Jobs
Interviews

2994 Network Security Jobs - Page 38

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

6.0 - 11.0 years

10 - 15 Lacs

Mumbai

Work from Office

Experience with Network Architecture Review and Firewall Rule-base Audit. Strong understanding of OWASP top 10 and SANS top 25 programming errors.Threat Hunting, attack identification, investigation, correlation and suggesting mitigation measures. Required Candidate profile Experience on Vulnerability Assessment and Penetration Testing for Infrastructure / network / web application / databases.Propose, plan, & execute Red Team operations based on threats to organization.

Posted 2 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Security Information Event Management. Experience:8-10 Years.

Posted 2 weeks ago

Apply

4.0 - 7.0 years

12 - 16 Lacs

Mumbai

Work from Office

Meet The team The Customer Success Specialist (CSS) role is a critical, strategic advisor and technical expert that engages with customers to accelerate their adoption of Cisco products & solutions, Help transform their business and drive business outcomes. The role resides within the Cisco Customer Experience (CX) organisation Your Impact CSSs are subject matter Experts in their aligned product or architecture. Combining deep technical knowledge with intuition for business, CSSs provide consultative solutions to help customers realise value faster. Mastery of relationship management, account handling, soft skills, and a keen understanding of the competitive landscape and how Cisco's solutions are differentiated in the market will be key to driving adoption and ensuring customers achieve accelerated business outcomes. The role will: Deliver Accelerators and ATX (Ask-the-Expert) sessions to a diverse set of customers, tailoring deliverables and producing quantifiable business outcomes with scope and timely engagement. Facilitate high impact, technology-specific workshops targeted at all levels of an organization to accelerate a business initiative, potentially in conjunction with the CXP/CXM/CSM/PSM roles. Leverage domain specialization and expertise to expertly identify and proactively manage risk areas and customer expectations that could impact successful delivery Contribute to product and offer improvement by providing lifecycle feedback to CX Product Management and CX Success Programs Teams Inspire customers to make tactical and strategic deployment decisions and track long term business outcomes Collaborate with Account teams, CS, Partners to improve customer adoption, address product concerns, and drive incremental growth Be responsible for evangelizing the end-to-end CX offer strategy and roadmap to sales specialists, delivery teams, and customers Drive adoption and expansion of Cisco products by highlighting feature opportunities, winning use cases, and relevant strategies to customers and the Success team Minimum Qualification 12+ years of experience in technical consulting or direct customer interfacing/engagement role with a deep understanding of industry standard processes related to one of the IT security domains Insights into how companies protect their assets and their businesses. This includes an understanding of technologies used to reach business outcomes and efficient ROI. Technologies like Firewalls, ISE, Umbrella, Duo, SNA, AMP4EP, ESA, CES, IPSs, Behavioral monitoring tools, EDRs, XDRs, Content Security tools. The objective is to assist the customer with barriers that they experience as they onboard and implement Cisco Security Solutions. Detailed understanding of the technical fundamentals of aligned technology/specialization areas and related best practices, and an ability to define and articulate how technology can be used to solve business challenges Preferred Qualification: Suggested Cisco technical Certifications: CCNP / CCIE or equivalent Suggested Cisco Success Management certifications: Cisco Certified Success Specialist CISM / CISSP or equivalent BS Engineering, Computer Science, Masters preferred

Posted 2 weeks ago

Apply

7.0 - 12.0 years

16 - 20 Lacs

Bengaluru

Work from Office

Meet the Team The Security Operations Center (SOC) Security Investigator is responsible for investigating and responding to security issues within customer environments. Cisco Managed Security Services is looking for a Security Investigator who can analyze security events generated from network analytics, endpoint protection, and other security suites to determine the severity and outcome of any threats detected. The Security Investigator will provide remediation actions to the client based on the impact of these threats up to and including taking proactive responses for high priority events. You must be able to accurately identify and prioritize events, translate technical solutions for an audience of varying technical knowledge, and make customer impacting recommendations with the goal of ensuring customer satisfaction. l> Your Impact Take ownership of and conduct in-depth investigations into security events Document security investigations in a clear and concise manner Ensure that incoming client requests are addressed and worked in a timely manner Assist clients to address security incidents in an expedited manner Proactively hunt for suspicious or malicious activity not detected via automated alerts Work as a member of a team to prioritize incoming automated security events based on the impact and urgency of the events Provide knowledge sharing with the rest of the team Utilize threat intelligence to enrich and qualify security events Maintain knowledge of new tactics, techniques and procedures (TTP) in customer verticals Identify processes and procedures that are candidates for automation Minimum Qualifications Relevant degree in a technical field (Computer Science / Computer Engineering / Cybersecurity / Computer Networking) or related discipline with 9+ years equivalent experience Familiarity with incident handling, incident response frameworks, guidelines, and best practices (NIST, ISO, etc.) Passion for IT Security and staying up-to-date with current TTP's Experience with threat intelligence and open source threat intelligence Knowledge of enterprise network and computer environments and the common protocols and applications in these environments Preferred Qualifications Suggested certifications (OSCP,Sec+, CCIE - Security , CySA+,CCNA CyberOps, GCIH, GCIA, GCFA, GCFE, CEH) Working knowledge of Splunk admin and play book tuning Familiarity with MITRE ATT&CK framework Experience with a scripting/automation language (Python, BASH)

Posted 2 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Hyderabad

Work from Office

The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: ForgeRock Identity Manager.: Experience: 8-10 Years.

Posted 2 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Network Detection and Response Vectra.: Experience: 8-10 Years.

Posted 2 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Security Information Event Management.: Experience: 8-10 Years.

Posted 2 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: PKI - Certificate Management.: Experience: 8-10 Years.

Posted 2 weeks ago

Apply

3.0 - 6.0 years

3 - 7 Lacs

Gurugram

Work from Office

This role involves the development and application of engineering practice and knowledge in designing, managing and improving the processes for Industrial operations, including procurement, supply chain and facilities engineering and maintenance of the facilities. Project and change management of industrial transformations are also included in this role. - Grade Specific Focus on Industrial Operations Engineering. Develops competency in own area of expertise. Shares expertise and provides guidance and support to others. Interprets clients needs. Completes own role independently or with minimum supervision. Identifies problems and relevant issues in straight forward situations and generates solutions. Contributes in teamwork and interacts with customers. Skills (competencies)

Posted 2 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: ForgeRock Identity Manager. Experience: 8-10 Years.

Posted 2 weeks ago

Apply

5.0 - 8.0 years

3 - 7 Lacs

Chennai

Work from Office

for Firewall Engineer ((FortiNet, Azure, & NSG's) Should be able to handle L1, L2 & L3 Level tickets per SLAs and act as first point escalation for all Firewall issues. Guarantee network security best practices are executed for firewall configurations, troubleshooting, and monitoring Modify Monitoring parameters if required Creation/Modification and deletion of Objects, Security Rules, Decryption policy and NAT rules Create, edit, modify based management security groups and troubleshooting referring VPC logs to locate any denial of access Work with customers to form and fix appropriate policy and signature rules. This comprises tuning and development of the creation of custom intrusion detection. Work under strict change control processes to ensure only authorized changes are made to devices. Plan and schedule Changes, Coordinating with different stakeholders Perform RCA for Major Incidents related to his / her tower Follow quality / security process defined for the engagement. Participate in business meetings with various stake holders on a need basis. Provide technical subject matter expertise wherever required. Take corrective actions based on the customer satisfaction surveys. Work on the service improvement programs. Training of new team members. Able to work on Knowledge acquisition and updates to related documents Mandatory Skills: Checkpoint Firewalls and VPN. Experience: 5-8 Years.

