Home
Jobs

191 Mcafee Jobs - Page 5

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 8.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. Role**: Endpoint Security Desired Skill Set Any: McAfee, Trellix, Symantec, EDR, Carbon Black Experience Range : 5 to 8 years Joining Location : PAN India We are currently planning to do a Walk-In Interview on 14th June 2025 at TCS Pune. Date - 14th June 2025 (Saturday) Venue - Tata Consultancy Services, Sahyadri Park SP1 , A1 Auditorium & Zone 3, Rajiv Gandhi Infotech Park, Hinjewadi Phase 3, Pune - 411057 Job Description Role & Responsibilities: Deep technical expertise in Endpoint security technology domain with demonstrated expertise in one or more of the following areas – EDR, HIPS, Anti-Malware, FIM, Server Protection Proven experience in maintaining endpoint security solutions across enterprise environments. Provide compliance reports (monthly and based on need) Performing analysis of end-point security needs that contribute to the design, integration, and installation of hardware and software. Analysis, troubleshooting and development of solutions to end-point security problems. Excellent troubleshooting skills Creation of SOPs for daily operations of endpoint security tools and services Monitoring security advisory groups to ensure all necessary security updates, patches and preventive measures are in place. Support forensics activates and requirements. Show more Show less

Posted 2 weeks ago

Apply

5.0 - 8.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. Role**: Endpoint Security Desired Skill Set Any: McAfee, Trellix, Symantec, EDR, Carbon Black Experience Range : 5 to 8 years Joining Location : PAN India We are currently planning to do a Walk-In Interview on 14th June 2025 at TCS Bengaluru. Date - 14th June 2025 (Saturday) Venue - Tata Consultancy Services, Think Campus , JRD Auditorium Cafteria, Electronic City, Bangalore. Job Description Role & Responsibilities: Deep technical expertise in Endpoint security technology domain with demonstrated expertise in one or more of the following areas – EDR, HIPS, Anti-Malware, FIM, Server Protection Proven experience in maintaining endpoint security solutions across enterprise environments. Provide compliance reports (monthly and based on need) Performing analysis of end-point security needs that contribute to the design, integration, and installation of hardware and software. Analysis, troubleshooting and development of solutions to end-point security problems. Excellent troubleshooting skills Creation of SOPs for daily operations of endpoint security tools and services Monitoring security advisory groups to ensure all necessary security updates, patches and preventive measures are in place. Support forensics activates and requirements. Show more Show less

Posted 2 weeks ago

Apply

2.0 - 5.0 years

0 Lacs

India

On-site

GlassDoor logo

Overview: ormation Security Analyst: Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Researches attempted or successful efforts to compromise systems security and designs countermeasures. Maintains hardware, software and network firewalls and encryption protocols. Administers security policies to control physical and virtual access to systems. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Job Code Tip: May be internal or external, client-focused, working in conjunction with Professional Services and outsourcing functions. May include company-wide, web-enabled solutions. Individuals whose primary focus is on developing, testing, debugging and deploying code or processing routines that support security protocols for an established system or systems should be matched to the appropriate Programmer or Programmer/Analyst family in the Information Technology/MIS functional area. Responsibilities: Should have process knowledge and technical knowledge on any of the SIEM tools ( like Qradar, LogRhythm, AlienVault, Splunk…etc). L2/L3 level is added advantage. Should have process knowledge and technical knowledge in AV tools like Symantec, McAfee, Trend Micro…etc. L2/L3 level is added advantage. Should have knowledge in managing Vulnerability tools and various remediation efforts. Review security logs generated by applications, devices and other systems, taking action or escalating to appropriate teams as needed. Enforce incident response service level agreement. Work with the global IT Security team to analyze, test and recommend tools to strengthen the security posture of the company Create and maintain operational reports allowing IT management team to understand the current and historical landscape of the IT security risks Vulnerability management assessment and remediation Participate in daily and ad-hoc meetings related to cyber security, controls and compliance, processes and documentation related tasks Research the latest information technology (IT) security trends Help plan and carry out an organization’s way of handling security Develop security standards and best practices for the organization Recommend security enhancements to management or senior IT staff Document security breaches and assess the damage they cause. Performs other duties as assigned Qualifications: B. Tech, B.E or M.C.A 2-5 years’ Experience working in a Security Operations Center 2 years minimum in the computer industry Knowledge working with complex Windows environments Knowledgeable in various security frameworks such as NIST 800-53 / NIST 800-171 / ISO27001 Knowledge in design and administration of security tools Good written and verbal communication skills

Posted 3 weeks ago

Apply

2.0 - 5.0 years

4 - 8 Lacs

Noida

On-site

GlassDoor logo

Job Description Summary In our global IT software delivery centers, we are looking System Admins and Cyber Security Engineers. The System Admin will work with teams comprised of Software Engineers, Quality Engineers, User Interaction Design Engineers, Infrastructure/Platform team, and the Product Owners to help lead the technical insight and industry perspective in the creation, delivery, and integration of complex and comprehensive security solutions. You will be a security evangelist helping engineers in secure implementation of technology stack in a cloud environment. This position will be working on multiple projects as a technical expert or internal consultant. You will work on projects for components of the domain. You will work on multiple technical or functional domains. Job Description In this role you will: Participate in the domain technical and business discussions relative to future architect direction. Assist in the analysis, design and development of a roadmap and implementation based upon a current vs. future state in a cohesive architecture viewpoint. Gather and analyze data and develop architectural requirements at project level. Participate in the infrastructure architecture governance model. Support design and deployment of infrastructure solutions meeting standardization, consolidation, TCO, security, regulatory compliance and application system qualities, for different businesses. Support in the technical authority ongoing administration and incident management support of core infrastructure [network, security, and virtualization, patching, monitoring, backups] technologies that underpin Software Solutions Factories; Support for operating and maintaining security tools. Running and analyzing vulnerability and compliance scans to support continuous monitoring reporting and vulnerability management. Improve the effectiveness and efficiency of IT operations and drive significant operational, risk management, and economic benefits for their organization. Quality process: Ensure all tasks are carried out with respect to applicable processes and procedures [e.g. ISO9001 and ISO27001] applicable to site[s] and functions within job scope Desired Characteristics Technical Expertise: Ability and willingness to travel Fluent English speaker; Degree in Computer Science or equivalent knowledge with 2 to 5 years experience Proven track record of problem analysis, identification and resolution Excellent communication skills, commitment, discipline, positive attitude, following management prioritization, accountability and flexibility Strong understanding of ITIL and change management policies and procedures Strong IT experience in a technical hands-on position Basic knowledge about anti-virus implementations (McAfee EPO, Bitdefender, Microsoft Forefront, etc.) Basic knowledge working with IPAMs and password solutions Basic knowledge about Cyber/Security foundation Basic Knowledge in design of computing or network or storage to meet business application system qualities Basic Understands technical and business discussions relative to future architecture direction aligning with business goals. Basic Understands concepts of setting and driving architecture direction. Familiar with elements of gathering architecture requirements. Understands architecture standards concepts to apply to project work. Personal Attributes: Applies values, policies, procedures and precedent to make timely, routine decisions of limited, clear choice. Reacts open-mindedly to new perspectives or ideas. Considers different or unusual solutions when appropriate. Resolves day-to-day issues related to strategy implementation. Escalates issues that impact the client and/or strategic initiatives. Additional Information Relocation Assistance Provided: Yes

Posted 3 weeks ago

Apply

2.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Amazing oppurtunity for candidates who can join our team by JULY end !!! JD for the Position: Analyst/Consultant/ Associate Consultant Individual must have a high-level of understanding of HITRUST Common Security Framework (CSF) Controls and HIPAA. Will have responsibilities that include standard project execution and client service activities. Responsibilities and Duties: Plan and execute engagements under the direction of a member of the management team Lead assessments and onsite testing Lead scoping discussions about system boundaries Communicate clearly with clients regarding evidences/ required documentation Experience Requirements: Excellent interpersonal and written communication skills Demonstrated ability to work effectively with a multi-disciplinary set of stakeholders with minimal supervision Strong project management skills with demonstrated ability to effectively manage multiple initiatives and priorities Strong understanding of the business impact of processes, policies, tools, as well as high proficiency in how to assess risk and business impact Ability to evaluate issues/problems of high complexity and make required decisions Strong team player skills with demonstrated experience to work collaboratively and effectively, across various levels in an organization Strong understanding of processes, technology, and operational concepts related to IT and Information risk management 2+ years of relevant Information Security / IT Audit and compliance experience Experience of 1-2 HITRUST/ HIPAA assessments Good knowledge of incident management, disaster recovery, and business continuity management, cryptography, third party risk management, SDLC standards/frameworks, anti-virus solutions (e.g., Symantec, McAfee, etc.) Good to have prior Big-4 experience Preferred Qualification Familiarity with the HITRUST CSF or another security framework methodology, such as NIST,ISO, COBIT, ITIL, etc. Bachelor's degree or equivalent work experience Preferred but Optional Professional certifications: HITRUST CCSF , HITRUST CHQP, CISA, and CISSP. Show more Show less

Posted 3 weeks ago

Apply

2.0 - 5.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Job Description Summary In our global IT software delivery centers, we are looking System Admins and Cyber Security Engineers. The System Admin will work with teams comprised of Software Engineers, Quality Engineers, User Interaction Design Engineers, Infrastructure/Platform team, and the Product Owners to help lead the technical insight and industry perspective in the creation, delivery, and integration of complex and comprehensive security solutions. You will be a security evangelist helping engineers in secure implementation of technology stack in a cloud environment. This position will be working on multiple projects as a technical expert or internal consultant. You will work on projects for components of the domain. You will work on multiple technical or functional domains. Job Description In this role you will: Participate in the domain technical and business discussions relative to future architect direction. Assist in the analysis, design and development of a roadmap and implementation based upon a current vs. future state in a cohesive architecture viewpoint. Gather and analyze data and develop architectural requirements at project level. Participate in the infrastructure architecture governance model. Support design and deployment of infrastructure solutions meeting standardization, consolidation, TCO, security, regulatory compliance and application system qualities, for different businesses. Support in the technical authority ongoing administration and incident management support of core infrastructure [network, security, and virtualization, patching, monitoring, backups] technologies that underpin Software Solutions Factories; Support for operating and maintaining security tools. Running and analyzing vulnerability and compliance scans to support continuous monitoring reporting and vulnerability management. Improve the effectiveness and efficiency of IT operations and drive significant operational, risk management, and economic benefits for their organization. Quality process: Ensure all tasks are carried out with respect to applicable processes and procedures [e.g. ISO9001 and ISO27001] applicable to site[s] and functions within job scope Desired Characteristics Technical Expertise Ability and willingness to travel Fluent English speaker; Degree in Computer Science or equivalent knowledge with 2 to 5 years experience Proven track record of problem analysis, identification and resolution Excellent communication skills, commitment, discipline, positive attitude, following management prioritization, accountability and flexibility Strong understanding of ITIL and change management policies and procedures Strong IT experience in a technical hands-on position Basic knowledge about anti-virus implementations (McAfee EPO, Bitdefender, Microsoft Forefront, etc.) Basic knowledge working with IPAMs and password solutions Basic knowledge about Cyber/Security foundation Basic Knowledge in design of computing or network or storage to meet business application system qualities Basic Understands technical and business discussions relative to future architecture direction aligning with business goals. Basic Understands concepts of setting and driving architecture direction. Familiar with elements of gathering architecture requirements. Understands architecture standards concepts to apply to project work. Personal Attributes Applies values, policies, procedures and precedent to make timely, routine decisions of limited, clear choice. Reacts open-mindedly to new perspectives or ideas. Considers different or unusual solutions when appropriate. Resolves day-to-day issues related to strategy implementation. Escalates issues that impact the client and/or strategic initiatives. Additional Information Relocation Assistance Provided: Yes Show more Show less

Posted 3 weeks ago

Apply

2.0 - 5.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Job Description Summary In our global IT software delivery centers, we are looking System Admins and Cyber Security Engineers. The System Admin will work with teams comprised of Software Engineers, Quality Engineers, User Interaction Design Engineers, Infrastructure/Platform team, and the Product Owners to help lead the technical insight and industry perspective in the creation, delivery, and integration of complex and comprehensive security solutions. You will be a security evangelist helping engineers in secure implementation of technology stack in a cloud environment. This position will be working on multiple projects as a technical expert or internal consultant. You will work on projects for components of the domain. You will work on multiple technical or functional domains. Job Description In this role you will: Participate in the domain technical and business discussions relative to future architect direction. Assist in the analysis, design and development of a roadmap and implementation based upon a current vs. future state in a cohesive architecture viewpoint. Gather and analyze data and develop architectural requirements at project level. Participate in the infrastructure architecture governance model. Support design and deployment of infrastructure solutions meeting standardization, consolidation, TCO, security, regulatory compliance and application system qualities, for different businesses. Support in the technical authority ongoing administration and incident management support of core infrastructure [network, security, and virtualization, patching, monitoring, backups] technologies that underpin Software Solutions Factories; Support for operating and maintaining security tools. Running and analyzing vulnerability and compliance scans to support continuous monitoring reporting and vulnerability management. Improve the effectiveness and efficiency of IT operations and drive significant operational, risk management, and economic benefits for their organization. Quality process: Ensure all tasks are carried out with respect to applicable processes and procedures [e.g. ISO9001 and ISO27001] applicable to site[s] and functions within job scope Desired Characteristics Technical Expertise Ability and willingness to travel Fluent English speaker; Degree in Computer Science or equivalent knowledge with 2 to 5 years experience Proven track record of problem analysis, identification and resolution Excellent communication skills, commitment, discipline, positive attitude, following management prioritization, accountability and flexibility Strong understanding of ITIL and change management policies and procedures Strong IT experience in a technical hands-on position Basic knowledge about anti-virus implementations (McAfee EPO, Bitdefender, Microsoft Forefront, etc.) Basic knowledge working with IPAMs and password solutions Basic knowledge about Cyber/Security foundation Basic Knowledge in design of computing or network or storage to meet business application system qualities Basic Understands technical and business discussions relative to future architecture direction aligning with business goals. Basic Understands concepts of setting and driving architecture direction. Familiar with elements of gathering architecture requirements. Understands architecture standards concepts to apply to project work. Personal Attributes Applies values, policies, procedures and precedent to make timely, routine decisions of limited, clear choice. Reacts open-mindedly to new perspectives or ideas. Considers different or unusual solutions when appropriate. Resolves day-to-day issues related to strategy implementation. Escalates issues that impact the client and/or strategic initiatives. Additional Information Relocation Assistance Provided: Yes Show more Show less

Posted 3 weeks ago

Apply

0 years

2 - 6 Lacs

Hyderābād

Remote

GlassDoor logo

Job Information Date Opened 06/30/2025 Job Type Full time Industry IT Services City Hyderabad State/Province Telangana Country India Zip/Postal Code 500081 About Us About DATAECONOMY: We are a fast-growing data & analytics company headquartered in Dublin with offices inDublin, OH, Providence, RI, and an advanced technology center in Hyderabad,India. We are clearly differentiated in the data & analytics space via our suite of solutions, accelerators, frameworks, and thought leadership. Job Description Primary Responsibilities Installing, configuring, and troubleshooting of all Windows and mac OS. Securing the network by installing & troubleshooting Antivirus related issues & regularly updating the Antivirus Configuring and Troubleshooting Local & Network Printers. Resolving hardware related issues in printers and other peripherals. Providing the admin rights, Remote desktop access, file and folder access to the users as per the request. Trouble shooting all end-to-end technical problems through the remote tools. Monitoring the compliance status of all the desktops/servers in terms of patch/DAT’s status. Troubleshooting issues on Office365 and escalate to proper team Identifying and solving issues on Microsoft products (EXCEL, POWEPOINT, WORD, TEAMS) Troubleshooting issues on Citrix connections, Client VPN’s. Add devices to AzureAD, create, deploy and managing Intune MDM. Create, deploy, manage the app protection policies, device configuration policies from Intune endpoint manager. Create and manage security firewall, Switches, and ILL. Manage and update McAfee web controls and firewall rules. Maintain and monitor CCTV camera’s, Access control eSSL. Identify the causes of networking problems, using diagnostic testing software and equipment. Resolve IT tickets regarding computer software, hardware, and application issues on time. Set up equipment for employee use, performing or ensuring proper installation of cables, operating systems, or appropriate software. Install and perform minor repairs to hardware, software, or peripheral equipment. Requirements Requirements Good Experience in System administration Technical Support Experience Experience in ITIL process Experience in RIM (Remote Infrastructure Mgmt.) Good knowledge in Virtualization and cloud concepts with VMware and/or Open stack Excellent communication skills Benefits Benefits Standard Company Benefits

Posted 3 weeks ago

Apply

8.0 years

4 - 4 Lacs

Bengaluru

On-site

GlassDoor logo

Join our Team About this opportunity: We are now looking for a Senior Security Engineer professional for our Managed Security team. This job role has accountability for researching, designing, engineering, implementing, and supporting security solutions in partnership with the respective stakeholders within Ericsson and / or customer organization and / or 3rd Party Providers. The professional will work alongside a highly skilled, diverse team, making sure that the information assets, that we are responsible to protect, are secured. What you will do: Design, implement, manage, monitor, and troubleshoot cybersecurity defenses, including configuration management, network security, systems security, and monitoring systems / tools. Participate in planning and audit scope development as well as project execution as a critical team member on complex technology related assessments. Play an active role in the design and execution of infrastructure initiatives to ensure an evolving adherence to industry best practices for information security. Lead the execution of the assessment of specific technical areas of a project, supervising other team members and providing coaching where needed. Perform Security Incident Management, including but not limited to: supporting SIEM tools, integrating logs into the tool, creating and modifying rules, investigating and resolving alerts, automating tasks. Research new and emerging threats to gain insight into the evolving threat landscape, and share knowledge with the team. Promote new ideas and new ways of executing projects and internal infrastructure enhancements. Innovate and automate repetitive activities and corrective actions, including broader automation initiatives. Analyzes and recommends security controls and procedures in business processes related to use of information systems and assets, and monitors for compliance Responds to information security incidents, including investigation of countermeasures to and recovery from computer-based attacks, unauthorized access, and policy breaches; interacts and coordinates with third-party incident responders, including law enforcement The skills you bring: Strong knowledge of information security Strong knowledge of SIEM tools (such as McAfee ESM, QRadar, ArcSight, Splunk, etc.), scanning tools (Nessus, Qualys, IBM AppScan, etc.) and PAM tools (BeyondTrust, CyberArk, etc.) Strong knowledge of both Linux-based and MS Windows-based system platforms with a strong technical understanding and aptitude for analytical problem-solving Strong understanding of enterprise, network, system and application level security issues Strong understanding of enterprise computing environments, distributed applications, and a strong understanding of TCP/IP networks along with available security controls (technical & process controls) for respective layers Good understanding of the system hardening processes, tools, guidelines and benchmarks Fundamental understanding of encryption technologies Participate in the out-of-hours on call rotation, providing technical support to the business for incidents Strong knowledge sharing and collaboration skills Deliver results and meet customer expectations Excellent communication skills; English is a must Key Qualifications: Education: BE/ B.Tech (Telecommunication/ Computer Science) Minimum years of relevant experience: 8 to 15 years experience with at least 8 years in IT and 7 years in Security ITIL certification, CCSP, OSCP, Security +, CISSP or similar will be an advantage Basic knowledge of telecommunications networks will be an added advantage Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? Click Here to find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. Primary country and city: India (IN) || Bangalore Req ID: 768176

Posted 3 weeks ago

Apply

5.0 - 8.0 years

4 - 8 Lacs

Noida

On-site

GlassDoor logo

Job Description Summary In our global IT software delivery centers, we are looking System Admins and Cyber Security Engineers. The System Admin and Cybersecurity Engineer will work with teams comprised of Software Engineers, Quality Engineers, User Interaction Design Engineers, Infrastructure/Platform team, and the Product Owners to help lead the technical insight and industry perspective in the creation, delivery, and integration of complex and comprehensive security solutions. You will be a security evangelist helping engineers in secure implementation of technology stack in a cloud environment. This position will be working on multiple projects as a technical expert or internal consultant. You will work on projects for components of the domain. You will work on multiple technical or functional domains. Job Description In this role you will: Participate in the domain technical and business discussions relative to future architect direction. Assist in the analysis, design and development of a roadmap and implementation based upon a current vs. future state in a cohesive architecture viewpoint. Gather and analyze data and develop architectural requirements at project level. Participate in the infrastructure architecture governance model. Support design and deployment of infrastructure solutions meeting standardization, consolidation, TCO, security, regulatory compliance and application system qualities, for different businesses. Serve as technical authority ongoing administration and incident management support of core infrastructure [network, security, and virtualization, patching, monitoring, backups] technologies that underpin Software Solutions Factories; Responsible for operating and maintaining security tools. Running and analyzing vulnerability and compliance scans to support continuous monitoring reporting and vulnerability management. Improve the effectiveness and efficiency of IT operations and drive significant operational, risk management, and economic benefits for their organization. Quality process: Ensure all tasks are carried out with respect to applicable processes and procedures [e.g. ISO9001 and ISO27001] applicable to site[s] and functions within job scope Desired Characteristics Technical Expertise: Ability and willingness to travel Fluent English speaker; Degree in Computer Science or equivalent knowledge with 5 to 8 years experience Proven track record of problem analysis, identification and resolution Excellent communication skills, commitment, discipline, positive attitude, following management prioritization, accountability and flexibility Strong understanding of ITIL and change management policies and procedures Strong IT experience in a technical hands-on position System administration: Windows and Linux - core competency to install, configure, manage Network hardware: Cisco enterprise hardware. VLAN, ACL, routing and VPN - install, configure, manage Security management: Enterprise firewall equipment e.g. Cisco’s ASA / Fortinet’s Fortigate or equivalent – install, configure, manage Windows / Active Directory Services – install, configure, manage Virtualization: VMware vSphere clusters, experience with HA, DRS, and vStorage backup APIs Storage: Shared NAS/SAN network storage e.g. HP 3PAR/MSA/EVA, EMC DataDomain Backup Technologies Incident response and vulnerability management (NetBackup, BackupExec, Veeam, Networker) Good knowledge about anti-virus implementations (McAfee EPO, Bitdefender, Microsoft Forefront, etc.) Good knowledge working with IPAMs and password solutions Experience in implementing and/or working with monitoring tools, log monitoring tools, log correlation tools.(Nagios, Graylog, Splunk, etc.) Very good Cyber/Security foundation Skilled level expertise in design of computing or network or storage to meet business application system qualities Understands technical and business discussions relative to future architecture direction aligning with business goals. Understands concepts of setting and driving architecture direction. Familiar with elements of gathering architecture requirements. Understands architecture standards concepts to apply to project work. Personal Attributes: Applies values, policies, procedures and precedent to make timely, routine decisions of limited, clear choice. Reacts open-mindedly to new perspectives or ideas. Considers different or unusual solutions when appropriate. Resolves day-to-day issues related to strategy implementation. Escalates issues that impact the client and/or strategic initiatives. Additional Information Relocation Assistance Provided: Yes

Posted 3 weeks ago

Apply

5.0 - 8.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Job Description Summary In our global IT software delivery centers, we are looking System Admins and Cyber Security Engineers. The System Admin and Cybersecurity Engineer will work with teams comprised of Software Engineers, Quality Engineers, User Interaction Design Engineers, Infrastructure/Platform team, and the Product Owners to help lead the technical insight and industry perspective in the creation, delivery, and integration of complex and comprehensive security solutions. You will be a security evangelist helping engineers in secure implementation of technology stack in a cloud environment. This position will be working on multiple projects as a technical expert or internal consultant. You will work on projects for components of the domain. You will work on multiple technical or functional domains. Job Description In this role you will: Participate in the domain technical and business discussions relative to future architect direction. Assist in the analysis, design and development of a roadmap and implementation based upon a current vs. future state in a cohesive architecture viewpoint. Gather and analyze data and develop architectural requirements at project level. Participate in the infrastructure architecture governance model. Support design and deployment of infrastructure solutions meeting standardization, consolidation, TCO, security, regulatory compliance and application system qualities, for different businesses. Serve as technical authority ongoing administration and incident management support of core infrastructure [network, security, and virtualization, patching, monitoring, backups] technologies that underpin Software Solutions Factories; Responsible for operating and maintaining security tools. Running and analyzing vulnerability and compliance scans to support continuous monitoring reporting and vulnerability management. Improve the effectiveness and efficiency of IT operations and drive significant operational, risk management, and economic benefits for their organization. Quality process: Ensure all tasks are carried out with respect to applicable processes and procedures [e.g. ISO9001 and ISO27001] applicable to site[s] and functions within job scope Desired Characteristics Technical Expertise Ability and willingness to travel Fluent English speaker; Degree in Computer Science or equivalent knowledge with 5 to 8 years experience Proven track record of problem analysis, identification and resolution Excellent communication skills, commitment, discipline, positive attitude, following management prioritization, accountability and flexibility Strong understanding of ITIL and change management policies and procedures Strong IT experience in a technical hands-on position System administration: Windows and Linux - core competency to install, configure, manage Network hardware: Cisco enterprise hardware. VLAN, ACL, routing and VPN - install, configure, manage Security management: Enterprise firewall equipment e.g. Cisco’s ASA / Fortinet’s Fortigate or equivalent – install, configure, manage Windows / Active Directory Services – install, configure, manage Virtualization: VMware vSphere clusters, experience with HA, DRS, and vStorage backup APIs Storage: Shared NAS/SAN network storage e.g. HP 3PAR/MSA/EVA, EMC DataDomain Backup Technologies Incident response and vulnerability management (NetBackup, BackupExec, Veeam, Networker) Good knowledge about anti-virus implementations (McAfee EPO, Bitdefender, Microsoft Forefront, etc.) Good knowledge working with IPAMs and password solutions Experience in implementing and/or working with monitoring tools, log monitoring tools, log correlation tools.(Nagios, Graylog, Splunk, etc.) Very good Cyber/Security foundation Skilled level expertise in design of computing or network or storage to meet business application system qualities Understands technical and business discussions relative to future architecture direction aligning with business goals. Understands concepts of setting and driving architecture direction. Familiar with elements of gathering architecture requirements. Understands architecture standards concepts to apply to project work. Personal Attributes Applies values, policies, procedures and precedent to make timely, routine decisions of limited, clear choice. Reacts open-mindedly to new perspectives or ideas. Considers different or unusual solutions when appropriate. Resolves day-to-day issues related to strategy implementation. Escalates issues that impact the client and/or strategic initiatives. Additional Information Relocation Assistance Provided: Yes Show more Show less

Posted 3 weeks ago

Apply

2.0 - 5.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Overview ormation Security Analyst: Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Researches attempted or successful efforts to compromise systems security and designs countermeasures. Maintains hardware, software and network firewalls and encryption protocols. Administers security policies to control physical and virtual access to systems. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Job Code Tip: May be internal or external, client-focused, working in conjunction with Professional Services and outsourcing functions. May include company-wide, web-enabled solutions. Individuals whose primary focus is on developing, testing, debugging and deploying code or processing routines that support security protocols for an established system or systems should be matched to the appropriate Programmer or Programmer/Analyst family in the Information Technology/MIS functional area. Responsibilities Should have process knowledge and technical knowledge on any of the SIEM tools ( like Qradar, LogRhythm, AlienVault, Splunk…etc). L2/L3 level is added advantage. Should have process knowledge and technical knowledge in AV tools like Symantec, McAfee, Trend Micro…etc. L2/L3 level is added advantage. Should have knowledge in managing Vulnerability tools and various remediation efforts. Review security logs generated by applications, devices and other systems, taking action or escalating to appropriate teams as needed. Enforce incident response service level agreement. Work with the global IT Security team to analyze, test and recommend tools to strengthen the security posture of the company Create and maintain operational reports allowing IT management team to understand the current and historical landscape of the IT security risks Vulnerability management assessment and remediation Participate in daily and ad-hoc meetings related to cyber security, controls and compliance, processes and documentation related tasks Research the latest information technology (IT) security trends Help plan and carry out an organization’s way of handling security Develop security standards and best practices for the organization Recommend security enhancements to management or senior IT staff Document security breaches and assess the damage they cause. Performs other duties as assigned Qualifications B. Tech, B.E or M.C.A 2-5 years’ Experience working in a Security Operations Center 2 years minimum in the computer industry Knowledge working with complex Windows environments Knowledgeable in various security frameworks such as NIST 800-53 / NIST 800-171 / ISO27001 Knowledge in design and administration of security tools Good written and verbal communication skills Show more Show less

Posted 3 weeks ago

Apply

4.0 - 9.0 years

14 - 19 Lacs

Bengaluru

Work from Office

Naukri logo

About Target As a Fortune 50 company with more than 400,000 team members worldwide, Target is an iconic brand and one of America's leading retailers. At Target, we have a timeless purpose and a proven strategy and that hasn t happened by accident. Some of the best minds from diverse backgrounds come together at Target to redefine retail in an inclusive learning environment that values people and delivers world-class outcomes. That winning formula is especially apparent in Bengaluru, where Target in India operates as a fully integrated part of Target s global team and has more than 4,000 team members supporting the company s global strategy and operations. Joining Target means promoting a culture of mutual care and respect and striving to make the most meaningful and positive impact. Becoming a Target team member means joining a community that values diverse backgrounds. We believe your unique perspective is important, and you'll build relationships by being authentic and respectful. At Target, inclusion is part of the core value. We aim to create equitable experiences for all, regardless of their dimensions of difference. As an equal opportunity employer, Target provides diverse opportunities for everyone to grow and win. About Target Tech Every time a guest enters a Target store or browses Target.com, they experience the impact of Target s investments in technology and innovation. We re the technologists behind one of the most loved retail brands, delivering joy to millions of our guests, team members, and communities. The Sr. Engineering Manager (SEM) is responsible for a managing a team of engineers. This role is accountable for leading a team, developing code, deploying and managing in production. You will be called upon to be the technical representative for your team during cross-team collaborative efforts and planning. Success in this role will require strong and innovative approaches to problem solving, great technical leadership, excellent communication (written and verbal, formal and informal), flexibility, accountability and a self-motivated working style with attention to detail. About Team Our mission is two-foldwe protect the hundreds of thousands of Target endpoints (such as user laptops, in store devices, distribution center technology, servers and containers) from cyber threats while balancing the stability and functionality needs of Target s technology environment. To do this, we use a combination of vendor tools, in-house developed utilities and strong organizational partnerships to achieve shared goals. Use your skills, experience and talents to be a part of groundbreaking thinking and visionary goals. As a Sr. Engineering Manager, you ll take the lead as you Optimize a suite of products to secure Target endpoints. Use innovation and critical thinking to solve complex security and technology problems. Test the efficacy of tools by leveraging adversary emulation tools. Establish good stakeholder relationships and work closely with Tech teams, influence the product roadmap and help drive requirements while being a strong advocate of agile and DevOps practices across the team. Execution of the team-developed strategy, solving enterprise-wide problems and addressing key security concerns. Provide career development and performance management to a team of engineers. Industry endpoint security domain expert, benchmarking with other retailers and companies, staying on top of new trends and technology in a quickly-moving space. About you 4 year degree in Computer Science or equivalent experience 9+ years of engineering experience 1-3 years of managing teams with a strong track record of delivery for cross-functional products Strong written and verbal communication skills with the ability to present complex technical information in a clear and concise manner to variety of audiences Team-orientated, passionate about developing others skills and capabilities Successful track record of working in large enterprise technology ecosystems leading complex technology teams Deep understanding of agile development processes and methodology including continuous integration and delivery, with a mindset of building incrementally and delivering business value quickly Strong collaboration skills, effective management of complex cross-team initiatives and leads with the desire to enable our engineering teams.

Posted 3 weeks ago

Apply

8.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Join our Team About this opportunity: We are now looking for a Senior Security Engineer professional for our Managed Security team. This job role has accountability for researching, designing, engineering, implementing, and supporting security solutions in partnership with the respective stakeholders within Ericsson and / or customer organization and / or 3rd Party Providers. The professional will work alongside a highly skilled, diverse team, making sure that the information assets, that we are responsible to protect, are secured. What you will do: Design, implement, manage, monitor, and troubleshoot cybersecurity defenses, including configuration management, network security, systems security, and monitoring systems / tools. Participate in planning and audit scope development as well as project execution as a critical team member on complex technology related assessments. Play an active role in the design and execution of infrastructure initiatives to ensure an evolving adherence to industry best practices for information security. Lead the execution of the assessment of specific technical areas of a project, supervising other team members and providing coaching where needed. Perform Security Incident Management, including but not limited to: supporting SIEM tools, integrating logs into the tool, creating and modifying rules, investigating and resolving alerts, automating tasks. Research new and emerging threats to gain insight into the evolving threat landscape, and share knowledge with the team. Promote new ideas and new ways of executing projects and internal infrastructure enhancements. Innovate and automate repetitive activities and corrective actions, including broader automation initiatives. Analyzes and recommends security controls and procedures in business processes related to use of information systems and assets, and monitors for compliance Responds to information security incidents, including investigation of countermeasures to and recovery from computer-based attacks, unauthorized access, and policy breaches; interacts and coordinates with third-party incident responders, including law enforcement The skills you bring: Strong knowledge of information security Strong knowledge of SIEM tools (such as McAfee ESM, QRadar, ArcSight, Splunk, etc.), scanning tools (Nessus, Qualys, IBM AppScan, etc.) and PAM tools (BeyondTrust, CyberArk, etc.) Strong knowledge of both Linux-based and MS Windows-based system platforms with a strong technical understanding and aptitude for analytical problem-solving Strong understanding of enterprise, network, system and application level security issues Strong understanding of enterprise computing environments, distributed applications, and a strong understanding of TCP/IP networks along with available security controls (technical & process controls) for respective layers Good understanding of the system hardening processes, tools, guidelines and benchmarks Fundamental understanding of encryption technologies Participate in the out-of-hours on call rotation, providing technical support to the business for incidents Strong knowledge sharing and collaboration skills Deliver results and meet customer expectations Excellent communication skills; English is a must Key Qualifications: Education: BE/ B.Tech (Telecommunication/ Computer Science) Minimum years of relevant experience: 8 to 15 years experience with at least 8 years in IT and 7 years in Security ITIL certification, CCSP, OSCP, Security +, CISSP or similar will be an advantage Basic knowledge of telecommunications networks will be an added advantage Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? Click Here to find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. Primary country and city: India (IN) || Noida Req ID: 768174 Show more Show less

Posted 3 weeks ago

Apply

6.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Threat Detection & Response Consulting - Security Orchestration, Automation and Response (SOAR) - Senior KEY Capabilities: Excellent teamwork skills, passion and drive to succeed and combat Cyber threats Working with the customer to identify security automation strategies and provide creative integrations and playbooks. Work collaboratively with other team members to find creative and practical solutions to customers’ challenges and needs. Expertise in design and implementation of SOAR solution such as Phantom (Preferable), Demisto or Resilient Responsible for execution and maintenance of SOAR related analytical processes and tasks Manage and administration of SOAR platforms Hands-on experience with Incident Response and Threat Intelligence tools. Creation of reusable and efficient Python-based Playbooks. Use Phantom platform to enable automation and orchestration on various tools and technologies by making use of existing or custom integration Partner with security operations teams, threat intelligence groups and incident responders. Should have worked in a security operations center and gained understanding of SIEM and other log management platforms. Having experience in Splunk content development will be an added advantage Should have solid experience in the design/build, test, implementation, and maintenance of integration with other security tools and platforms Willing to learn new technologies and take up new challenges. Assist in developing high-quality technical content such as automation scripts/tools, reference architectures, and white papers. Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in endpoint protection tools, techniques and platforms such as Carbon Black, Tanium, Microsoft Defender ATP, Symantec, McAfee or others Qualification & experience: Minimum of 6 years’ experience in cyber security with a depth of network architecture knowledge that will translate over to deploying and integrating a complicated SOAR solution in global enterprise environments. Strong oral, written and listening skills are an essential component to effective consulting. Strong background in network administration. Ability to work at all layers of the OSI models, including being able to explain communication at any level is necessary. Must have knowledge of Vulnerability Management, basic Windows setup, Windows Domains, trusts, GPOs, server roles, Windows security policies, basic Linux setup, user administration, Linux security and troubleshooting. Should have strong hands-on experience with scripting technologies like Python, REST, JSON, SOAP, ODBC, XML etc. Must have honours degree in a technical field such as computer science, mathematics, engineering or similar field Minimum 3 years of working in SOAR Certification in any one of the SIEM Solution such as IBM QRadar, Exabeam, Securonix and Splunk will be an added advantage Certifications in a core security related discipline will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 3 weeks ago

Apply

8.0 years

4 - 4 Lacs

Noida

On-site

GlassDoor logo

Join our Team About this opportunity: We are now looking for a Senior Security Engineer professional for our Managed Security team. This job role has accountability for researching, designing, engineering, implementing, and supporting security solutions in partnership with the respective stakeholders within Ericsson and / or customer organization and / or 3rd Party Providers. The professional will work alongside a highly skilled, diverse team, making sure that the information assets, that we are responsible to protect, are secured. What you will do: Design, implement, manage, monitor, and troubleshoot cybersecurity defenses, including configuration management, network security, systems security, and monitoring systems / tools. Participate in planning and audit scope development as well as project execution as a critical team member on complex technology related assessments. Play an active role in the design and execution of infrastructure initiatives to ensure an evolving adherence to industry best practices for information security. Lead the execution of the assessment of specific technical areas of a project, supervising other team members and providing coaching where needed. Perform Security Incident Management, including but not limited to: supporting SIEM tools, integrating logs into the tool, creating and modifying rules, investigating and resolving alerts, automating tasks. Research new and emerging threats to gain insight into the evolving threat landscape, and share knowledge with the team. Promote new ideas and new ways of executing projects and internal infrastructure enhancements. Innovate and automate repetitive activities and corrective actions, including broader automation initiatives. Analyzes and recommends security controls and procedures in business processes related to use of information systems and assets, and monitors for compliance Responds to information security incidents, including investigation of countermeasures to and recovery from computer-based attacks, unauthorized access, and policy breaches; interacts and coordinates with third-party incident responders, including law enforcement The skills you bring: Strong knowledge of information security Strong knowledge of SIEM tools (such as McAfee ESM, QRadar, ArcSight, Splunk, etc.), scanning tools (Nessus, Qualys, IBM AppScan, etc.) and PAM tools (BeyondTrust, CyberArk, etc.) Strong knowledge of both Linux-based and MS Windows-based system platforms with a strong technical understanding and aptitude for analytical problem-solving Strong understanding of enterprise, network, system and application level security issues Strong understanding of enterprise computing environments, distributed applications, and a strong understanding of TCP/IP networks along with available security controls (technical & process controls) for respective layers Good understanding of the system hardening processes, tools, guidelines and benchmarks Fundamental understanding of encryption technologies Participate in the out-of-hours on call rotation, providing technical support to the business for incidents Strong knowledge sharing and collaboration skills Deliver results and meet customer expectations Excellent communication skills; English is a must Key Qualifications: Education: BE/ B.Tech (Telecommunication/ Computer Science) Minimum years of relevant experience: 8 to 15 years experience with at least 8 years in IT and 7 years in Security ITIL certification, CCSP, OSCP, Security +, CISSP or similar will be an advantage Basic knowledge of telecommunications networks will be an added advantage Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? Click Here to find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. Primary country and city: India (IN) || Noida Req ID: 768174

Posted 3 weeks ago

Apply

6.0 years

0 Lacs

Kanayannur, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Threat Detection & Response Consulting - Security Orchestration, Automation and Response (SOAR) - Senior KEY Capabilities: Excellent teamwork skills, passion and drive to succeed and combat Cyber threats Working with the customer to identify security automation strategies and provide creative integrations and playbooks. Work collaboratively with other team members to find creative and practical solutions to customers’ challenges and needs. Expertise in design and implementation of SOAR solution such as Phantom (Preferable), Demisto or Resilient Responsible for execution and maintenance of SOAR related analytical processes and tasks Manage and administration of SOAR platforms Hands-on experience with Incident Response and Threat Intelligence tools. Creation of reusable and efficient Python-based Playbooks. Use Phantom platform to enable automation and orchestration on various tools and technologies by making use of existing or custom integration Partner with security operations teams, threat intelligence groups and incident responders. Should have worked in a security operations center and gained understanding of SIEM and other log management platforms. Having experience in Splunk content development will be an added advantage Should have solid experience in the design/build, test, implementation, and maintenance of integration with other security tools and platforms Willing to learn new technologies and take up new challenges. Assist in developing high-quality technical content such as automation scripts/tools, reference architectures, and white papers. Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in endpoint protection tools, techniques and platforms such as Carbon Black, Tanium, Microsoft Defender ATP, Symantec, McAfee or others Qualification & experience: Minimum of 6 years’ experience in cyber security with a depth of network architecture knowledge that will translate over to deploying and integrating a complicated SOAR solution in global enterprise environments. Strong oral, written and listening skills are an essential component to effective consulting. Strong background in network administration. Ability to work at all layers of the OSI models, including being able to explain communication at any level is necessary. Must have knowledge of Vulnerability Management, basic Windows setup, Windows Domains, trusts, GPOs, server roles, Windows security policies, basic Linux setup, user administration, Linux security and troubleshooting. Should have strong hands-on experience with scripting technologies like Python, REST, JSON, SOAP, ODBC, XML etc. Must have honours degree in a technical field such as computer science, mathematics, engineering or similar field Minimum 3 years of working in SOAR Certification in any one of the SIEM Solution such as IBM QRadar, Exabeam, Securonix and Splunk will be an added advantage Certifications in a core security related discipline will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 3 weeks ago

Apply

6.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Threat Detection & Response Consulting - Security Orchestration, Automation and Response (SOAR) - Senior KEY Capabilities: Excellent teamwork skills, passion and drive to succeed and combat Cyber threats Working with the customer to identify security automation strategies and provide creative integrations and playbooks. Work collaboratively with other team members to find creative and practical solutions to customers’ challenges and needs. Expertise in design and implementation of SOAR solution such as Phantom (Preferable), Demisto or Resilient Responsible for execution and maintenance of SOAR related analytical processes and tasks Manage and administration of SOAR platforms Hands-on experience with Incident Response and Threat Intelligence tools. Creation of reusable and efficient Python-based Playbooks. Use Phantom platform to enable automation and orchestration on various tools and technologies by making use of existing or custom integration Partner with security operations teams, threat intelligence groups and incident responders. Should have worked in a security operations center and gained understanding of SIEM and other log management platforms. Having experience in Splunk content development will be an added advantage Should have solid experience in the design/build, test, implementation, and maintenance of integration with other security tools and platforms Willing to learn new technologies and take up new challenges. Assist in developing high-quality technical content such as automation scripts/tools, reference architectures, and white papers. Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in endpoint protection tools, techniques and platforms such as Carbon Black, Tanium, Microsoft Defender ATP, Symantec, McAfee or others Qualification & experience: Minimum of 6 years’ experience in cyber security with a depth of network architecture knowledge that will translate over to deploying and integrating a complicated SOAR solution in global enterprise environments. Strong oral, written and listening skills are an essential component to effective consulting. Strong background in network administration. Ability to work at all layers of the OSI models, including being able to explain communication at any level is necessary. Must have knowledge of Vulnerability Management, basic Windows setup, Windows Domains, trusts, GPOs, server roles, Windows security policies, basic Linux setup, user administration, Linux security and troubleshooting. Should have strong hands-on experience with scripting technologies like Python, REST, JSON, SOAP, ODBC, XML etc. Must have honours degree in a technical field such as computer science, mathematics, engineering or similar field Minimum 3 years of working in SOAR Certification in any one of the SIEM Solution such as IBM QRadar, Exabeam, Securonix and Splunk will be an added advantage Certifications in a core security related discipline will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 3 weeks ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

Primary Responsibilities Installing, configuring, and troubleshooting of all Windows and mac OS. Securing the network by installing & troubleshooting Antivirus related issues & regularly updating the Antivirus Configuring and Troubleshooting Local & Network Printers. Resolving hardware related issues in printers and other peripherals. Providing the admin rights, Remote desktop access, file and folder access to the users as per the request. Trouble shooting all end-to-end technical problems through the remote tools. Monitoring the compliance status of all the desktops/servers in terms of patch/DAT’s status. Troubleshooting issues on Office365 and escalate to proper team Identifying and solving issues on Microsoft products (EXCEL, POWEPOINT, WORD, TEAMS) Troubleshooting issues on Citrix connections, Client VPN’s. Add devices to AzureAD, create, deploy and managing Intune MDM. Create, deploy, manage the app protection policies, device configuration policies from Intune endpoint manager. Create and manage security firewall, Switches, and ILL. Manage and update McAfee web controls and firewall rules. Maintain and monitor CCTV camera’s, Access control eSSL. Identify the causes of networking problems, using diagnostic testing software and equipment. Resolve IT tickets regarding computer software, hardware, and application issues on time. Set up equipment for employee use, performing or ensuring proper installation of cables, operating systems, or appropriate software. Install and perform minor repairs to hardware, software, or peripheral equipment. Requirements Requirements Good Experience in System administration Technical Support Experience Experience in ITIL process Experience in RIM (Remote Infrastructure Mgmt.) Good knowledge in Virtualization and cloud concepts with VMware and/or Open stack Excellent communication skills Benefits Benefits Standard Company Benefits Show more Show less

Posted 3 weeks ago

Apply

5.0 - 10.0 years

10 - 15 Lacs

Bengaluru

Hybrid

Naukri logo

7+ years Overall experience in Data Security tools PKI, HSM, KMS and McAfee FRP and Data Classification tools like AIP, Titus. Design and implementation experience in MS CA, HSM, Thales CTM, McAfee FRP & AIP. Having experience in Certificate Life Cycle Management tools like Venafi/KeyOn/AppViewX. Having good knowledge in managing and overseeing day to day activities of Data Sec tools and ensure adherence to enterprise standards in project execution methodology, requirements gathering, quality assurance and continuous improvement. Good expertise in Cloud technology (Azure/AWS) Monitor emerging technology trends within assigned product/technology area. If applicable, manage relationship and interactions with vendors (software or contractors). Determine Protection controls required. Licenses requirements. Determine deployment roadmap Should have a classification strategy or use recommended labels. Hiring for multiple locations

Posted 3 weeks ago

Apply

3.0 - 6.0 years

6 - 15 Lacs

Mumbai

Work from Office

Naukri logo

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you ready to embark on a technical adventure and become a hero to our external and internal users? As Technical Support at Kyndryl, you'll be part of an elite team that provides exceptional technical assistance, enabling our clients to achieve their desired business outcomes. You'll be a troubleshooter extraordinaire, diagnosing and repairing complex equipment, software, and systems with ease. Nothing will be too challenging for you to solve as you respond to escalated issues, report critical design flaws, reliability and maintenance problems, and bugs. You'll be the go-to person for our customers who require assistance with highly technical or sophisticated products, as well as for customer installations and training. With your passion for technology, you'll provide world-class support that exceeds customer expectations. As Technical Support, you'll perform varying degrees of problem determination and resolution of desktop hardware and software issues using your technical expertise and available resources to ensure that our customers' issues are resolved efficiently and effectively. You'll also have the opportunity to perform installs, moves, adds, and changes (IMAC) activities, as well as data backup and restore on certain accounts for clients, ensuring that all related administrative duties are completed within Service Level Agreement objectives. You will develop a deep understanding of the local and regional infrastructure, as well as key contacts in other competencies, which will enable you to ensure that the proper team is aware of – and taking action on the problem. If you're a technical wizard, a customer service superstar, and have an unquenchable thirst for knowledge, we want you to join our team. Key Responsibilities: Design, implement, and manage endpoint management and security tools. Ensure effective deployment, monitoring, and maintenance of endpoint protection software (e.g., anti-virus, anti-malware, encryption, etc.). Automate the deployment and configuration of endpoint security tools across the organization. Develop and maintain endpoint management processes for patching, updates, and configuration changes. Work with IT and security teams to ensure compliance with security policies, industry regulations, and best practices. Analyze endpoint security events and alerts, and provide recommendations for remediation. Troubleshoot and resolve endpoint security and performance issues. Maintain inventory and tracking of all endpoints in the environment. Assist in the development and enforcement of endpoint security policies and procedures. Collaborate with cross-functional teams (e.g., network, IT, security, operations) to ensure the seamless integration of endpoint tools. Stay up to date with the latest trends and best practices in endpoint security and management. Conduct regular assessments of endpoint health, configuration, and security posture. Create and maintain documentation related to endpoint tools, processes, and configurations. Provide support for endpoint-related incidents and requests from end-users and other IT teams. Your Future at Kyndryl Imagine being part of a dynamic team that values your growth and development. As Technical Support at Kyndryl, you'll receive an extensive and diverse set of technical trainings, including cloud technology, and free certifications to enhance your skills and expertise. You'll have the opportunity to pursue a career in advanced technical roles and beyond – taking your future to the next level. With Kyndryl, the sky's the limit. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Expertise Bachelor’s degree in Computer Science, Information Technology, Engineering, or a related field. Minimun 5+ Years of experience in anakage tool. Proven experience as an Endpoint Tool Engineer, Systems Engineer, or in a similar role with a focus on endpoint security and management, mainly Anakage Automation Tool Strong experience with endpoint security tools such as Symantec, McAfee, CrowdStrike, Carbon Black, or similar. Familiarity with endpoint management systems such as Microsoft Endpoint Configuration Manager (SCCM), Intune, Jamf, or other similar tools. Experience with patch management, system imaging, and software deployment. Knowledge of endpoint security policies and industry regulations (e.g., GDPR, HIPAA). Experience working with Windows, macOS, and mobile operating systems (Android, iOS). Experience with scripting and automation (e.g., PowerShell, Bash, Python). Strong understanding of network security and endpoint threat prevention strategies. Familiarity with Active Directory and Group Policy for endpoint configuration management. Experience with monitoring and reporting tools to track endpoint performance and security status Preferred Technical and Professional Experience Certifications such as CompTIA Security+, CISSP, CEH, or other relevant security certifications. Experience with endpoint detection and response (EDR) tools. Knowledge of cloud-based endpoint management solutions. Familiarity with endpoint backup and recovery strategies. Experience with SIEM systems (e.g., Splunk, ArcSight) for security monitoring. Excellent problem-solving skills and the ability to troubleshoot complex endpoint issues. Strong attention to detail, ensuring that endpoint security and configurations are consistently monitored and optimized. Ability to work effectively in a team environment and collaborate with other departments. Strong written and verbal communication skills for documenting processes and interacting with other teams. Ability to prioritize tasks effectively and manage multiple projects simultaneously. Proactive and self-motivated approach to learning and applying new technologies Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 3 weeks ago

Apply

0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Role Overview Cloud Software Development Engineer with ability to design, develop, deploy, and maintain cloud-based applications and services, leveraging cloud platforms AWS and GCP focusing on scalability, security, and efficiency. About The Role Develop and deploy cloud-based distributed applications, ensuring they are efficient, secure, and scalable. Build and optimize large-scale data processing pipelines using Spark/pySpark, integrating with cloud-native services. Monitor the performance and health of cloud-based applications and infrastructure, ensuring they meet performance, scalability, and security standards. Collaborate with developers, SDETs, Researchers, DevOps engineers, and system administrators to ensure smooth development, deployment, and operations of data-driven applications. Implement data analytics and dashboarding solutions to support business intelligence, operational monitoring, and model performance tracking. Contribute to the development, deployment, and monitoring of machine learning models, with a clear understanding of the end-to-end ML lifecycle, including data collection, preprocessing, model (re)training, evaluation, deployment, and feedback loops. About You Proficient in programming languages such as Python and .NET, with experience Understanding of unit test frameworks in Python & .NET. Strong understanding of cloud platforms, particularly AWS and Google Cloud Platform (GCP), and their services. Solid grasp of AI and ML concepts, tools (MLFlow etc), and best practices. Understanding of end-to-end ML lifecycle and workflows in production-grade environments. Knowledge of cloud security best practices and the ability to implement them in application and infrastructure design. Familiarity with containerization and orchestration technologies such as Docker and Kubernetes. Competent in working with both relational and non-relational databases to support dynamic application needs. Company Overview McAfee is a leader in personal security for consumers. Focused on protecting people, not just devices, McAfee consumer solutions adapt to users’ needs in an always online world, empowering them to live securely through integrated, intuitive solutions that protects their families and communities with the right security at the right moment. Company Benefits And Perks We work hard to embrace diversity and inclusion and encourage everyone at McAfee to bring their authentic selves to work every day. We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees. Bonus Program Pension and Retirement Plans Medical, Dental and Vision Coverage Paid Time Off Paid Parental Leave Support for Community Involvement We're serious about our commitment to diversity which is why McAfee prohibits discrimination based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status. Show more Show less

Posted 3 weeks ago

Apply

2.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Introduction We believe that every candidate brings something special to the table, including you! So, even if you feel that you’re close but not an exact match, we encourage you to apply. We’d be thrilled to receive applications from exceptional individuals like yourself. Gallagher, a global industry leader in insurance, risk management, and consulting services, boasts a team of over 50,000 professionals worldwide. Our culture, known as "The Gallagher Way," is driven by shared values and a passion for excellence. At the heart of our global operations, the Gallagher Center of Excellence (GCoE) in India, founded in 2006, upholds the values of quality, innovation, and teamwork. With 10,000+ professionals across five India locations, GCoE is where knowledge-driven individuals make a significant impact and build rewarding, long-term careers. Overview Gallagher operates Data Loss Prevention (DLP) technologies and processes to seek to protect data in transit and to prevent and/or detect the unauthorized egress (leakage) of Gallagher information, whether related to current, past or prospective employees, customers, insurance market participants or suppliers. Responsible for leading and managing Gallagher’s approach to data loss prevention to ensure that we implement appropriate preventative and monitoring controls across our global operations to manage the risk to Gallagher information. This role is responsible for the triage, investigation, escalation and closure of DLP incidents, the recommendation, implementation and maintenance of effective DLP policies and the production of monthly and ad-hoc DLP reports to minimize Gallagher’s risk of data leakage, identify data leakage and to monitor compliance with company information security and privacy policies for in scope entities. The individual is expected to have experience of DLP and working with DLP console, good knowledge of data leakage methods and understanding of the different data types processed across entities and to keep that knowledge up to date. This is an essential role within the DLP team to support them along with the Global Chief Information Security Officer and Global Chief Privacy Officer in the delivery of their data protection strategy. The role will provide hands on advice, guidance and support, the businesses and central services functions to assist in the identification, management and monitoring of Gallagher’s privacy and security risks in line with our risk appetite. How You'll Make An Impact Responsible for triage and investigation of DLP events and the escalation of instances of non-compliance with company policy and potential/actual instances of data leakage (either personal data or commercial data) using DLP Solutions on a day to day basis. Validating white listed user activity. Advising on required rulesets and ruleset optimization and tuning to reduce false positives based on patterns observed during event analysis. Performing control checks at regular intervals. Preparation of monthly DLP reports and dashboards including trend and root cause analysis as well as achievement against SLAs and KPIs. Providing detailed DLP analysis support for stakeholders. Contribution to the overall DLP process improvement and documentation. Supporting the incident management framework. Building and maintaining good stakeholder relationships. About You Min 2+ years experience in DLP McAfee/Microsoft/SkyHigh Security DLP certified beneficial but not essential DLP solution capabilities Knowledge of DLP capabilities Proven track record of incident investigation and escalation Knowledge of McAfee/Microsoft/SkyHigh Security DLP an advantage Knowledge of SIEM tool an advantage but not essential Knowledge of Incident ticket tool an advantage but not essential Knowledge of the insurance broking or insurance sector an advantage but not essential Hand on experience with DLP tool - Preferred McAfee/Microsoft/SkyHigh Security DLP Incident Management - Triage, investigation and escalation Assessing risk Report production Supporting the maintenance of standard operating procedures Working effectively in a shared mailbox Skills/other Familiarity with sensitive data types/identifiers, classifications, etc. Ability to understand drivers and priorities with regard to business and regulatory requirements Excellent spoken and written English communication skills Analytical and investigative skills Report writing MS Office Confidence to challenge views and opinions and make recommendations for improvements to policies and processes Fine attention to detail Additional Information We value inclusion and diversity Inclusion and diversity (I&D) is a core part of our business, and it’s embedded into the fabric of our organization. For more than 95 years, Gallagher has led with a commitment to sustainability and to support the communities where we live and work. Gallagher embraces our employees’ diverse identities, experiences and talents, allowing us to better serve our clients and communities. We see inclusion as a conscious commitment and diversity as a vital strength. By embracing diversity in all its forms, we live out The Gallagher Way to its fullest. Gallagher believes that all persons are entitled to equal employment opportunity and prohibits any form of discrimination by its managers, employees, vendors or customers based on race, color, religion, creed, gender (including pregnancy status), sexual orientation, gender identity (which includes transgender and other gender non-conforming individuals), gender expression, hair expression, marital status, parental status, age, national origin, ancestry, disability, medical condition, genetic information, veteran or military status, citizenship status, or any other characteristic protected (herein referred to as “protected characteristics”) by applicable federal, state, or local laws. Equal employment opportunity will be extended in all aspects of the employer-employee relationship, including, but not limited to, recruitment, hiring, training, promotion, transfer, demotion, compensation, benefits, layoff, and termination. In addition, Gallagher will make reasonable accommodations to known physical or mental limitations of an otherwise qualified person with a disability, unless the accommodation would impose an undue hardship on the operation of our business. Show more Show less

Posted 3 weeks ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Yerawada, Pune, Maharashtra 411006, India Req #1136 02 June 2025 CACI International Inc is an American multinational professional services and information technology company headquartered in Northern Virginia. CACI provides expertise and technology to enterprise and mission customers in support of national security missions and government transformation for defense, intelligence, and civilian customers. CACI has approximately 23,000 employees worldwide. Headquartered in London, CACI Ltd is a wholly owned subsidiary of CACI International Inc., a publicly listed company on the NYSE with annual revenue in excess of US $6.2bn. Founded in 2022, CACI India is an exciting, growing and progressive business unit of CACI Ltd. CACI Ltd currently has over 2000 intelligent professionals and are now adding many more from our Hyderabad and Pune offices. Through a rigorous emphasis on quality, the CACI India has grown considerably to become one of the UKs most well-respected Technology centres. A Network Engineer is required to join the India Deployment Team, responsible for the deployment and planning of the Bank’s network infrastructure in the UK, Middle-East, Africa and India. The team is responsible for the delivery and deployment of network/security projects and requests to enhance the client’s infrastructure to meet current and future business demands:- The role may have, but is not limited to the following functions: Plan, manage and deploy technology changes to support DC services Deploy LAN infrastructure to support end user services requirements Includes patching schedules for facilities to cable network equipment Diagrams for Network Operations Inventory management Create implementation plans for RFC’s to a high level of detail. Correctly document pre and post checks for change verification purposes Understand and document back out plans, clearly identifying back out points. Identify points of no return Support the stability and uptime of essential services by planning changes with a documented best approach mind set. Identify where changes can be complete with zero downtime to hosted services. Plan and implement changes with a cost effective resource strategy. Identify, understand and document change risks and mitigation tactics. Identify, understand and document impact of planned technology changes, including documentation expected output from verification. Document network estate for Operation Support and to support change planning Maintain infrastructure database Complete network diagrams to a high standard. Peer review and validation of technical deployment plans Provide constructive feedback to peers to support change control requirement and maintain high standards of detail and quality offered by CACI. Required Skills Good level of Cisco Routing & Switching Strong CCNP certification or equivalent experience Certified in Network Security Ability to handle numerous separate projects concurrently A very organised individual. Ability to work under pressure and to tight deadlines whilst maintaining attention to detail. Analyse, review and understand network topologies. Coordinate multiple projects, change management and governance efficiently working both independently and as a member of a team. Good understanding of networking principles, Good documentation skills using MS Office suite and Visio Good customer facing skills with the ability to keep the customer informed at all times and understand their requirements This role is suitable for a Network Engineer who has at least 5 years as a Senior Project Engineer in a professional environment. Desired Skills (not Essential) CheckPoint certification or equivalent experience Fortinet certification or equivalent experience Firewall Migration experience Proxy Experience (Mcafee) An inclusive and equitable environment enables us to draw on expertise and unique experiences and bring out the best in each other. We champion diversity, inclusion and wellbeing and we are supportive of Veterans and people from a military background. We believe that by embracing diverse experiences and backgrounds, we can collaborate to create better outcomes for our people, our customers and our society. Other details Pay Type Salary Apply Now Show more Show less

Posted 3 weeks ago

Apply

130.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Job Description Manager, Cybersecurity Engineering. The Opportunity Based in Hyderabad, join a global healthcare biopharma company and be part of a 130- year legacy of success backed by ethical integrity, forward momentum, and an inspiring mission to achieve new milestones in global healthcare. Be part of an organisation driven by digital technology and data-backed approaches that support a diversified portfolio of prescription medicines, vaccines, and animal health products. Drive innovation and execution excellence. Be a part of a team with passion for using data, analytics, and insights to drive decision-making, and which creates custom software, allowing us to tackle some of the world's greatest health threats. Our Technology Centers focus on creating a space where teams can come together to deliver business solutions that save and improve lives. An integral part of our company’s IT operating model, Tech Centers are globally distributed locations where each IT division has employees to enable our digital transformation journey and drive business outcomes. These locations, in addition to the other sites, are essential to supporting our business and strategy. A focused group of leaders in each Tech Center helps to ensure we can manage and improve each location, from investing in growth, success, and well-being of our people, to making sure colleagues from each IT division feel a sense of belonging to managing critical emergencies. And together, we must leverage the strength of our team to collaborate globally to optimize connections and share best practices across the Tech Centers. Role Overview We are looking for a self-motivated result focused Cybersecurity Engineer to become a part of our expanding team. This position will be a hybrid position located in Hyderabad, India. This role will focus on engineering, deployment, and support of endpoint security solutions. The successful candidate will work closely with global stakeholders to safeguard our company’s assets worldwide. The ideal applicant should possess at least 5 years of experience in cybersecurity, with a background in an engineering role within a global environment. What Will You Do In This Role Implement endpoint security solutions across Cloud, Enterprise, and Manufacturing IT / OT environments. Operate and maintain endpoint security controls, including installation, configuration, tuning, and ongoing maintenance. Research and assess new endpoint security technologies. Conduct user acceptance testing. Provide level 3 engineering support What Should You Have Basic understanding of the NIST & MiTRE Cybersecurity framework including Zero Trust. Strong analytical and problem-solving skills. Familiarity with developing endpoint security controls and security policies Experience with Windows Desktop/Server, MacOS and Linux operating systems. Solid collaboration skills, able to collaborate with colleagues in both domestic and international locations. Previous experience developing SDLC documentation and change control processes. Minimum 5 years’ experience working with Trellix/Mcafee suite including TIE server and Solid Core. Minimum 5 years’ experience working with Microsoft Defender (deployment and support) Minimum 3 years’ experience working with CrowdStrike. Experience 3- 7 yrs. Our technology teams operate as business partners, proposing ideas and innovative solutions that enable new organizational capabilities. We collaborate internationally to deliver services and solutions that help everyone be more productive and enable innovation. Who We Are We are known as Merck & Co., Inc., Rahway, New Jersey, USA in the United States and Canada and MSD everywhere else. For more than a century, we have been inventing for life, bringing forward medicines and vaccines for many of the world's most challenging diseases. Today, our company continues to be at the forefront of research to deliver innovative health solutions and advance the prevention and treatment of diseases that threaten people and animals around the world. What We Look For Imagine getting up in the morning for a job as important as helping to save and improve lives around the world. Here, you have that opportunity. You can put your empathy, creativity, digital mastery, or scientific genius to work in collaboration with a diverse group of colleagues who pursue and bring hope to countless people who are battling some of the most challenging diseases of our time. Our team is constantly evolving, so if you are among the intellectually curious, join us—and start making your impact today. #HYDIT2025 Current Employees apply HERE Current Contingent Workers apply HERE Search Firm Representatives Please Read Carefully Merck & Co., Inc., Rahway, NJ, USA, also known as Merck Sharp & Dohme LLC, Rahway, NJ, USA, does not accept unsolicited assistance from search firms for employment opportunities. All CVs / resumes submitted by search firms to any employee at our company without a valid written search agreement in place for this position will be deemed the sole property of our company. No fee will be paid in the event a candidate is hired by our company as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails. Employee Status Regular Relocation VISA Sponsorship Travel Requirements Flexible Work Arrangements Hybrid Shift Valid Driving License Hazardous Material(s) Job Posting End Date 05/21/2025 A job posting is effective until 11 59 59PM on the day BEFORE the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date. Requisition ID R342310 Show more Show less

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies