Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
7.0 - 12.0 years
12 - 17 Lacs
Coimbatore
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 4 weeks ago
1.0 - 3.0 years
4 - 7 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of the role is to resolve, maintain and manage clients software/ hardware/ network based on the service requests raised from the end-user as per the defined SLAs ensuring client satisfaction Do Ensure timely response of all the tickets raised by the client end user Service requests solutioning by maintaining quality parameters Act as a custodian of clients network/ server/ system/ storage/ platform/ infrastructure and other equipments to keep track of each of their proper functioning and upkeep Keep a check on the number of tickets raised (dial home/ email/ chat/ IMS), ensuring right solutioning as per the defined resolution timeframe Perform root cause analysis of the tickets raised and create an action plan to resolve the problem to ensure right client satisfaction Provide an acceptance and immediate resolution to the high priority tickets/ service Installing and configuring software/ hardware requirements based on service requests 100% adherence to timeliness as per the priority of each issue, to manage client expectations and ensure zero escalations Provide application/ user access as per client requirements and requests to ensure timely solutioning Track all the tickets from acceptance to resolution stage as per the resolution time defined by the customer Maintain timely backup of important data/ logs and management resources to ensure the solution is of acceptable quality to maintain client satisfaction Coordinate with on-site team for complex problem resolution and ensure timely client servicing Review the log which Chat BOTS gather and ensure all the service requests/ issues are resolved in a timely manner Deliver NoPerformance ParameterMeasure1.100% adherence to SLA/ timelines Multiple cases of red time Zero customer escalation Client appreciation emails Mandatory Skills: Network Data Admin. Experience1-3 Years.
Posted 4 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Cloud Security Posture Management. Experience8-10 Years.
Posted 4 weeks ago
4.0 - 9.0 years
4 - 8 Lacs
Pune
Work from Office
Role Purpose The purpose of the role is to resolve, maintain and manage clients software/ hardware/ network based on the service requests raised from the end-user as per the defined SLAs ensuring client satisfaction Do Ensure timely response of all the tickets raised by the client end user Service requests solutioning by maintaining quality parameters Act as a custodian of clients network/ server/ system/ storage/ platform/ infrastructure and other equipments to keep track of each of their proper functioning and upkeep Keep a check on the number of tickets raised (dial home/ email/ chat/ IMS), ensuring right solutioning as per the defined resolution timeframe Perform root cause analysis of the tickets raised and create an action plan to resolve the problem to ensure right client satisfaction Provide an acceptance and immediate resolution to the high priority tickets/ service Installing and configuring software/ hardware requirements based on service requests 100% adherence to timeliness as per the priority of each issue, to manage client expectations and ensure zero escalations Provide application/ user access as per client requirements and requests to ensure timely solutioning Track all the tickets from acceptance to resolution stage as per the resolution time defined by the customer Maintain timely backup of important data/ logs and management resources to ensure the solution is of acceptable quality to maintain client satisfaction Coordinate with on-site team for complex problem resolution and ensure timely client servicing Review the log which Chat BOTS gather and ensure all the service requests/ issues are resolved in a timely manner Deliver NoPerformance ParameterMeasure1.100% adherence to SLA/ timelines Multiple cases of red time Zero customer escalation Client appreciation emails Mandatory Skills: Network Data Admin.
Posted 4 weeks ago
3.0 - 5.0 years
4 - 8 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of the role is to resolve, maintain and manage clients software/ hardware/ network based on the service requests raised from the end-user as per the defined SLAs ensuring client satisfaction Responsibilities include: The NOC Tier 1 Specialist is responsible for the monitoring of the TELUS Mobility network, coast to coast on a 24x7x365 basis. The NMC Surveillance Specialist is responsible for the core telecommunications networkDMS, GTD-5, 5ESS Wireline switches, cell sites, trunks etc., and all the peripherals and data elements and their associated services. Quick reaction to network issues, attention to all details and the ability to take trouble shooting to a higher level are qualities that this position demands 1. Transport Surveillance L1 engineer. Transport Surveillance touches all desks in both wireline and wireless aspects.Devices NOC connects to perform SurveillancePreside, One Control, Blue Planet and DACsMonitorOptera Metro, DWDM, Long haul Optical, DACs, SONETs - OC3 to OC765 2. Access Network L1 engineer. Access SurveillanceMonitoring of last mile copper to remote based switches / Not part of the Switching desk for DMS, GTD-5 and 5ESSDevices NOC connects to perform SurveillancePreside, Tellabs, Timespan, Nortel DMS1u, LynchMonitorAccess Nodes, Landline Voice Services & Data, Optical Network Unit (ONUs), Radio Networks 3. RAN L1 engineer. RAN (WLS Radio Access Network) SurveillanceMonitoring of Equipment and Environmental alarms from the RAN, edge network including the following device types -3G-5G Macro BTSs (NodeB, eNodeB, gNodeB) and Spot coverage devices (Microcells, DRU - Remote Radios, Wireless Repeaters, Montreal STM) and Cell Site Routers, Wireless Microwave Backhaul and Mobility Core SBA/PBA alarms (Service / Performance based alarm Splunk ETC. Shift Timings: 12-Hour Shifts: 4:30 AM to 4:30 PM AND 4:30 PM to 4:30 A Rotation Schedule: Two-night shifts, followed by one day off, then two morning shifts, and three days off. This results in an average of 15 to 16 working days per month. Flexibility: Must be willing to work from the office if required. Leave Policy: No formal vacation policy due to 24x7 NOC operations. Employees must arrange shift swaps with team members to take time off. In case of emergencies during a shift, employees cannot leave until a backup is available. Deliver NoPerformance ParameterMeasure1.100% adherence to SLA/ timelines Multiple cases of red time Zero customer escalation Client appreciation emails Mandatory Skills: Network Data Admin. Experience3-5 Years.
Posted 4 weeks ago
1.0 - 3.0 years
4 - 7 Lacs
Mumbai
Work from Office
Role Purpose The purpose of the role is to resolve, maintain and manage clients software/ hardware/ network based on the service requests raised from the end-user as per the defined SLAs ensuring client satisfaction Do Ensure timely response of all the tickets raised by the client end user Service requests solutioning by maintaining quality parameters Act as a custodian of clients network/ server/ system/ storage/ platform/ infrastructure and other equipments to keep track of each of their proper functioning and upkeep Keep a check on the number of tickets raised (dial home/ email/ chat/ IMS), ensuring right solutioning as per the defined resolution timeframe Perform root cause analysis of the tickets raised and create an action plan to resolve the problem to ensure right client satisfaction Provide an acceptance and immediate resolution to the high priority tickets/ service Installing and configuring software/ hardware requirements based on service requests 100% adherence to timeliness as per the priority of each issue, to manage client expectations and ensure zero escalations Provide application/ user access as per client requirements and requests to ensure timely solutioning Track all the tickets from acceptance to resolution stage as per the resolution time defined by the customer Maintain timely backup of important data/ logs and management resources to ensure the solution is of acceptable quality to maintain client satisfaction Coordinate with on-site team for complex problem resolution and ensure timely client servicing Review the log which Chat BOTS gather and ensure all the service requests/ issues are resolved in a timely manner Deliver NoPerformance ParameterMeasure1.100% adherence to SLA/ timelines Multiple cases of red time Zero customer escalation Client appreciation emails Mandatory Skills: Network Data Admin. Experience1-3 Years.
Posted 4 weeks ago
10.0 - 15.0 years
13 - 18 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Security Information Event Management. Experience>10 YEARS.
Posted 4 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Business Continuity. Experience8-10 Years.
Posted 4 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Security Architecting. Experience8-10 Years.
Posted 4 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: SOC Analyst. Experience8-10 Years.
Posted 4 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.
Posted 4 weeks ago
10.0 - 15.0 years
13 - 18 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: IDAM Security Consulting. Experience>10 YEARS.
Posted 4 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: SailPoint Identity Now. Experience8-10 Years.
Posted 4 weeks ago
8.0 - 10.0 years
7 - 11 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to provide solutions and bridge the gap between technology and business know-how to deliver any client solution Do 1. Bridging the gap between project and support teams through techno-functional expertise For a new business implementation project, drive the end to end process from business requirement management to integration & configuration and production deployment Check the feasibility of the new change requirements and provide optimal solution to the client with clear timelines Provide techno-functional solution support for all the new business implementations while building the entire system from the scratch Support the solutioning team from architectural design, coding, testing and implementation Understand the functional design as well as technical design and architecture to be implemented on the ERP system Customize, extend, modify, localize or integrate to the existing product by virtue of coding, testing & production Implement the business processes, requirements and the underlying ERP technology to translate them into ERP solutions Write code as per the developmental standards to decide upon the implementation methodology Provide product support and maintenance to the clients for a specific ERP solution and resolve the day to day queries/ technical problems which may arise Create and deploy automation tools/ solutions to ensure process optimization and increase in efficiency Sink between technical and functional requirements of the project and provide solutioning/ advise to the client or internal teams accordingly Support on-site manager with the necessary details wrt any change and off-site support 2. Skill upgradation and competency building Clear wipro exams and internal certifications from time to time to upgrade the skills Attend trainings, seminars to sharpen the knowledge in functional/ technical domain Write papers, articles, case studies and publish them on the intranet Deliver No. Performance Parameter Measure 1. Contribution to customer projects Quality, SLA, ETA, no. of tickets resolved, problem solved, # of change requests implemented, zero customer escalation, CSAT 2. Automation Process optimization, reduction in process/ steps, reduction in no. of tickets raised 3. Skill upgradation # of trainings & certifications completed, # of papers, articles written in a quarter Mandatory Skills: Checkpoint Firewalls and VPN. Experience8-10 Years.
Posted 4 weeks ago
3.0 - 7.0 years
12 - 17 Lacs
Bengaluru
Work from Office
(Pyramid overview) Network Security Monitoring (NSM) Position About Network Security Monitoring: Target's Network Security Monitoring (NSM) team builds and maintains a fleet of over 2000 network sensors across the globe, providing network visibility and advanced monitoring capabilities to our Cyber Defense organization. We build scalable and maintainable infrastructure with full end-to-end ownership of both the hardware and software lifecycle. Our work enables timely detection and response of adversaries by delivering reliable network visibility through a resilient sensor grid and advanced monitoring capability. Team Overview NSM team members regularly: - Collaborate with Networking partners on network design and network sensor placement - Build, deploy, and upgrade network sensors (servers) globally - Design and implement network traffic analysis solutions using engines like Zeek and Suricata - Leverage Salt for configuration management, deployment automation, and infrastructure-as-code implementation - Partner with Cyber Defense to build network-based detections and consult in response scenarios - Develop performance monitoring solutions to track data quality and sensor health to ensure grid health and data fidelity Position Overview Expect to: - Configure, troubleshoot, and optimize network sensors across diverse environments - Debug complex networking issues and perform packet-level analysis to ensure proper traffic visibility. - Build and maintain Salt-based automation for configuration management and deployment. - Analyze monitoring data to identify system improvements and validate detection coverage. - Develop and automate testing to ensure results and outcomes are as expected. - Participate in on-call rotations to support the global sensor grid and respond to critical issues. - Collaborate cross-functionally with teams throughout Cyber Defense and IT - Document operational procedures for sensor management best practices - Research new network security monitoring technologies and evaluate their potential implementation. - Contribute to capacity planning and architectural design of monitoring infrastructure. - Manage and maintain Linux/Unix-based systems that host Zeek sensors, ensuring high availability, performance, and security. - Perform OS-level troubleshooting, patching, and hardening of sensor infrastructure. - Automate server provisioning and configuration using tools like Salt, shell scripting, and Python. - Monitor system logs and metrics to proactively identify and resolve issues affecting sensor performance. About you: - Bachelor's degree in Networking, Computer Science, or related field (or equivalent experience). - 4+ years of experience in network administration, network security, or related roles, with a deep knowledge of network protocols and packet analysis. - Experience with network security monitoring tools, including Zeek and Suricata. - Strong foundation in automation and infrastructure as code, Salt experience preferred. - You understand CI/CD principles and can implement pipelines for testing and deploying code and configuration changes. - Proficient in Linux/Unix systems administration, including shell scripting, system tuning, and troubleshooting. - Hands-on experience managing server infrastructure in production environments, including patching, upgrades, and performance tuning. - Practical experience with packet capture technologies and traffic analysis tools. - Proven ability to troubleshoot complex distributed systems and methodically diagnose network issues. - You appreciate the importance of dev/prod parity and can design for consistent environments across dev and prod. - Experience writing custom detection rules and understanding their performance implications. - Familiarity with technologies such as Zabbix, Prometheus, Nagios, Grafana, Elastic, Kibana
Posted 4 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: PKI - Certificate Management. Experience8-10 Years.
Posted 4 weeks ago
0.0 years
4 - 8 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
Brief Position Description: We are seeking for a highly skilled and experienced Senior System Engineer to join our team. The ideal candidate will be responsible for managing and resolving Level 2 and 3 support tickets, and managing as part of a larger global team: Microsoft Office 365, Azure and on-premise Active Directory environments. This role requires a proactive and solution-oriented individual with excellent technical and communication skills. Minimum Qualifications & Experience: Bachelor s degree in Computer Science, Information Technology, or a related field (or equivalent experience); Relevant certifications such as Microsoft Certified: Azure Administrator, Microsoft 365 Certified: Enterprise Administrator, or similar. Proven experience with Level 2 IT support, including troubleshooting hardware, software, and network issues. Proficiency in Microsoft 365 administration and deployments, including: Entra, Intune, Exchange Online, Teams, and SharePoint. Strong knowledge of Azure infrastructure and services, such as VMs, Azure AD, and Resource Groups. Understanding of Active Directory Hybrid sync to Microsoft 365 services. Hands-on experience in data centre management, including server hardware and virtualization technologies (e.g., VMware, Hyper-V). Understanding of network components including: firewalls, VPNs and routing. Solid understanding of network security components including: firewalls, VPNs, and reverse proxy products. Responsibilities: Support and Troubleshooting: Handle and resolve Level 2 and 3 technical support tickets, and project tasks ensuring timely issue resolution. Collaborate with Level 1 and Level 3 teams for complex escalations and root cause analysis. Provide guidance and mentorship to junior support staff. Microsoft Office 365 and Azure Administration: Manage, configure, and troubleshoot Office 365 applications, including Exchange, Teams, SharePoint, and OneDrive. Administer and optimize Azure resources, including virtual machines, storage, and networking. Management and troubleshooting of Microsoft Intune configuration policies and application deployment for Windows OS. Ensure compliance with security policies and implement best practices in the Office 365 and Azure environments. Data Center Management: Manage data centre operations, including servers, storage, and networking equipment. In conjunction with a global technology team Monitor and maintain the health, performance, and security of data centre infrastructure. Perform routine backups and patch management. Coordinate hardware installations, upgrades, and maintenance activities. Monitor, maintain and manage a global layer 2 and layer 3 network with heterogenous vendor equipment as part of a large support team across multiple locations. Understanding of VLANs, Routing and Multi site networking topologies. Familiarity with PKI authentication and Wireless Network authentication. Novotech is proud to offer a great workplace. We are committed to being an employer of choice for gender equality and providing an inclusive work environment where everyone is treated fairly and with respect. Our team members are passionate about what we do, but we understand work is only of the things that is important to them. We support our team members with flexible working options, paid parental leave for both parents, flexible leave entitlements, wellness programs and ongoing development programs. We are looking for people who are passionate about working clinical research and biotech, including people who identify as LGBTIQ+, have a disability or have caring responsibilities. We are a Circle Back Initiative Employer and commit to respond to every application. We look forward to contacting you regarding your application. Brief Position Description: We are seeking for a highly skilled and experienced Senior System Engineer to join our team. The ideal candidate will be responsible for managing and resolving Level 2 and 3 support tickets, and managing as part of a larger global team: Microsoft Office 365, Azure and on-premise Active Directory environments. This role requires a proactive and solution-oriented individual with excellent technical and communication skills. Minimum Qualifications & Experience: Bachelor s degree in Computer Science, Information Technology, or a related field (or equivalent experience); Relevant certifications such as Microsoft Certified: Azure Administrator, Microsoft 365 Certified: Enterprise Administrator, or similar. Proven experience with Level 2 IT support, including troubleshooting hardware, software, and network issues. Proficiency in Microsoft 365 administration and deployments, including: Entra, Intune, Exchange Online, Teams, and SharePoint. Strong knowledge of Azure infrastructure and services, such as VMs, Azure AD, and Resource Groups. Understanding of Active Directory Hybrid sync to Microsoft 365 services. Hands-on experience in data centre management, including server hardware and virtualization technologies (e.g., VMware, Hyper-V). Understanding of network components including: firewalls, VPNs and routing. Solid understanding of network security components including: firewalls, VPNs, and reverse proxy products. Responsibilities: Support and Troubleshooting: Handle and resolve Level 2 and 3 technical support tickets, and project tasks ensuring timely issue resolution. Collaborate with Level 1 and Level 3 teams for complex escalations and root cause analysis. Provide guidance and mentorship to junior support staff. Microsoft Office 365 and Azure Administration: Manage, configure, and troubleshoot Office 365 applications, including Exchange, Teams, SharePoint, and OneDrive. Administer and optimize Azure resources, including virtual machines, storage, and networking. Management and troubleshooting of Microsoft Intune configuration policies and application deployment for Windows OS. Ensure compliance with security policies and implement best practices in the Office 365 and Azure environments. Data Center Management: Manage data centre operations, including servers, storage, and networking equipment. In conjunction with a global technology team Monitor and maintain the health, performance, and security of data centre infrastructure. Perform routine backups and patch management. Coordinate hardware installations, upgrades, and maintenance activities. Monitor, maintain and manage a global layer 2 and layer 3 network with heterogenous vendor equipment as part of a large support team across multiple locations. Understanding of VLANs, Routing and Multi site networking topologies. Familiarity with PKI authentication and Wireless Network authentication. Novotech is proud to offer a great workplace. We are committed to being an employer of choice for gender equality and providing an inclusive work environment where everyone is treated fairly and with respect. Our team members are passionate about what we do, but we understand work is only of the things that is important to them. We support our team members with flexible working options, paid parental leave for both parents, flexible leave entitlements, wellness programs and ongoing development programs. We are looking for people who are passionate about working clinical research and biotech, including people who identify as LGBTIQ+, have a disability or have caring responsibilities. We are a Circle Back Initiative Employer and commit to respond to every application. We look forward to contacting you regarding your application.
Posted 4 weeks ago
3.0 - 8.0 years
20 - 25 Lacs
Mumbai
Work from Office
About Flexmoney: Flexmoney s mission is to Re-imagine Consumer Finance for the mobile-first digital consumer. Our omni-channel digital affordability platform enables merchants, brands and other partners to seamlessly embed contextual affordability options across all customer touchpoints and sales channels to drive the highest conversion and increase customer satisfaction and loyalty. We work with trusted lending partners (Banks, NBFCs, FinTechs) to develop and offer RBI-compliant, digital credit products embedded in consumer journeys. Flexmoney was instrumental in creating and establishing the Cardless EMI payment category enabling lenders to offer a fully-digital transacting EMI instrument to their users without the need for a credit card. Our market-leading Online Digital EMI platform powers affordability for over 68,000 online merchants (including direct integration with marquee merchants Flipkart , Amazon and MakeMyTrip ) across categories such as travel, insurance, home, fashion, sports, electronics, mobiles, health and wellness amongst others. We offer the largest supply of pre-approved digital EMI credit lines (64M+) helping drive best-in-class digital affordability coverage and conversion for our merchants and brand customers. To power the next phase of Flexmoney s growth we have expanded our platform capabilities dramatically. In addition to our market-leading Online Digital EMI platform, InstaCred TM 360, Flexmoney s NEW omni-channel Affordability Suite now enables sales associate-assisted affordability journeys across all channels - in-store, via tele-callers and also for face-to-face agent sales . The InstaCred TM 360 Affordability Suite will enable Flexmoney to deliver omni-channel affordability solutions to merchants for finance-led segments such as Edtech, Travel, Home, Insurance, Mobiles, Home, Health & Wellness etc Job Role: We are looking for smart, passionate, humble Engineer with an independent mindset to join our team and help build, improve & manage the network security infrastructure of the Organization Key Responsibilities: Own the end-to-end process of conducting security audits, obtaining and maintaining various certifications including PCI DSS, ISO 27001 etc. and report to internal board, external partners, and regulators Conduct regular security audits and assessments to identify gaps and provide recommendations for remediation Support the end-to-end client security audits conducted by external stakeholders Contribute to the development and implementation of security policies, procedures, and guidelines Work with internal teams to set up, manage, and operate security platform integrations across different systems and platforms Keep up-to-date with the latest security trends, threats, and vulnerabilities to identify potential security risks, propose measures and rollout to mitigate them Requirements & Qualifications: 3+ years of experience with enhancing the security of infrastructure, application and IT hardware, conducting security audits, and setting up internal processes Prior experience with cloud security and architecture across AWS, GCP or Azure Strong communication skills to effectively interact with technical and non-technical individuals internally as well as our external stakeholders Passion for learning and growing Ability to prioritize and independently manage multiple tasks independently
Posted 4 weeks ago
4.0 - 9.0 years
11 - 12 Lacs
Pune
Work from Office
Description & Requirements Job Description Introduction: A Career at HARMAN Digital Transformation Solutions (DTS) We re a global, multi-disciplinary team that s putting the innovative power of technology to work and transforming tomorrow. As a member of HARMAN Lifestyle, you connect consumers with the power of superior sound. Contribute your talents to high-end, esteemed brands like JBL, Mark Levinson, and Revel Unite your passion for audio innovation with high-tech product development Create pitch-perfect, cutting-edge technology that elevates the listening experience About the Role The person will be responsible for the end-to-end technical support for Network security. What You Will Do Expert-level technical support for network security products. Handling customer technical escalations. Troubleshooting, diagnosing, and resolving technical customer issues. Recreating, tracking, and verifying software defects in the field or under lab conditions reported by customers. Authoring technical knowledge base articles for other technical support personnel and/or customers and partners. What You Need to Be Successful Advanced Networking Skills - Detailed understanding of the protocols surrounding IP service provider networks. Strong network security skills required. Networking skills should include: a. TCP/IP fundamentals b. IP subnetting and supernetting and hierarchical routing principles c. Routing protocol operation (BGP) d. Routing policies at BGP peering points e. VPNs and the associated tunneling technologies (GRE/IP. L2TP, MPLS, etc.) f. Hands-on configuration and operational knowledge of Cisco and Juniper routers g. Hands-on Understanding and knowledge of Netflow, SNMP Security skills - DDOS, IPS, IDS, Threat detection and mitigation Operating systems - Basic to Intermediate knowledge of Linux Database: Basic to Intermediate knowledge of database - postgres, sqlite Good to have: Scripting - shell and/or high level languages (Python, Perl, Php) Bonus Points if You Have Bachelor s degree required. Customer focused candidate, strong attention to detail, ability to establish and maintain strong working relationships with key internal and customer personnel to work effectively. Outstanding customer service and advanced written and verbal communications skills. What Makes You Eligible Work Mode: Hybrid Work location: Bangalore. What We Offer Flexible work environment, allowing for full-time remote work globally for positions that can be performed outside a HARMAN or customer location Access to employee discounts on world-class Harman and Samsung products (JBL, HARMAN Kardon, AKG, etc.) Extensive training opportunities through our own HARMAN University Competitive wellness benefits Tuition reimbursement Be Brilliant employee recognition and rewards program An inclusive and diverse work environment that fosters and encourages professional and personal development You Belong Here About HARMAN: Where Innovation Unleashes Next-Level Technology Ever since the 1920s, we ve been amplifying the sense of sound. Today, that legacy endures, with integrated technology platforms that make the world smarter, safer, and more connected. Across automotive, lifestyle, and digital transformation solutions, we create innovative technologies that turn ordinary moments into extraordinary experiences. Our renowned automotive and lifestyle solutions can be found everywhere, from the music we play in our cars and homes to venues that feature today s most sought-after performers, while our digital transformation solutions serve humanity by addressing the world s ever-evolving needs and demands. Marketing our award-winning portfolio under 16 iconic brands, such as JBL, Mark Levinson, and Revel, we set ourselves apart by exceeding the highest engineering and design standards for our customers, our partners and each other. If you re ready to innovate and do work that makes a lasting impact, join our talent community today ! HARMAN is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or Protected Veterans status. HARMAN offers a great work environment, challenging career opportunities, professional training, and competitive compensation. ( www.harman.com ) Important Notice: Recruitment Scams Please be aware that HARMAN recruiters will always communicate with you from an @harman.com email address. We will never ask for payments, banking, credit card, personal financial information or access to your LinkedIn/email account during the screening, interview, or recruitment process. If you are asked for such information or receive communication from an email address not ending in @harman.com about a job with HARMAN, please cease communication immediately and report the incident to us through: harmancareers@harman.com.
Posted 4 weeks ago
3.0 - 5.0 years
20 - 25 Lacs
Bengaluru
Work from Office
Job Title: Software Development Engineer in Test - Mobile QA About Skyhigh Security: Skyhigh Security is a dynamic, fast-paced, cloud company that is a leader in the security industry. Our mission is to protect the world s data, and because of this, we live and breathe security. We value learning at our core, underpinned by openness and transparency. Skyhigh Security Is more than a company; here, when you invest your career with us, we commit to investing in you. We embrace a hybrid work model, creating the flexibility and freedom you need from your work environment to reach your potential. From our employee recognition program, to our Blast Talks learning series, and team celebrations (we love to have fun!), we strive to be an interactive and engaging place where you can be your authentic self. We are on these too! Follow us on LinkedIn and Twitter @SkyhighSecurity . Role Overview: SkyHigh is looking for SDETs who are self-driven and passionate to work on Mobile clients. The team is the ultimate quality gate before shipping to Customers. Tasks range from manual and, automated testing (including automation development), non-functional (performance, stress, soak), and much more. Work on cutting edge technology. About the Role: Build solutions to secure data in SAAS applications. Understands Android and iOS platforms. Expertise in app deployments and debugging Work with product managers to analyze the requirements, create standardized solutions across partners. Work with the Architect to create end-to-end cloud solutions, ensuring high scalability, availability, performance, and cost optimization. Estimate, prioritizing and planning project deliveries. Troubleshoot customer issues and work with appropriate development, product teams on issue resolution on an end-to-end basis. Passion to work with demanding customers Document, user stories/use cases, functional specification, and design About You: 3 to 5 years of experience as a Software QA and Automation Engineer. Plan, design, develop, verify, and maintain automated and manual test suites. Responsible for testing client products on Windows and Mac OS. preferred experience with testing on both iOS and Android platforms Reasonable security domain knowledge. Proficient in scripting, programming, and automation techniques. Strong scripting skills and expertise in UI automation. Proficiency in Python and Selenium. In-depth knowledge of APIs and their usage. Extensive experience in testing network security products, with hands-on experience in endpoint security products Understanding of network security as a domain. Familiarity with cyber security, threat actors, and the end-to-end threat lifecycle. Solid understanding of various testing tools, such as Wireshark. Ability to quickly learn new technologies and integrate them into the automation infrastructure. Company Benefits and Perks: We believe that the best solutions are developed by teams who embrace each others unique experiences, skills, and abilities. We work hard to create a dynamic workforce where we encourage everyone to bring their authentic selves to work every day. We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees. Retirement Plans Medical, Dental and Vision Coverage Paid Time Off Paid Parental Leave Support for Community Involvement Were serious ab out our commitment to a workplace where everyone can thrive and contribute to our industry-leading products and customer support, which is why we prohibit discrimination and harassment based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.
Posted 4 weeks ago
1.0 - 8.0 years
3 - 10 Lacs
Bengaluru
Work from Office
Required Skills Technology | Basic Networking Activities | Configuring and Managing TCP/IP Technology | Data Center Administration | Networking Technology | Telecom OSS / BSS | Network Monitoring Domain | Telecom / Communications Equipments (Others/Not classified) | Network Interface Devices Technology | Network Monitoring Tools | Eventlog Education Qualification : Any Graduate Certification Mandatory / Desirable : Technology | Networking Certifications | CCNA | CCNA Routing and Switching Troubleshooting: Analyze problems with the service and resolve the issues, gather information from customers either by chat or e-mail to enable effective troubleshooting, Troubleshoots and repairs hardware and software problems with desktop and laptop computers, Personal Digital Assistants (PDAs), printers, digital scanners, and other network equipment, Report issues to vendor/ISP/carrier and follow up on updates. Escalate issues as per Escalation Matrix, Install/Uninstall various software and upgrades equipment when necessary, Monitoring and maintaining/reducing the queue size. Resolving Technical issues at level 1(Incident and Service request) Hardware and Software Management: Monitoring CPU, memory and hard disk utilization, Monitoring the event viewer and generating reports. Providing New Desktop Installation and Software Installation Reports, make team members aware of any changes or scheduled activities so that effective follow up is possible., Updating the latest anti-virus on servers and monitoring the anti-virus patches on Servers and Desktops and generating Reports, Track the assets issued to users and maintain a database report of assets. Updating KB and CMDB whenever there is a need. Handling Backup Activities on daily, weekly and Monthly. Generating the Reports on all Backup activities. Process Compliance: Gather information from vendor and customer and update the tickets regularly as per the defined process, Prepare a detailed report on the plan of action for the existing tickets for the next shift andnbsp; engineer (Shift Handover Report), Following the various Escalation Matrix (Vendor , Internal and Customer defined), Ensure tickets are closed post user/customer communication, Maintains inventory of PC equipment with Asset Executive, Special focus on Power User calls, Constantly track tickets for SLA adherence and escalate on deviations as defined in the process, Comply with defined processes and update tickets with SLA.
Posted 4 weeks ago
4.0 - 8.0 years
8 - 9 Lacs
Pune
Work from Office
Required Skills Technology | Cisco R and S Network Administrator - Level 2 Support Technology | Nexus Switch Administrator - Level 2 Support Technology | ASA Firewall Administrator - Level 2 Support Technology | Cisco WLAN Administrator - Level 2 Support Education Qualification : B.Sc Certification Mandatory / Desirable : Technology | Administrative Level Certification - F5 Certified Technical Specilist / CCNP Security / CCNP Wirless / RCPE Professional-Level Certification in WAN Optimization / ZIA Prof / ZPA Prof / ACCP / CCNP Service Provider Delivery Skills: 1. Technology Management: Responsible for overall network technology management for the business. Responsible for planning and execution of new technology roll outs, scope expansion and readiness of team from technology standpoint. Manage SOPs, Knowledge documents, KB articles. Implement technical methodology improvement from past failures and learnings. 2. Restoration and Resolution: Identify the network issue based on troubleshooting and decide on the actions required to be implemented for resolving the issue. Refer to required KEDB or Knowledge bases for known issues/repetitive issues and resolution steps. Implement the resolution steps, execute, validate and update ticket with steps taken and outcome. 3. Triage: Once the resolution steps are completed if the issue is still not resolved or if it s an unknown issue and standard troubleshooting methods did not resolve the issue, escalate the ticket to L3 Network SME and support the troubleshooting process, if there is a bridge, continue on the bridge along with the SME. This support includes coordination with 3rd party network vendor technicians. 4. Process Compliance: - Gather information from vendor, customer, analysis from the troubleshooting/investigation, resolution steps implemented etc. and update the tickets regularly as per the defined process. - Prepare a detailed report on the plan of action for the existing tickets for the next shift engineer (Shift Handover Report) - Followthrough and execute the various Escalation Matrix (Vendor, Internal and Customer defined) - Ensure tickets are closed post user/customer communication - Maintain inventory of Network equipments and links - Constantly track tickets for SLA adherence and escalate on deviations as defined in the process
Posted 4 weeks ago
2.0 - 7.0 years
6 - 10 Lacs
Chennai
Work from Office
NTT DATA is looking for Security Specialist - Cloudflare to join our dynamic team and embark on a rewarding career journey Diagnosing and treating illnesses, medical conditions, and injuries. Ordering, performing, and interpreting diagnostic tests. Collecting, recording, and maintaining patients' information and histories. Prescribing and administering treatments, therapies, medications, vaccinations, and other specialized medical care. Explaining procedures and discussing test results or prescribed treatments with patients and family members. Monitoring patients' conditions and progress. Directing, coordinating, consulting with, and referring patients to nurses, students, assistants, specialists, therapists, and other medical staff. Advising patients, parents, and guardians on diets, activities, hygiene, and disease prevention. Conducting research and remaining up to date on current trends, discoveries, and developments in the field
Posted 4 weeks ago
10.0 - 15.0 years
5 - 8 Lacs
Mumbai
Work from Office
What is special about Lighthouse? Lighthouse is built on a foundation of unique, compassionate, highly driven individuals. We elevate the strengths and talents of those around us while leveraging opportunities for growth. We offer the experience of solving complex problems while continuing to grow multiple facets of your career. Lighthouse is where innovation meets support and where collaboration is the key ingredient to success. We grow together and are stronger together. What s unique about this role? This role is responsible for maintaining and developing optimum cloud network infrastructure that ensures stability, scale and performance. This will require working with tools such as Docker, Kubernetes and automating pipelines through Azure DevOps & Terraform. This role focuses on building and maintaining secure, scalable, and efficient cloud systems. The ideal candidate will have hands-on expertise in software development, infrastructure, automation and container orchestration. As a Senior Lead Cloud Engineer, you will design and implement solutions for complex, large-scale systems. You will collaborate across teams to deliver innovative, reliable cloud infrastructure while maintaining a strong focus on scalability, security, and cost efficiency. This role offers opportunities to lead technical initiatives and continuously enhance your expertise. This role will collaborate closely with development, IT, and operations teams to ensure seamless integration and scalability of systems, focusing on performance, security, and automation. What will this person do? Leadership & Strategy Provide technical leadership and mentorship to cloud networking engineers. Collaborate with architecture, security, and application teams to define network standards and best practices. Drive strategic decisions on network modernization, automation, and zero trust networking in Azure. Cloud Architecture & Implementation Design and implement scalable, secure, and highly available cloud infrastructure solutions using Microsoft Azure services. Define and evolve cloud reference architectures, best practices, and technical standards aligned with enterprise needs. Lead the architecture, deployment, and optimization of Azure-based network infrastructure, including VNETs, ExpressRoute, VPN Gateways, Azure Firewall, Application Gateway, Private Link, and Load Balancers. Design and enforce hub-and-spoke, virtual WAN, and multi-region topologies to ensure secure, scalable, and high-performing networks. Infrastructure as Code & Automation Develop and maintain Infrastructure as Code (IaC) using tools like Terraform, Bicep, or ARM templates. Automate provisioning, configuration, and deployment processes using Azure DevOps, GitHub Actions, or PowerShell. Implement and maintain CI/CD pipelines for infrastructure and application delivery. Security, Governance & Compliance Define and enforce Azure governance policies using Azure Policy, Management Groups, RBAC, and Blueprints. Ensure compliance with security and regulatory standards (e.g., ISO, SOC2, HIPAA, NIST) through policy-driven automation. Integrate Azure-native security tools such as Microsoft Defender for Cloud, Azure Key Vault. Enforce network security policies, data protection measures, and role-based access controls. Work closely with the Cloud Security team to implement Zero Trust principles, DDoS protection, and network threat detection. Ensure compliance with industry standards (e.g., ISO 27001, HIPAA, SOC 2) in network configurations and access. Operations & Monitoring Manage operational health, cost, and performance of Azure workloads using Azure Monitor, Log Analytics, and Application Insights. Optimize cloud spend and resource utilization with Azure Cost Management and reserved instances planning. Implement backup, disaster recovery, and high-availability solutions using Azure Site Recovery and Availability Zones/Sets. Bring your passion and together we will shine. It would also be great if you had the following: Bachelor of Science Degree in Computer Science or Engineering, or a related field. 10+ years of experience in cloud operations, cloud networking, cloud security, SRE or software development with a strong focus on automation and cloud infrastructure management. Azure certifications (e.g., Microsoft Certified: Azure DevOps Engineer Expert, Azure Solutions Architect). Experience in agile development environments and working with Cloud Governance, Monitoring, SRE (Site Reliability Engineering) practices. Strong understanding of cloud-native architecture and containerization (AKS, ACR, Helm). Proficient in scripting and automation using PowerShell, Bash, and Azure CLI. Experience with Azure Policy, Blueprints, and management groups for governance. Knowledge of Azure landing zone architecture and enterprise-scale design principles. Familiar with service mesh, API management, and event-driven architecture. Expertise in configuring and optimizing Azure Monitor, Log Analytics, and Application Insights for proactive alerting and observability. Experience integrating logs and metrics with centralized platform Strong knowledge of Azure security controls : NSGs, ASGs, DDoS protection, Sentinel, Defender for Cloud. Experience implementing RBAC , Azure AD Conditional Access , and Just-In-Time VM Access . Familiar with data encryption strategies (encryption at rest/in transit, Key Vault, customer-managed keys). Proven experience leading cross-functional teams and mentoring engineers. Strong stakeholder management and ability to translate technical needs to business value. Skilled in fostering a culture of automation, observability, and operational excellence. Critical thinker and problem-solving skills. Experience in mentoring team members Result Driven and Proactive Good time-management skills. Great interpersonal and communication skills. Azure Database Administrator Associate certification is a plus. eDiscovery and relativity experience are an added advantage Work Environment and Physical Demands Duties are performed in a typical office environment while at a desk or computer table. Duties require the ability to use a computer, communicate over the telephone, and read printed material, in a quiet and professional setting. Duties may require being on call periodically and working outside normal working hours (evenings and weekends). As required by applicable pay transparency laws, Lighthouse complies with compensation disclosure requirements for roles that may be hired in locations under these requirements. Factors that may be used to determine your actual salary may include a wide array of factors, including: your specific skills and experience, geographic location, or other relevant factors. The salary range for this position may be tailored to be lower or higher in different talent markets. This role will be eligible to participate in an annual bonus or incentive program. As a trailblazer and catalyst for change, Lighthouse rises to each opportunity to help our clients, and our people do what they do best shine. This position will work for and be employed by Lighthouses India subsidiary, which is an independent company located in India.
Posted 4 weeks ago
5.0 - 10.0 years
15 - 16 Lacs
Bengaluru
Work from Office
Req ID: 319114 NTT DATA strives to hire exceptional, innovative and passionate individuals who want to grow with us. If you want to be part of an inclusive, adaptable, and forward-thinking organization, apply now. We are currently seeking a PaloAltoNetwork Security Senior Specialist to join our team in Bangalore, Karn taka (IN-KA), India (IN). The Network Security advisor will engage in daily maintenance and operations of the Firewall, Prisma, Routing & Switching and AWS cloud Networking. The Network Security Advisor will work primarily with Network Security products from Palo Alto, The Network Security advisor would design, confirm, determine and/or troubleshoot traffic flows, security implementation and configurations etc. Network Security Services include daily maintenance and operations of multiple customers network security infrastructure. The successful candidate will be required to troubleshoot firewall and network traffic flows, as well as maintain accurate documentation of network and security products, support activities and processes. The candidate will also be required to work independently and remotely when troubleshooting and must have the ability to solve problems with minimal client input and ability to escalate when solution is not readily apparent. The Network Security Advisor would work on Requests, Changes, Incidents and Problem records to support our customers network security environment. Implement Network Security solutions and provide operational support in a customer environment. Support Palo Alto, Prisma SASE solution. Will provide technical escalation to L1 support engineers. Provide On-call support for high severity incidents in a 24x7 environment. Detect security issues, create customer tickets, and manage problems until closure. Ensure that Service Level Agreements and operational standards are met. Perform system maintenance, checkups and maintain current documentation. Provide resolution plans for device issues. Propose service, process, and technical improvements to management. Experience and at least 5 years Network Security administration experience. Excellent Time Management skills required to properly manage operations duties and other task that will assist in the optimization of the firewall team. Working with internal tools to complete configuration backup/restore as well as monitoring and reporting. Responsibilities included assisting in Daily Steady State operations in request and change management as well as weekly on-call rotation support. Complete Weekly/Monthly Health Status checks across all support network security platforms. Working with multiple customers support environment to complete upgrades, patches, overall operational support. Assist in conducting rule set reviews to improve overall security footprint for our customers. Provide operational support of the Network & Security environments. Detect security issues, create customer tickets and manage problems until closure. Ensure that Service Level Agreements and operational standards are met. Perform system maintenance, checkups and maintain current documentation. Provide resolution plans for device issues. Propose service, process and technical improvements to management. Minimum 8-9 overall years experience in Networking 5 years of Palo Alto, NGFW, SASE
Posted 4 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
31458 Jobs | Dublin
Wipro
16542 Jobs | Bengaluru
EY
10788 Jobs | London
Accenture in India
10711 Jobs | Dublin 2
Amazon
8660 Jobs | Seattle,WA
Uplers
8559 Jobs | Ahmedabad
IBM
7988 Jobs | Armonk
Oracle
7535 Jobs | Redwood City
Muthoot FinCorp (MFL)
6170 Jobs | New Delhi
Capgemini
6091 Jobs | Paris,France