Posted 2 weeks ago

Apply

5.0 - 8.0 years

9 - 14 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of the role is to support process delivery by ensuring daily performance of the Production Specialists, resolve technical escalations and develop technical capability within the Production Specialists. Do Oversee and support process by reviewing daily transactions on performance parameters Review performance dashboard and the scores for the team Support the team in improving performance parameters by providing technical support and process guidance Record, track, and document all queries received, problem-solving steps taken and total successful and unsuccessful resolutions Ensure standard processes and procedures are followed to resolve all client queries Resolve client queries as per the SLAs defined in the contract Develop understanding of process/ product for the team members to facilitate better client interaction and troubleshooting Document and analyze call logs to spot most occurring trends to prevent future problems Identify red flags and escalate serious client issues to Team leader in cases of untimely resolution Ensure all product information and disclosures are given to clients before and after the call/email requests Avoids legal challenges by monitoring compliance with service agreements Handle technical escalations through effective diagnosis and troubleshooting of client queries Manage and resolve technical roadblocks/ escalations as per SLA and quality requirements If unable to resolve the issues, timely escalate the issues to TA & SES Provide product support and resolution to clients by performing a question diagnosis while guiding users through step-by-step solutions Troubleshoot all client queries in a user-friendly, courteous and professional manner Offer alternative solutions to clients (where appropriate) with the objective of retaining customers and clients business Organize ideas and effectively communicate oral messages appropriate to listeners and situations Follow up and make scheduled call backs to customers to record feedback and ensure compliance to contract SLAs Build people capability to ensure operational excellence and maintain superior customer service levels of the existing account/client Mentor and guide Production Specialists on improving technical knowledge Collate trainings to be conducted as triage to bridge the skill gaps identified through interviews with the Production Specialist Develop and conduct trainings (Triages) within products for production specialist as per target Inform client about the triages being conducted Undertake product trainings to stay current with product features, changes and updates Enroll in product specific and any other trainings per client requirements/recommendations Identify and document most common problems and recommend appropriate resolutions to the team Update job knowledge by participating in self learning opportunities and maintaining personal networks Mandatory Skills: Security Incident Response. Experience: 5-8 Years.

Posted 2 weeks ago

Apply

3.0 - 7.0 years

5 - 9 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Would you enjoy working with cutting-edge web security systems? Do you seek hands-on learning experiences on Web Security with a growing global team? Join our highly skilled Security Professional Services team Our Team provides managed services and proactive and reactive support to our global customers. We utilize tools, process and knowledge to integrate and maintain Akamai security solutions for our clients. We collaborate to solve problems, innovate to provide creative solutions and continuously improve for our customers Make an impact on the future of Internet Security Part of the Professional Services team, responsibilities include delivering, integrating, maintaining, and optimizing security solutions effectively. Collaborate with cross-functional teams to ensure outcomes meet quality standards. As a Security Architect II, you will be responsible for: Owning the technical aspects of integration (configuration, debugging, documentation, testing, go-live) of our Security Solutions Analyzing customer traffic as well as systems and customizing Akamai security solutions to answer customers security issues Managing and documenting technical issues, responses and requests to ensure information is recorded and updated Collaborating with cross-functional project team to scope, set timelines, create technical solutions, and support the ongoing implementation Participating in ongoing training initiatives to up-skill yourself and to train others. Do what you love To be successful in this role you will: Demonstrate 6+ experience in security technologies, processes, concepts, and formal education in computer science/engineering. Be well versed in internet fundamentals, DNS and routing, communication protocols such as HTTP or TCP Have experience as an Application Security Engineer or Network Security Engineer Be able to analyze customer traffic &systems and customize Akamai security solutions to answer customers security issues. Demonstrate the ability to work proactively, quickly, with a desire to learn and problem solving. Have knowledge of OWASP, network security products, network/application firewalls, server and client-side application architecture Demonstrate excellent communication and presentation skills to articulate highly technical information in a concise manner. Work in a way that works for you Learn what makes Akamai a great place to work Connect with us on social and see what life at Akamai is like! We power and protect life online, by solving the toughest challenges, together. At Akamai, were curious, innovative, collaborative and tenacious. We celebrate diversity of thought and we hold an unwavering belief that we can make a meaningful difference. Our teams use their global perspectives to put customers at the forefront of everything they do, so if you are people-centric, youll thrive here. Working for you At Akamai, we will provide you with opportunities to grow, flourish, and achieve great things. Our benefit options are designed to meet your individual needs for today and in the future. We provide benefits surrounding all aspects of your life: Your health Your finances Your family Your time at work Your time pursuing other endeavors Our benefit plan options are designed to meet your individual needs and budget, both today and in the future. About us Join us Are you seeking an opportunity to make a real difference in a company with a global reach and exciting services and clients? Come join us and grow with a team of people who will energize and inspire you!

Posted 2 weeks ago

Apply

10.0 - 15.0 years

35 - 40 Lacs

Coimbatore

Work from Office

Experience: 10-15 years As a Security Architect for an IIoT (Industrial Internet of Things) Platform initiative, your role would be to design and implement the security architecture for the IIoT platform. Here are some key responsibilities and skills you should have: Responsibilities: Develop and implement the security strategy for the IIOT platform. Identify and evaluate potential security risks and threats to the platform. Design and implement security controls to mitigate risks and threats. Ensure compliance with relevant security standards, regulations, and best practices Design Security Architecture for the Solution Conduct regular security assessments and audits of the platform. Work closely with other teams, such as development, operations, and compliance, to ensure the security of the platform. Stay up to date with the latest security trends, technologies, and threats. Build IoT & Cloud Security Practice Team, Frameworks, Standard Methodologies & Solutions that can be reused for multiple customers across industrial segments Skills: Strong knowledge of security principles and best practices, such as cryptography, network security, and secure coding. Experience in designing and implementing security controls for IIOT platforms. Strong knowledge on IT - OT Security Strong Knowledge on AWS, Azure, and other relevant cloud security services Knowledge of IIOT platforms, protocols, and technologies, such as MQTT, OPC UA, and REST APIs. Experience in conducting security assessments and audits. Strong communication and collaboration skills. Experience in working in agile environments. Familiarity with relevant security standards and regulations, such as NIST, ISO, and GDPR. Experience with cloud security and DevOps security. Overall, as a Security Architect for an IIoT platform initiative, you will play a critical role in ensuring the security of the platform and its connected devices. You will need to have a strong understanding of IIoT technologies, security principles, and best practices, as well as the ability to work closely with other teams and stakeholders to implement and maintain a secure platform.

Posted 2 weeks ago

Apply

8.0 - 13.0 years

4 - 45 Lacs

Chennai

Work from Office

Utilize Google Cloud Platform & Data Services to modernize legacy applications. Understand technical business requirements and define architecture solutions that align to Ford Motor & Credit Companies Patterns and Standards. Collaborate and work with global architecture teams to define analytics cloud platform strategy and build Cloud analytics solutions within enterprise data factory. Provide Architecture leadership in design & delivery of new Unified data platform on GCP. Understand complex data structures in analytics space as we'll as interfacing application systems. Develop and maintain conceptual, logical & physical data models. Design and guide Product teams on Subject Areas and Data Marts to deliver integrated data solutions. Leverage cloud AI/ML Platforms to deliver business and technical requirements. Provide architectural guidance for optimal solutions considering regional Regulatory needs. Provide architecture assessments on technical solutions and make recommendations that meet business needs and align with architectural governance and standard. Guide teams through the enterprise architecture processes and advise teams on cloud-based design, development, and data mesh architecture. Provide advisory and technical consulting across all initiatives including PoCs, product evaluations and recommendations, security, architecture assessments, integration considerations, etc Nice to Have Bachelor s degree in Computer science/engineering, Data science or related field. Strong leadership, communication, interpersonal, organizing, and problem-solving skills Good presentation skills with ability to communicate architectural proposals to diverse audiences (user groups, stakeholders, and senior management). Experience in Banking and Financial Regulatory Reporting space. Ability to work on multiple projects in a fast paced & dynamic environment. Exposure to multiple, diverse technologies, platforms, and processing environments. Required Skills and Selection Criteria: Google Professional Solution Architect certification. 8+ years of relevant work experience in analytics application and data architecture, with deep understanding of cloud hosting concepts and implementations. 5+ years experience in Data and Solution Architecture in analytics space. Solid knowledge of cloud data architecture, data modelling principles, and expertise in Data Modeling tools. Experience in migrating legacy analytics applications to Cloud platform and business adoption of these platforms to build insights and dashboards through deep knowledge of traditional and cloud Data Lake, Warehouse and Mart concepts. Good understanding of domain driven design and data mesh principles. Experience with designing, building, and deploying ML models to solve business challenges using Python/BQML/Vertex AI on GCP. Knowledge of enterprise frameworks and technologies. Strong in architecture design patterns, experience with secure interoperability standards and methods, architecture tolls and process. Deep understanding of traditional and cloud data warehouse environment, with hands on programming experience building data pipelines on cloud in a highly distributed and fault-tolerant manner. Experience using Dataflow, pub/sub, Kafka, Cloud run, cloud functions, Bigquery, Dataform, Dataplex , etc Strong understanding on DevOps principles and practices, including continuous integration and deployment (CI/CD), automated testing & deployment pipelines. Good understanding of cloud security best practices and be familiar with different security tools and techniques like Identity and Access Management (IAM), Encryption, Network Security, etc Strong understanding of microservices architecture.

Posted 2 weeks ago

Apply

15.0 - 20.0 years

40 - 45 Lacs

Hyderabad

Work from Office

Experienced and visionary Network Lead to lead our enterprise network function across trading floors, data centers, global Campuses, Branches and ATMs. This role combines deep technical expertise with strategic leadership. The ideal candidate will be responsible for delivering robust, secure, and scalable network solutions while overseeing people, processes, projects, and performance. You will mentor a highly skilled team, manage senior stakeholders, resolve escalations, and drive innovation through automation and process improvement ensuring the network infrastructure supports the availability, latency, and compliance standards critical to bank. This person will be working of Global International Network, Engineering team to drive SDWAN transformation project for bank and would be leading discussion across Telecom and Cyber platform as required. Overall 15+ years of experience in Network, Routing and Switching along with leading global teams. Technical and Project Oversight, Lead the planning, design, implementation, and lifecycle management of enterprise networks including: o Routing and Switching (Cisco Catalyst, SDA) o Data Center Networking (Nexus, VXLAN, VPC, ACI awareness) o SD-WAN (Cisco Viptela) Technical & Process Enhancement, Champion network automation using tools like Ansible, Python, Cisco DNA Center, APIs, etc Identify opportunities for process optimization, documentation improvement, and standardization (eg, templates, runbooks, playbooks). Determine business requirement and influence solution towards Infrastructure future state model Ensure compliance with ITIL processes, regulatory standards, FIM and internal controls. People Management & Mentorship Lead and develop a team of senior network engineers and project leads across global regions. Conduct performance management, career development planning, and succession preparation. Encourage a growth mindset, ongoing training, and certification for team members. Stakeholder Engagement & Escalation Handling, Act as the key point of contact for business-critical escalations impacting financial systems and trading environments. Interface with application teams, security, compliance, and executive stakeholders to align technology goals with business outcomes. Manage relationships and contracts with external vendors and telecom providers. The responsibilities entail areas such as creating knowledge base and provide relevant reports on regular intervals with business insights. Ensure service resilience, service sustainability and recovery time objectives are met for all the solutions delivered Engage with OEM like Cisco and drive continuous improvement, enhancements, Strategy and Roadmap for the NEC. Requirements Bachelor s degree in computer science or related field 15+ years of hands-on enterprise networking experience, with 3 5 years in a senior leadership/people management role. Background in financial services or regulated industries with an emphasis on low-latency, high-availability, and compliance-aware environments. Demonstrated success in managing large-scale infrastructure projects, network transformations, and hybrid environments. Strong organizational, communication, and negotiation skills with executive presence. Network technologies including SDWAN, WAN/LAN, Wi-FI, Firewall, Load balancer, Cloud, Automation (CI/CD) experience with Infrastructure as Code tools such as Terraform and Ansible Good to have Network Security Firewall, IDS/IPS, DDoS, Proxy, etc Network Tools like Monitoring (Links & devices), Device & Performance management, etc Should be we'll versed with Agile and DevOps. Worked in an infrastructure critical environment and understands how technology adds value to the business and ultimately the end customer Industry standard certifications in the technology area of work would be preferred (CCNP/CCIE)

Posted 2 weeks ago

Apply

10.0 - 15.0 years

16 - 20 Lacs

Bengaluru

Work from Office

About Client: At RemoteStar, we are hiring for one of our clients a privately held IT services and consulting company based in India. They specialize in cloud computing, DevOps, automation, artificial intelligence (AI), machine learning (ML), and digital transformation solutions. Experience: 10 to 15 Years Location - Noida/ Bangalore/Pune Skillset Network Security- (IDS,Firewalls (Palo Alto,Cisco),Web Proxy,IPSec VPN,DDoS protection (Wildfire, Cloudflare), WAF, Firewall Rule assurance - Skybox/Algosec) Vulnerability Management (Nessus, BigFix, Anti Virus,Anti Malware) SIEM - (Devo, Exabeam) Network/Security Forensics (PCAP, Packet Analysis, Wireshark, etc) Container security and Cloud security risk posture management (Prisma Cloud) AWS,Azure and GCP Native Security service awareness IAM Security ( Manage Engine, Azure AD, Key Vault Solution) Job Description Lead and manage the Hybrid Cloud security operations , providing guidance and direction to ensure operational excellence. Oversee security incident response and mitigation efforts, ensuring quick and efficient handling of security breaches or threats. Develop and implement comprehensive security strategies to safeguard all hybrid Cloud systems. Facilitate incident management processes for security-related issues, ensuring timely resolution and minimization of impact. Conduct regular security assessments and audits to identify vulnerabilities and implement corrective measures. Collaborate with stakeholders to develop security roadmaps and participate in daily standups to align security initiatives with organizational goals. Lead change management processes and ITSM, ensuring security protocols are integrated and adhered to. Foster a culture of continuous improvement in network security operations, including process creation and implementation. Demonstrate a deep understanding of security principles, particularly in isolating issues with machine/user validation. Experience in managing Business Continuity and Crisis management Ensuring the security of cloud-based data and applications against unauthorized access, theft, and other threats. Staying up-to-date on the latest cloud security technologies, trends, and best practices. A strong understanding of cloud computing technologies, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Knowledge of security frameworks such as ISO 27001, NIST Cybersecurity Framework, and CIS Controls. Familiarity with cloud security platforms like Microsoft Azure, Amazon Web Services, and Google Cloud Platform. Certifications such as Certified Cloud Security Professional (CCSP), Certified Information Systems Security Professional (CISSP), or Certified Cloud Architect (CCA) are preferred. Extensive knowledge and experience with developing Cloud Security Frameworks using industry best practices such as those from the Cloud Security Alliance (CSA) and NIST CSF and regulatory requirements such as HIPAA, HITrust and PCI or closely related. Understanding of industry regulatory and compliance requirements (ie, FedRAMP, PCI-DSS, NIST, HIPAA) and skilled at interpreting the compliance and security requirements into implementable and repeatable controls.

Posted 2 weeks ago

Apply

5.0 - 10.0 years

6 - 11 Lacs

Bengaluru

Work from Office

5+ years in network/security compliance roles Job Summary: We are seeking a highly experienced and detail-oriented Network Device Compliance Lead to develop, enforce, and maintain compliance and security standards across our network infrastructure. The ideal candidate will ensure that all network devices such as routers, switches, firewalls, and load balancers adhere to internal policies and external regulations including ISO 27001, NIST SP 800-53, PCI-DSS, HIPAA, and CISA directives. Key Responsibilities: Develop and maintain network compliance strategies aligned with regulatory standards and industry best practices Ensure secure baseline configurations for all network devices using CIS Benchmarks and custom hardening guidelines Manage vulnerability detection and remediation processes across the network environment using tools like Nessus or Qualys Oversee firmware and software patch management for all network hardware Monitor compliance using logging, SNMP, NetFlow, and integration with SIEM tools Maintain a real-time inventory of network assets including IPs, firmware versions, and configuration status Conduct regular audits and reviews of device configurations and access controls Work cross-functionally with security, IT, and compliance teams to address gaps and implement remediation plans Lead the preparation of compliance evidence and documentation for internal and external audits Ensure secure remote and local access to devices, using multi-factor authentication and encrypted protocols (SSH, HTTPS) Qualifications : Bachelor s or Master s degree in Information Technology, Cybersecurity, Computer Science, or related field Minimum of 5 years of hands-on experience managing network infrastructure and enforcing compliance requirements Strong understanding of regulatory frameworks: NIST, ISO 27001, PCI-DSS, HIPAA, and CISA guidance Proficiency in configuring and securing network devices from vendors such as Cisco, Fortinet, Palo Alto, or Juniper Experience with compliance tools and platforms (eg, Nipper, RANCID, NetBox, SIEM systems) Excellent documentation skills and experience producing audit-ready reports and configurations Ability to manage cross-team collaboration and influence technical and non-technical stakeholders Relevant certifications such as CCNP, CISA, CISSP, or CEH are strongly preferred

Posted 2 weeks ago

Apply

3.0 - 8.0 years

5 - 10 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Job : We are looking for a skilled Network Firewalls and Load Balancer Engineer with 3 + years experience. The ideal candidate will have extensive experience in managing and securing network infrastructure, with a focus on firewalls and load balancing technologies. Responsibilities: Design, implement, and manage firewall and load balancing solutions to ensure network security and optimal performance. Monitor network traffic and performance, identifying and mitigating potential threats and bottlenecks. Configure and maintain firewalls, including rule sets, VPNs, and security policies. Implement and manage load balancing solutions to distribute network traffic efficiently. Conduct regular security audits and vulnerability assessments, implementing corrective actions as needed. Collaborate with network engineers and other IT staff to develop and maintain network security protocols. Provide technical support and troubleshooting for firewall and load balancing issues. Stay updated with the latest security trends, technologies, and best practices. Document network configurations, changes, and incident response activities. Requirements: Bachelors degree in Computer Science, Information Technology, or a related field. Relevant certifications (e.g., CCNA, CCNP, CISSP, F5 Certified BIG-IP Administrator). Proven experience in network security, firewall management, and load balancing. Strong knowledge of network protocols, firewall technologies, VPNs, IDS/IPS, and load balancing solutions (e.g., F5, Citrix ADC). Excellent problem-solving and analytical skills. Ability to work independently and as part of a team.

Posted 2 weeks ago

Apply

5.0 - 7.0 years

7 - 9 Lacs

Bengaluru

Work from Office

oin Fortinet, a cybersecurity pioneer with over two decades of excellence, as we continue to shape the future of cybersecurity and redefine the intersection of networking and security. At Fortinet, our mission is to safeguard people, devices, and data everywhere. We are currently seeking a dynamic Technical Support Engineer to contribute to the success of our rapidly growing business. You would act as a Technical Support Engineer role to provide exceptional customer service for our loyal customers. The ideal candidate is energetic and passionate about working for Fortinet and supporting our customers while developing good and respected relationships with internal and external customers. This is a great opportunity to excel in an innovative, fast-paced environment while expanding your knowledge and developing your skills in network security. As a Technical Support Engineer, you will: To provide technical support via phone and web-based systems for customers based in SAARC, ME, and EMEA-based regions. Thorough analysis and investigation of customers reported problems and provide turnkey solutions through debugging, packet captures, and traffic flow analysis, which may also involve reproducing customers sophisticated network setup in the lab environment. Report and follow up with engineering and development to address and resolve product issues. Own and manage technical cases and recommend corrective actions based on troubleshooting and analysis. Running real-time phone or remote access sessions with customers. Develop core competency on Fortinet s product line and technologies. We Are Looking For: Network Security Expert (NSE7) or CCNA/CCNP certified. Good understanding of data networking protocols, specifically TCP/IP, routing, and switching fundamentals. Strong troubleshooting and problem-solving skills in various OSI layer protocols. Hands-on experience in IPsec, SSL, SD-WAN, authentication, WAF, VoIP, hardware redundancy, and dynamic routing protocols. Working knowledge of Linux OS, virtualization technologies, and cloud computing. Experience in Python or any similar language will be an added advantage. Exemplary skills in oral and written communication include the ability to speak clearly and persuasively, listen carefully to ensure a full understanding of the situation, and respond well to questions when dealing with both positive and negative situations. 4 or more years of experience in the computer networking or security industry. About Our Team: Join the TAC team, known for its collaborative ethos, working seamlessly with a variety of specialized groups to ensure a comprehensive and seamless technical support experience. Working with these diverse teams ensures a holistic approach to customer service, product quality, and technological innovation, leading to a robust support infrastructure and continuous improvement in technical support services and product offerings. Our team culture emphasizes collaboration, continuous improvement, customer-centricity, innovation, and accountability. By embedding these values into our ethos and culture, we create a dynamic and supportive environment that drives excellence and innovation while maintaining a strong focus on our customers needs and satisfaction. Why Join Us: We encourage candidates from all backgrounds and identities to apply. We offer a supportive work environment and a competitive Total Rewards package to support you with your overall health and financial well-being. Embark on a challenging, enjoyable, and rewarding career journey with Fortinet. Join us in bringing solutions that make a meaningful and lasting impact to our 660,000+ customers around the globe.

Posted 2 weeks ago

Apply

1.0 - 3.0 years

3 - 5 Lacs

Kolkata

Work from Office

Astfast Infotech Pvt. Ltd. is hiring Field Sales & Marketing Executives in Kolkata! We specialize in computer hardware, networking, CCTV, biometric systems, fire alarm solutions, and IT services. If you're passionate about sales, technology, and customer success, we want you on our team. Your Role: Field Visits & Client Engagement Lead Generation & Product Demonstration Achieve Sales Targets & Build Long-Term Relationships Requirements: Bachelor's Degree preferred 1-3 Years Field Sales Experience (IT, Networking, Security) Strong Communication & Negotiation Skills

Posted 2 weeks ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Key Responsibilities: Design, develop, and maintain Python-based applications, scripts, and tools to support automation and integration within our infrastructure. Implement and manage Kubernetes (K8s) clusters, including deployment, scaling, and troubleshooting. Collaborate with cross-functional teams to build and optimize CI/CD pipelines for seamless application deployment. Leverage DevOps best practices to improve efficiency, reduce manual interventions, and enhance system reliability. Automate infrastructure provisioning and management using infrastructure-as-code tools (e.g., Terraform, Ansible). Monitor and optimize performance and cost of Kubernetes clusters and cloud infrastructure. Develop and implement cloud-native solutions, utilizing containerization and orchestration technologies. Troubleshoot and resolve production issues across various environments, ensuring minimal downtime. Ensure security, compliance, and best practices are followed across the application lifecycle. Required Skills & Experience: 5+ years of experience in Python programming and developing scalable applications. 4+ years of experience with DevOps practices, including CI/CD, configuration management, and automation tools. Strong expertise in Kubernetes (K8s), including cluster setup, management, and troubleshooting. Experience with cloud platforms (AWS, Azure, Google Cloud) and related services. Proficient in containerization technologies (Docker). Familiarity with monitoring and logging tools (e.g., Prometheus, Grafana, ELK stack). Knowledge of Infrastructure as Code (IAC) tools like Terraform, Ansible, or CloudFormation. Strong understanding of networking, security, and distributed systems. Excellent problem-solving and troubleshooting skills in cloud and containerized environments. Strong communication and collaboration skills, with the ability to work in a fast-paced environment. Knowledge of databases and storage technologies (SQL/NoSQL). Preferred Skills: Experience with microservices architecture and service mesh technologies (e.g., Istio, Linkerd). Experience with Agile methodologies

Posted 2 weeks ago

Apply

1.0 - 4.0 years

3 - 6 Lacs

Mumbai

Work from Office

Any technical graduate/post graduate, BE, B-tech, BCA, MCA, Mtech etc. . Hands-on experience with DLP tools (e.g., Symantec DLP, Forcepoint DLP, Microsoft Purview, McAfee DLP, Digital Guardian, Netskope). Strong understanding of data classification, encryption, and regulatory compliance frameworks. Expertise in network security, endpoint security, and cloud security. Experience in SIEM integration, CASB solutions, and data discovery tools. Knowledge of incident response frameworks and forensic investigation techniques.

Posted 2 weeks ago

Apply

7.0 - 12.0 years

9 - 14 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Job : We are looking for a skilled Network Firewalls and Load Balancer Engineer with 7 + years experience. The ideal candidate will have extensive experience in managing and securing network infrastructure, with a focus on firewalls and load balancing technologies. Responsibilities: Design, implement, and manage firewall and load balancing solutions to ensure network security and optimal performance. Monitor network traffic and performance, identifying and mitigating potential threats and bottlenecks. Configure and maintain firewalls, including rule sets, VPNs, and security policies. Implement and manage load balancing solutions to distribute network traffic efficiently. Conduct regular security audits and vulnerability assessments, implementing corrective actions as needed. Collaborate with network engineers and other IT staff to develop and maintain network security protocols. Provide technical support and troubleshooting for firewall and load balancing issues. Stay updated with the latest security trends, technologies, and best practices. Document network configurations, changes, and incident response activities. Requirements: Bachelors degree in Computer Science, Information Technology, or a related field. Relevant certifications (e.g., CCNA, CCNP, CISSP, F5 Certified BIG-IP Administrator). Proven experience in network security, firewall management, and load balancing. Strong knowledge of network protocols, firewall technologies, VPNs, IDS/IPS, and load balancing solutions (e.g., F5, Citrix ADC). Excellent problem-solving and analytical skills. Ability to work independently and as part of a team.

Posted 2 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SailPoint Identity Mgmt and Governance. Experience: 8-10 Years.

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies