintain endpoint security policies and procedures - Understanding and implementing Application and Device control policies - Collaborate with IT teams for endpoint security integration - Stay up-to-date with emerging threats and technologies - Should present reports to the clients as per requirements. Requirements: - 7+ years of experience in endpoint security (AV/EDR) - Strong knowledge of endpoint security technologies (e.g., McAfee, Symantec, CrowdStrike, Cortex XDR, Microsoft Defender) - Experience in Implementing the AV/EDR solution from scratch - Understanding the client network and implementing the security policies efficiently - Experience with security information and event management (SIEM) systems - Proficiency in query languages (e.g., SQL, KQL, XQL) - Strong analytical and problem-solving skills - Excellent communication and collaboration skills Good to Have: - Experience with cloud security (AWS/Azure) - Knowledge of threat intelligence and incident response - Experience with IT service management (ITSM) tools - Relevant certifications (e.g., CompTIA Security+, CISSP)

Posted 1 month ago

Apply

9.0 - 14.0 years

8 - 12 Lacs

Hyderabad

Work from Office

Naukri logo

We re on a mission to change the future of clinical research. At Perceptive, we help the biopharmaceutical industry bring medical treatments to the market, faster. Our mission is to change the world but to do this, we need people like you. Apart from job satisfaction, we can offer you: HEALTH: - Medical plan for you and your dependents. - Personal Accident Insurance - Life Insurance - Critical illness cover WEALTH: - Salary structure and Flexi basket - Provident fund of 12% - Gratuity scheme YOURSELF: Internal growth and development programs trainings Key Responsibilities Security Engineering Implementation Deploy, configure, and maintain security technologies, including firewalls, IDS/IPS, endpoint security, and XDR solutions. Work closely with IT and DevOps teams to integrate security into system and application architectures. Threat Detection Incident Response Monitor security alerts and investigate incidents to identify root causes and remediation actions. Support security operations teams in responding to threats and improving detection and response capabilities. Endpoint, Cloud, and Network Security Implement and manage security controls for endpoints, cloud environments, and networks. Work on securing hybrid cloud infrastructures and enforcing Zero Trust principles Vulnerability Patch Management Conduct security assessments and penetration tests to identify vulnerabilities. Work with IT teams to prioritize and apply security patches and remediations. Compliance Risk Management Assist in maintaining compliance with industry regulations (ISO 27001, GDPR, HIPAA). Participate in security audits, risk assessments, and policy development to strengthen the organization s security framework. Security Awareness Collaboration Work closely with internal teams to provide security guidance and training. Contribute to security awareness programs to enhance the organizations security culture. Functional Competencies (Technical knowledge/Skills) Strong knowledge of security frameworks (NIST, ISO 27001, CIS Controls). Hands-on experience with security tools such as firewalls, IDS/IPS, EDR, and XDR solutions. Understanding of cloud security in AWS, Azure, or GCP. Experience with vulnerability management and penetration testing. Knowledge of IAM, PAM, and Zero Trust security principles. Strong analytical skills and problem-solving capabilities. Effective communication skills to work with technical and non-technical teams. Experience, Education, and Certifications 9+ years of experience in cybersecurity, with hands-on expertise in security engineering. Bachelors degree in Computer Science, Cybersecurity, or a related field. Relevant certifications such as CISSP, CEH, OSCP, or equivalent are preferred. Experience in security operations, incident response, and vulnerability management. Strong understanding of regulatory and compliance requirements in cybersecurity. Come as you are. Were proud to be a Equal Employment Opportunity employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.

Posted 1 month ago

Apply

10.0 - 12.0 years

2 - 3 Lacs

Mumbai

Work from Office

Naukri logo

1. Sales & Business Development - Identify and pursue new business opportunities incybersecurity solutions, including network security, endpoint security, cloud security andthreat intelligence. - Develop and execute sales strategies to achieve revenuetargets. - Generate leads through networking, cold calling, industryevents, and referrals. - Conduct sales presentations and demos for clients toshowcase cybersecurity solutions. - Respond to RFPs (Request for Proposals) and createcompelling proposals for potential clients. 2. Client Relationship Management - Develop and maintain strong relationships with keydecision-makers (CISOs, IT Heads, CTOs, CIOs). - Conduct regular account management activities to drivecustomer satisfaction and long- term partnerships. 3. Market & Industry Analysis - Stay updated with industry trends, cybersecurity threats,and evolving technologies. - Identify competitive threats and developcounter-strategies. xbiz - Provide insights on market demands and customer painpoints to internal teams for product/service improvement. 4. Collaboration & Reporting - Work closely with marketing, and product / technical teamsto develop sales strategies. - Provide regular sales forecasts, reports, and pipelineupdates to senior management. - Represent the company at cybersecurity conferences, tradeshows, and networking events. Key Requirements Education & Experience - Bachelordegree in business, IT, Computer Science, or arelated field. - 4-8 years of experience in B2B sales, business developmentin the cybersecurity or IT solutions space. Technical & Sales Skills - Strong understanding of cybersecurity solutions(firewalls, endpoint security, SIEM, SOC, identity & access management, cloud security, etc.). - Proven track record in meeting or exceeding sales targetsin a cybersecurity or IT solutions company.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: ForgeRock Identity Manager. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 12.0 years

12 - 17 Lacs

Pune

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Noida

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: PingFederate. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Noida

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: SailPoint Identity Mgmt and Governance. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Hyderabad

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Active Directory. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: GRC Technology. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Coimbatore

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: F5 Load Balancers. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Noida

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.

Posted 1 month ago

Apply

5.0 - 8.0 years

8 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

Job Title:Architect Experience5-8 Years Location:Bangalore : Data Management and Integration:The data architect will be responsible for managing and defining/integrating data from various sourcesacross regionto ensure seamless data flow and accuracy. This includes addressing data security and privacy concerns, integration challenges, and ensuring real-time data accuracy AI Integration:A significant component of the CMO360 project is the integration of AI to provide insights and support user actions. The data architect will play a crucial role more from “Data” perspective for implementing AI features and ensuring they are effectively integrated into the system Collaboration with Teams:The data architect will work closely with various teams, including CMO, Engineering, across the organization to ensure that the data architecture aligns with the project's objectives and requirements. This includes participating in workshops and meetings to identify pain points and prioritize requirements Technical Assessment and Risk Management:The data architect will be involved in conducting technical assessments and managing risks associated with data security, integration, and user adoption. Mitigation plans will need to be developed and implemented to address these risks Documentation and Communication:The data architect will be responsible for documenting the data architecture and communicating it to relevant stakeholders. This includes creating and maintaining documentation that outlines the data architecture, data flow, and integration points LocationIndia – Bangalore

Posted 1 month ago

Apply

3.0 - 7.0 years

2 - 6 Lacs

Bengaluru

Work from Office

Naukri logo

Drive projects and initiatives to improve and expand existing DLP platform capabilities. Implement and manage DLP solutions, including data labeling technologies. Work directly with stakeholders to define requirements and develop security solutions. Ensure the security of endpoint devices, including data protection and behavior analysis. Deploy and manage endpoint DLP solutions, such as those offered by Proofpoint. Manage email security policies and configurations, including DLP for email. Detect and prevent data loss through email channels, such as by identifying sensitive content and usebehavior. Gain deep knowledge of the Proofpoint platform, including its various modules (e.g., Endpoint DLP, Email DLP) Be proficient in using the Proofpoint console to manage alerts, investigate incidents, and analyze user behavior. Primary Skills DLP Endpoint Security Email Security Secondary Skills Data Labeling Behavior Analysis Incident Response

Posted 1 month ago

Apply

6.0 - 9.0 years

4 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

Experience in designing, implementing, and managing SCCM and Intune solutions. Strong understanding of endpoint management concepts, including device provisioning, software distribution, patch management, and security. Experience with Microsoft Endpoint Manager (SCCM and Intune) integration, configuration, and administration. Familiarity with modern management concepts, such as cloud-based management, autopilot, and zero-touch deployment. Experience working with PC/Mac infrastructure as an engineer level SCCM & Intune Certification. Experience with system provisioning and imaging using tools such as DEP and SCCM. Experience with managing 802.1x on MacOS/Windows (for wifi and wired network connections). Experience with end point management client software deployment (SCCM + Intune), inventory, antivirus and end point security solution. Familiarity with configuration profile and working with preference files (.plist) Experience with Azure/AWS, Network troubleshooting, Background in server administration, networking, troubleshooting, scripting, automation Experience with Active Directory including user and group management, group policies Experience with desktop operating systems including Windows 10/11 and OS X Scripting via PowerShell, BASH, and others. Excellent analytical, problem-solving, and communication skills. Primary Skills Operating System Deployment SCCM Intune Secondary Skills Mircosoft Endpoint Patching

Posted 1 month ago

Apply

4.0 - 8.0 years

6 - 8 Lacs

Coimbatore

Work from Office

Naukri logo

We are seeking a Cloud Engineer to design, implement, and maintain cloud infrastructure (AWS, Azure, GCP). Key responsibilities include cloud architecture, system administration, automation, security, cost management, and documentation. Experience with migrating Exchange and SharePoint to cloud solutions is required. Collaborate with, cross-functional teams to design, implement, and maintain cloud infrastructure solutions. Provide technical guidance and support to resolve complex issues related to cloud services, Cyber Security, Networks. Perform regular assessments and audits to ensure the security, reliability, and efficiency of cloud environments. Participate in planning and executing cloud migration projects, including workload assessments, resource provisioning, and data migration strategies. Work as a Technical Consultant for Various Microsoft Technologies and its Security products. Hosted Exchange and Online Exchange Migration - SharePoint and OneDrive Migration - Teams, Enterprise Roaming Profile and Intune Deployment - Spam Filters and Endpoint Security, EDR, XDR, NDR, MDR - Work with Pass-through, Federated auth, SSO, Hybrid access, Cloud Sync, Delegation, Self Service. - MFA, Conditional Policies, PIM, Vulnerabilities and risk assessment. - Encryption, Risk Asses, Incidence management, VA, Penetration test, IDS/IPS, compliance.

Posted 1 month ago

Apply

2.0 - 5.0 years

6 - 10 Lacs

Mumbai

Work from Office

Naukri logo

About The Role Inside Sales ConsultantExperience 2 to 5 Years (B2B Sales) Location Mumbai (Malad West)- As an Inside Sales Consultant, you will play a critical part in our fast-growing Cyber Security business servicing our customers. You will be part of a smart, innovative team that is changing the way customers buy and manage their IT infrastructure. Candidates with high energy, entrepreneurial-spirited people who settle for nothing less than selling world class solutions & services. The successful candidate will be responsible for driving revenue growth by effectively engaging with prospects and nurturing relationships. - Lead Generation Researching potential customers and identifying decision-makers within target organizations. This involves using various tools and methods to generate leads such as cold calling, email campaigns, social media outreach, and leveraging inbound inquiries. - Qualifying Leads Assessing the viability of leads based on criteria such as budget, authority, need, and timeline (BANT). This helps prioritize efforts towards leads most likely to convert into customers. - Customer Relationship Management Building and maintaining strong relationships with customers throughout the sales process and beyond. This includes following up on sales inquiries, providing ongoing support, and ensuring customer satisfaction. - Sales Reporting and Analysis Tracking sales activities, pipeline development, and forecasting using CRM (Customer Relationship Management) systems. Analyzing sales data to identify trends, opportunities, and areas for improvement. - Collaboration with Other Teams Working closely with sales and technical teams to align sales strategies with overall business objectives. Providing feedback from customers to help improve products and services. - Continuous Learning and Improvement Staying updated on industry trends, market conditions, and competitive activities. Continuously improving sales techniques and product knowledge to enhance effectiveness in generating sales. Key Skills - Bachelor's degree/Master's Degree - preferably IT Industry - Excellent written and verbal communication skills. - Ability to multi-task, organize, and prioritize work. - Excellent presentation skills. - Ability to approach adversity with a positive attitude. Ideal Candidate - Minimum 2-5 years of B2B sales experience working with senior level decision makers (CTO, CIO, CISO and IT Managers) within key verticals, understanding of sales revenue cycle and buying behavior. - Preferred Experience in strategic/solution selling in technologies like Endpoint Security & EDR/XDR, Encryption, Gateway Security, Web Proxy Solution, Data Loss prevention Solution, Email Gateway Security, CASB, IRM/DRM, MDM etc. This job opening was posted long time back. It may not be active. Nor was it removed by the recruiter. Please use your discretion.

Posted 1 month ago

Apply

4.0 - 8.0 years

6 - 10 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Naukri logo

We are seeking a highly motivated and detail-oriented Cybersecurity Analyst to join our remote team in India You will be responsible for identifying vulnerabilities, monitoring security systems, and defending against cyber threats This role requires a proactive mindset, critical thinking, and the ability to work independently in a fast-paced environment, Key Responsibilities: Monitor networks and systems for security breaches, intrusions, or anomalies Analyze security incidents and provide incident response Conduct regular vulnerability assessments and penetration tests Implement and maintain security tools such as firewalls, antivirus, SIEM, etc Collaborate with IT teams to improve overall security posture Create detailed reports on security incidents and risks Stay updated with the latest cyber threats, trends, and best practices ???? Required Skills & Qualifications: Bachelor's degree in Computer Science, IT, Cybersecurity, or related field 2+ years of experience in cybersecurity or information security Proficiency in tools like SIEM (Splunk, QRadar, etc ), IDS/IPS, and antivirus systems Strong knowledge of firewalls, VPNs, proxy servers, and endpoint security Familiarity with frameworks such as NIST, ISO 27001, or OWASP Analytical mindset with excellent problem-solving skills Good communication and documentation skills Preferred (Bonus): Certifications: CEH, CompTIA Security+, CISSP (or working towards it) Experience with cloud security (AWS, Azure, or GCP) Understanding of scripting languages (Python, PowerShell, Bash)

Posted 1 month ago

Apply

3.0 - 5.0 years

20 - 25 Lacs

Gurugram

Work from Office

Naukri logo

Must Have Skills Data Loss Prevention (DLP) Administration & Implementation Experience : 3-5 years relevant Deploy, configure, and manage DLP solutions (eg, Forcepoint, Symantec, McAfee). Design and implement DLP policies for email, endpoints, cloud storage, and web traffic. Integrate DLP with SIEM, CASB, and other security tools for centralized monitoring. Conduct proof-of-concept (PoC) testing for new DLP features and updates. Work with IT teams and business units to align DLP configurations with organizational security policies. Regularly review and fine-tune DLP policies to reduce false positives and negatives. Conduct data classification and discovery scans to identify sensitive information. Establish role-based access controls (RBAC) to manage DLP policy enforcement. Investigate DLP alerts and incidents, identifying root causes and recommending corrective actions. Hands-on experience with DLP tools (eg, Symantec DLP, Forcepoint DLP, Microsoft Purview, McAfee DLP, Digital Guardian, Netskope). Strong understanding of data classification, encryption, and regulatory compliance frameworks. Expertise in network security, endpoint security, and cloud security. Experience in SIEM integration, CASB solutions, and data discovery tools. Knowledge of incident response frameworks and forensic investigation techniques.

Posted 1 month ago

Apply

4.0 - 9.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Diverse Lynx is looking for Splunk Professional to join our dynamic team and embark on a rewarding career journey Collaborate with stakeholders to understand data requirements, use cases, and objectives for Splunk deployments Design and implement data ingestion processes, including data collection, parsing, normalization, and indexing in Splunk Develop custom Splunk queries, search strings, and data models to extract meaningful insights from machine-generated data Create interactive dashboards, reports, and visualizations using Splunk's search processing language (SPL) and visualization tools Implement and maintain Splunk apps, add-ons, and configurations to support specific use cases or data sources Automate data analysis workflows and alerting mechanisms to identify and respond to critical events and anomalies Optimize Splunk deployments for performance, scalability, and search efficiency Monitor and troubleshoot Splunk infrastructure and resolve issues related to data ingestion, search performance, and system availability Collaborate with security and operations teams to develop and implement Splunk-based security monitoring, log analysis, and incident response solutions Ensure data privacy and security by implementing access controls, data encryption, and compliance with relevant regulations Stay updated with Splunk product releases, new features, and best practices to recommend and implement improvements in Splunk deployments Provide training and support to end-users on utilizing Splunk for data analysis and visualization

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies