Home
Jobs

12 Proof Point Jobs

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

15.0 - 20.0 years

3 - 7 Lacs

Coimbatore

Work from Office

Naukri logo

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Data Loss Prevention (DLP) Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. A typical day involves collaborating with various teams to implement security measures, conducting assessments to identify vulnerabilities, and ensuring that all systems are fortified against potential cyber threats. You will also engage in continuous monitoring and improvement of security protocols to safeguard sensitive information and maintain compliance with industry standards. Roles & Responsibilities:- Expected to be an SME in DLP and Data masking solution implementation and support.- Collaborate and manage the team to perform.- Demonstrates excellent problem-solving skills and the ability to collaborate effectively with diverse stakeholders- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Conduct regular security assessments and audits to identify vulnerabilities and recommend improvements.- Develop and implement security policies and procedures to ensure compliance with industry standards. Professional & Technical Skills: - Must Have Skills: Proficiency in Proofpoint and Microsoft Purview Data Loss Prevention (DLP) tools, Varonis Data Discovery and Data masking.- Creation of DLP detection and prevention policies- DLP agents compliance and incident monitoring- DLP agent upgradation- Design and implementation of Data masking solution across enterprise-wide applications- Perform Sensitive Data Discovery and analysis across enterprise data repositories- Create Technical documentation and installation/administration manuals- Strong understanding of risk management and mitigation strategies.- Experience with security frameworks and compliance standards such as ISO 27001, NIST, or GDPR, HIPAA, HiTrust- Familiarity with incident response and threat intelligence processes.- Knowledge of network security protocols and technologies. Additional Information:- The candidate should have minimum 8 years of experience in Data Loss Prevention (DLP) and Data Discovery- Good to have experience in Health care industry - Certifications on Proofpoint, Varonis is preferred.- This position is based in Coimbatore.- Willing to work in US shifts including support in late IST hours. Willing to work in office adhering to current HR policies.- A 15 years full time education is required. Qualification 15 years full time education

Posted 7 hours ago

Apply

15.0 - 20.0 years

3 - 7 Lacs

Chennai

Work from Office

Naukri logo

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Data Loss Prevention (DLP) Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. A typical day involves collaborating with various teams to implement security measures, conducting assessments to identify vulnerabilities, and ensuring that all systems are fortified against potential cyber threats. You will also engage in continuous monitoring and improvement of security protocols to safeguard sensitive information and maintain compliance with industry standards. Roles & Responsibilities:- Expected to be an SME in DLP and Data masking solution implementation and support.- Collaborate and manage the team to perform.- Demonstrates excellent problem-solving skills and the ability to collaborate effectively with diverse stakeholders- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Conduct regular security assessments and audits to identify vulnerabilities and recommend improvements.- Develop and implement security policies and procedures to ensure compliance with industry standards. Professional & Technical Skills: - Must Have Skills: Proficiency in Proofpoint and Microsoft Purview Data Loss Prevention (DLP) tools, Varonis Data Discovery and Data masking.- Creation of DLP detection and prevention policies- DLP agents compliance and incident monitoring- DLP agent upgradation- Design and implementation of Data masking solution across enterprise-wide applications- Perform Sensitive Data Discovery and analysis across enterprise data repositories- Create Technical documentation and installation/administration manuals- Strong understanding of risk management and mitigation strategies.- Experience with security frameworks and compliance standards such as ISO 27001, NIST, or GDPR, HIPAA, HiTrust- Familiarity with incident response and threat intelligence processes.- Knowledge of network security protocols and technologies. Additional Information:- The candidate should have minimum 8 years of experience in Data Loss Prevention (DLP) and Data Discovery- Good to have experience in Health care industry - Certifications on Proofpoint, Varonis is preferred.- This position is based in Coimbatore.- Willing to work in US shifts including support in late IST hours. Willing to work in office adhering to current HR policies.- A 15 years full time education is required. Qualification 15 years full time education

Posted 7 hours ago

Apply

4.0 - 5.0 years

6 - 7 Lacs

Hyderabad

Work from Office

Naukri logo

Lead the management of major incidents in IT environments, ensuring swift resolution, effective communication, and detailed root cause analysis. Focus on OWA, M365, and troubleshooting strategies.

Posted 23 hours ago

Apply

5.0 - 10.0 years

15 - 25 Lacs

Hyderabad, Chennai

Hybrid

Naukri logo

JD 1. Hands-on experience on Insider Threat/Risk Tools like Microsoft Purview Insider Risk Management or its competitors (like Proofpoint Insider Threat Management, Splunk User Behavior Analytics, Securonix UEBA, QRadar User Behavior Analytics) 2. Experience in triaging Insider Threat/Risk alerts 3. Working in the Insider Threat team of the Security department. 4. Experience producing Insider Threat reports for C-level leaders. 5. Experience in setting up IRM policies and monitoring them. 6. Understanding of AI, Large Language models, prompt engineering is a plus.

Posted 4 days ago

Apply

7.0 - 12.0 years

14 - 18 Lacs

Noida, Pune, Bengaluru

Work from Office

Naukri logo

Role : Technical Services Engineer Expert(Email Security & Exchange Online) Exp :7+years Shift : 11:30 AM to 8:30 PM IST Mode : Hybrid Job Location : Bangalore, Chennai, Hyderabad, Noida, Pune Kindly upload your CV to complete your application process: https://www.jobs.global.fujitsu.com/job/Technical-Services-Engineer-Expert%28Email-Security-&-MS-Defender-for-O365-&-EXO%29/1763-en_US/ Job Description: Occupy at least 7+years of experience in Exchange Online & defender for O365. Must possess strong technical knowledge of Email security Have exposure on office 365 and Email security feature. Strong experience on Advanced Threat Protection as Spoofing, Phishing, Malware preventions. Strong understanding of email delivery architecture, email gateway and DNS technologies. Strong understanding of SMTP, Mail relay services. Experience with email security solutions in large, distributed environments. Experience working with email threat prevention platforms in complex email delivery systems. In depth knowledge of MX, DMARC, DKIM, and SPF is mandatory Strong knowledge on Cloud based Email Filtering Services. Basic Cloud architecture experience. In depth knowledge of email messaging systems system administration in email gateways. Real-time Malware detection, remediation, and quarantine. Accountable for setting a standardized framework (tags, policies, configuration settings, etc.) Basic knowledge on DNS reputation policy handling. Check for periodically reports & take necessary action. Inspection Email Header and configuration and troubleshooting. Configuring and creating workflows on email security Platform. Make this pointer wise.

Posted 3 weeks ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead for Proofpoint Implementation, you will spearhead the end-to-end delivery of Proofpoint solutions across enterprise environments. You will lead technical planning, solution design, and hands-on implementation of email security controls, ensuring seamless integration with client infrastructure. This role demands close collaboration with cross-functional teams and stakeholders to drive the successful execution of build-phase activities aligned with cybersecurity goals. Roles & Responsibilities:-Serve as the Subject Matter Expert (SME) for Proofpoint architecture and implementation.-Drive end-to-end delivery of Proofpoint deployment projects, from requirements gathering to go-live.-Collaborate with solution architects and engineering teams to define and validate implementation blueprints.-Lead design sessions and actively contribute to solution architecture decisions.-Ensure configurations align with security and compliance standards.-Guide and mentor junior engineers on deployment best practices.-Prepare implementation documents, HLD/LLDs, and provide input into transition plans for support handoff.-Track project milestones, identify risks, and implement mitigation strategies to meet delivery timelines. Professional & Technical Skills: -Experience in Proofpoint solution delivery.-Experience with modules such as TAP, TRAP, Email protection, and Threat Response is preferred. Additional Information:- The candidate should have minimum 7.5 years of experience- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 4 weeks ago

Apply

8.0 - 13.0 years

15 - 30 Lacs

Bengaluru

Work from Office

Naukri logo

Strong expertise in AWS Security Services, XDR, CrowdStrike, Zscaler, Proofpoint, Defender, WAF, API Security. Knowledge of network security, IAM, SIEM, & automation tools. Certifications as CISSP, CHFI, GCIH, AWS Security Specialty are preferred.

Posted 1 month ago

Apply

7.0 - 10.0 years

9 - 12 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Naukri logo

Req ID: 126276 Remote Position: Hybrid Region: Asia Country: India State/Province: Chennai City: Guindy, Chennai Summary Manages a team of resources focused on the design, delivery, support and optimization of Celestica's IT infrastructure, including network, computing, storage, telecommunication, and mobile devices The Manager, IT Infrastructure collaborates with business and IT partners to plan and deliver strategic projects, enhancement work and baseline requests according to established service levels, budgets, and compliance standards The Manager, IT Infrastructure has a solid understanding of the IT operations framework and solution lifecycle, and extensive hands-on experience with infrastructure technologies The Manager, IT Infrastructure also fosters a service management culture rooted in continuous improvement, and focuses on building organizational strength by leading change and leveraging Celestica's HR processes, Detailed Description Performs tasks such as, but not limited to, the following: Leading the change management activities within a structured process framework, Designing the strategic approach to managing change and support operations that fall within the domain of change management, Evaluating the change impact and organizational readiness to limit potential risk, Supporting training and communication as part of change management Activities may include designing or delivering specialized training resources to appropriate user base, Evaluating the risk of change and providing actionable guidelines on reducing the impact, Evaluating resistance in adopting the change at the user, process, and technology level, Managing the change portfolio, which allows the organization to prepare for and successfully adopt the change, Authorize minor change requests and coordinate with the Change Advisory Board for changes presenting higher risk, Conduct post-implementation reviews to assess the decisions and performance related to the change request, The change process owner can have overlapping responsibilities with the ITIL Process Owner, specifically within the function of change management The change process owner is responsible for defining and supporting the overall process involved in change management, Supporting the change manager in decisions for major changes, Evaluating Requests for Change (RFCs), the available resources, impact of change, and organizational readiness, Validating that appropriate tests and evaluation are performed before high-risk changes are approved, Documenting relevant processes and activities, Supporting the design of change implementation scheduling, Reviewing a change implementation process, Supporting the design and approving new change process models, Using the diverse knowledgebase, skills, and expertise of each CAB member to provide a unique perspective before a decision is finalized, Knowledge/Skills/Competencies ServiceNow platform experience with a focus on ITSM, ITAM and ITOM Specific experience evaluating, recommending and implementing infrastructure solutions, Knowledge of the following technologies with specific experience with at least one vendor under each domain: Compute (Cisco, Dell, HP, IBM including blade servers) Collaboration (Cisco, IBM, Microsoft), database (Oracle, SQL Server, DB2) III Data protection (CA Technologies Arcserve, IBM Tivoli Storage Manager NetApp Syncsort, Symantec Backup Exec & NetBackup) Mobile device management (Airwatch, BoxTone, Fiberlink MaaS360, Zenprise/XenMobile) Networking (Brocade, Cisco, Juniper, Palo Alto Networks, Proofpoint) VII Operating systems (Windows for desktops, Windows Server, HPUX, Linux) VIII Storage (EMC, Hitachi Data Systems, IBM, NetApp) Virtualization (Citrix, Microsoft Hyper-V, VMware) Experience evaluating or implementing public and private cloud solutions, Experience in scoping, planning and managing complex and concurrent technical activities supported by a strong understanding of IT project management, Experience with business requirements gathering and analysis, Understanding of information processing principles and practices, Experience with the Information Technology Infrastructure Library (ITIL) and IT Service Management ITIL Foundations v3 certification a plus, Physical Demands Duties of this position are performed in a normal office environment, Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data Repetitive manual movements (e-g , data entry, using a computer mouse, using a calculator, etc ) are frequently required, Typical Experience Eight Plus Years working in the IT industry, Typical Education Bachelors Degree in Computer Science, Information Technology, Engineering or Business Administration, ITIL Certification Personal Attributes Proven ability to translate business requirements into technical solutions, Strong analytical and problem-solving skills; resourceful and capable of working in the abstract, with the ability to understand multiple facets of complex technologies, Experience leading the deployment of complex solutions involving multiple vendor technologies, Effective facilitator of technical decisions; comfortable with working through ambiguous initiatives to develop effective solutions, Excellent written, presentation, and verbal communication skills with experience communicating complex, technical concepts to all levels, Solid relationship management skills interacting horizontally and vertically across organizations, Ability to effectively prioritize and execute tasks in high-pressure environment, Exceptional customer service orientation, Notes This job description is not intended to be an exhaustive list of all duties and responsibilities of the position Employees are held accountable for all duties of the job Job duties and the % of time identified for any function are subject to change at any time, Celestica is an equal opportunity employer All qualified applicants will receive consideration for employment and will not be discriminated against on any protected status (including race, religion, national origin, gender, sexual orientation, age, marital status, veteran or disability status or other characteristics protected by law), At Celestica we are committed to fostering an inclusive, accessible environment, where all employees and customers feel valued, respected and supported Special arrangements can be made for candidates who need it throughout the hiring process Please indicate your needs and we will work with you to meet them, Company Overview Celestica (NYSE, TSX: CLS) enables the worlds best brands Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers, Celestica would like to thank all applicants, however, only qualified applicants will be contacted, Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services,

Posted 1 month ago

Apply

3.0 - 7.0 years

2 - 6 Lacs

Bengaluru

Work from Office

Naukri logo

Drive projects and initiatives to improve and expand existing DLP platform capabilities. Implement and manage DLP solutions, including data labeling technologies. Work directly with stakeholders to define requirements and develop security solutions. Ensure the security of endpoint devices, including data protection and behavior analysis. Deploy and manage endpoint DLP solutions, such as those offered by Proofpoint. Manage email security policies and configurations, including DLP for email. Detect and prevent data loss through email channels, such as by identifying sensitive content and usebehavior. Gain deep knowledge of the Proofpoint platform, including its various modules (e.g., Endpoint DLP, Email DLP) Be proficient in using the Proofpoint console to manage alerts, investigate incidents, and analyze user behavior. Primary Skills DLP Endpoint Security Email Security Secondary Skills Data Labeling Behavior Analysis Incident Response

Posted 1 month ago

Apply

2 - 7 years

0 - 1 Lacs

Noida

Work from Office

Naukri logo

Role & responsibilities Mini. 2 years of experience implementation & operations. The resource should have implemented at least 4-5 projects in customer environment. Should be able to create HLD & LLD documents and should be able to draw architecture as per customer need Working Knowledge of SOC/ SIEM tools and operational understanding Must have lead team of Security Cons ultants/ Analysts Should have sound knowledge of products & should be able to carry out the POCs, Implementation and Operations support Should lead the delivery of multiple projects at customer locations Should have knowledge of following products (with Operations and Implementation) DLP/ Proxy Forcepoint, Symantec, Cisco, McAfee , Zscaler Email Security – Symantec, Forcepoint, Cisco NAC Solutions – Cisco ISE, Forcescout EDR/ XDR Solution – Trend Micro, Crowdstrike SOC SIEM Solution (Arcsight, Qradar, RSA or Seceon) ( Must have hands-on experience from any two of above) Excellent English communication skills mandatory Excellent documentation skills mandatory Understand reporting capabilities Preferred candidate profile Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host based firewalls, Anti-Malware, HIDS General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows NT Good to have industry certifications on SIEM Platform, CCNA, CEH, MCSE & Others Bachelor’s Degree in Computer Science or equivalent required 5-10 years’ experience in IT security Good communication skills Strong level of customer service required

Posted 1 month ago

Apply

4 - 8 years

7 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Job Summary We are seeking a skilled IT professional with hands-on experience in managing Google Workspace, securing email infrastructure, and handling endpoint/user device management. The ideal candidate will be responsible for ensuring smooth collaboration through Google Workspace, protecting email systems from threats, and maintaining secure and compliant end-user computing environments. Skill Set 4 - 8 years of experience in IT systems administration or similar role. Proven experience managing Google Workspace for a mid-to-large user base. Solid understanding of email security protocols (SPF, DKIM, DMARC). Experience with email security platforms and endpoint management tools. Strong troubleshooting skills and familiarity with ITIL-based service management. Excellent communication and documentation skills . Roles and Responsibilities Google Workspace Administration Manage user accounts, groups, and organizational units. Implement and maintain Google Workspace security and compliance settings (DLP, Vault, SSO, etc.). Automate routine administration tasks using GAM or Google Admin SDK. Email Security & Compliance Deploy and manage email security tools (e.g., Mimecast, Proofpoint, Google Advanced Protection). Monitor and respond to email-based threats such as phishing, spoofing, and malware. Define and enforce SPF, DKIM, DMARC policies. Collaborate with the InfoSec team for email compliance and retention policies. Endpoint/User Device Management Manage and monitor endpoints across operating systems (Windows, macOS, ChromeOS). Deploy and manage MDM/EMM solutions (e.g., Google Endpoint Management, Intune, Jamf). Enforce device compliance policies, encryption, and remote wipe capabilities. Provide Tier 2/3 support for device-related issues. Operational & Security Hygiene Maintain IT asset inventory and ensure timely patching and updates. Document system configurations, procedures, and support materials. Participate in incident response and root cause analysis for device and email-related incidents.

Posted 1 month ago

Apply

4 - 9 years

5 - 15 Lacs

Hyderabad, Pune

Work from Office

Naukri logo

Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response : Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation : Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis : Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography : Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security : Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting : Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance : Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs) : Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools : Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms : Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions : Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools : Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies