Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
12.0 - 17.0 years
37 - 45 Lacs
Mumbai
Work from Office
Industry: Big4 Consulting & Strategy IT IT Consulting Job Category: IT/ Technical Job Type: Full Time Job Location: Mumbai Cyber defense incident responder 12+ Years experience in Cyber Security Mumbai Role Summary As an Incident Responder, you will play a critical role in investigating computer-related crimes and cyber security incidents within the organization. Your responsibilities include validating incidents, identifying root causes, and containing and eradicating threats. You should be proficient in a wide range of computer investigation and forensic tools. With a background in engineering and a minimum of 12 years of experience in incident detection, response, remediation, and forensics, you should possess certifications such as SANS-GCIH, GCFA, or an Advanced Incident Responder certification. Job Duties Provide rapid initial response to IT security threats, incidents, or cyber-attacks within the organization. Support in the detection, response, mitigation, and reporting of cyber threats affecting organizational networks. Maintain up-to-date knowledge of current vulnerabilities, response strategies, and mitigation techniques used in cyber security operations. Analyze and report on cyber threats and assist in deterring, identifying, monitoring, investigating, and analyzing computer network intrusions. Additional duties may include providing intrusion support for high-technology investigations, including computer evidence seizure, computer forensic analysis, data recovery, and network assessments. Monitor network traffic for unusual activity or unauthorized access attempts to identify indicators of compromise and intrusion traits. Analyze malware, threat advisories, vendor security bulletins, and threat intelligence information to validate actionable intelligence. Conduct malware reverse engineering to identify indicators of compromise. Utilize tools such as Encase, FTK, and Cylance. Possess knowledge of infrastructure and network architecture security. Basic programming skills in languages such as Java, PHP, shell programming, and C. Hold relevant certifications, including CEH, CIH, and SANS Incident Response certifications. Requirements A degree in engineering with a minimum of 10 years of incident response and forensics experience. Familiarity with forensic and eDiscovery tools such as Relativity, Clearwell, NUIX, EnCase, Helix, and FTK. Practical experience in computer operating systems, including MS Windows, UNIX, and Linux. Strong analytical capabilities for identifying threats and vulnerabilities. Understanding of defense evasion techniques, malware defense evasion, and detection. Knowledge of core Windows processes. Proficiency in analyzing malware persistence and detecting malicious WMI event consumers. Strong problem-solving skills. Effective team player capable of working collaboratively. Ability to react quickly and efficiently under pressure. Excellent communication skills for regular reporting to management and stakeholders. Knowledge and understanding of network protocols, network devices, multiple operating systems, and secure architectures. Technical Incident Responder Certifications, such as GCIH, GCIA, GNFA. Apply for this position Full Name * Email * Phone * Cover Letter * Upload CV/Resume * Upload CV/Resume * Allowed Type(s): .pdf, .doc, .docx By using this form you agree with the storage and handling of your data by this website. *
Posted 4 days ago
4.0 - 9.0 years
5 - 11 Lacs
Mumbai, Thane, Mumbai (All Areas)
Work from Office
Role & responsibilities Identify potential customers in the Pharma /BFSI /Manufacturing/Healthcare other industries along with the OEMs and build strong relationships with key decision-makers in the OEM and customers. Conduct market research and analysis to identify new business opportunities and stay updated with industry trends and competitors and build repo with CISOs. Deliver product presentations and demonstrations to prospective clients, highlighting the features and benefits of our cybersecurity solutions. Collaborate with the marketing team to develop sales collateral, including presentations, case studies, and proposals as per joint go to strategy with the OEMs. Manage the complete sales cycle, from lead generation to deal closure, ensuring timely follow-ups and effective pipeline management along with the OEMs. Negotiate contracts and pricing agreements with customers, while ensuring profitability and customer satisfaction. Provide regular updates and interlock with the Account management and SE team of focused OEM along with the senior management team. Stay updated with the latest advancements in the cybersecurity industry and continuously enhance product knowledge along with key OEM certifications. Preferred candidate profile The candidate must have experience in "Cyber security Sales".
Posted 4 days ago
10.0 - 18.0 years
15 - 20 Lacs
Bengaluru
Work from Office
A minimum of 14 years of experience in Automotive industry (preferably in automotive S/W) Excellent working experience in designing and optimising various platforms such as QNX, Linux, Autosar End To end working experience in architecture, high level and low-level design of the platform features such as Memory management, Diagnostics, Calibration, Vehicle Config, Logging, Persistence, Software Download, Automotive Network comms, LifeCycle Management, Kernel driver integration, Cyber Security, platform configuration, SW bring up and optimization Experience in design patterns and knowledge on architectural patterns Experienced in programming languages such as C/C++. With strong coding skills Hands-on with tools such as DOORS, TRM, EA, MSOSA, DaVinci, PREEvision, MATLAB etc Experience in ASPICE compliance, FUSA etc Experience in integration of numerous features in a system. Experienced in defining processes for E2E software delivery Strong leadership skills to motivate the teams, work efficiently and deliver on time in a fast-paced work environment A thorough understanding of quality engineering methodologies and tools
Posted 4 days ago
10.0 - 15.0 years
25 - 35 Lacs
Mumbai, Gurugram, Bengaluru
Work from Office
Education - B.E./B.Tech/MCA in Computer Science Experience - Must have 10+ years Strong expertise in Backup and Storage Administration on cloud. Mandatory Skills/Knowledge - Design end-to-end storage, backup, and disaster recovery architectures across on-premises and Azure environments. Architect scalable, secure, and highly available Azure IaaS/PaaS storage solutions (Blob, Files, Disks, Archive). Define best practices, high-level and low-level designs (HLDs, LLDs), standards, and policies for storage and backup. Lead infrastructure and cloud migration projects involving storage/backup Define and enforce architectural standards, operational procedures, and automation-first principles Implement and manage automation around scaling, backups, disaster recovery, patching, and compliance. Serve as the highest-level technical escalation point (L4) for complex issues related to storage, backup, and Azure infrastructure. Lead troubleshooting and root cause analysis for critical incidents Mentor and support L1–L3 engineers; review technical designs and changes. Collaborate with application, cybersecurity, and cloud architects to align infrastructure with business requirements Evaluate new technologies and propose improvements to optimize cost and performance.
Posted 4 days ago
7.0 - 12.0 years
12 - 17 Lacs
Hyderabad
Work from Office
Job Statement: NopalCyber makes cybersecurity manageable, affordable, reliable, and powerful for companies that need to be resilient and compliant. Managed extended detection and response (MXDR), attack surface management (ASM), breach and attack simulation (BAS), and advisory services fortify your cybersecurity across both offense and defense. AI-driven intelligence in our Nopal360 platform, our NopalGo mobile app, and our proprietary Cyber Intelligence Quotient (CIQ) lets anyone quantify, track, and visualize their cybersecurity posture in real-time. Our service packages are tailored to client needs and budgets, with external threat analysis provided at no costdemocratizing access to enterprise-grade cybersecurity for all. We are looking for a high-energy, results-oriented GRC professional with 6 to 10 years of experience , combining expertise in IT and Governance, Risk, and Compliance (GRC) . The candidate will report directly to the CISO’s office and contribute to internal audits and projects executed under CISO’s instructions . Key Responsibilities: Serve as a subject matter expert on information and cybersecurity governance, risk, and compliance (GRC) services and solutions. Execute security assessments of on-premise/cloud IT environments aligned with business objectives and regulatory requirements. Conduct testing and validation of IT security controls, documenting findings and preparing detailed reports. Manage and perform internal audits as per the CISO’s directives , contributing to risk posture improvements and present the metrics to the CISO on a regular basis. Apply knowledge of the Digital Personal Data Protection Act, 2023 , and other global data protection laws. Utilize and manage GRC tools and platforms. Conduct security control assessments for web/mobile applications and enterprise systems. Drive third-party risk management and support client-facing initiatives. Deliver complex GRC projects in dynamic, fast-paced environments. Engage in knowledge-sharing forums to strengthen team capabilities. Continuously enhance the cybersecurity strategy based on evolving threats and technologies. Job Requirements: 1. Qualifications: Bachelor’s degree in Engineering or a related technology discipline. Mandatory Certification : Must possess CISA or ISO 27001 Lead Auditor certification. Additional certifications preferred: ISO 27001 Lead Implementer CISSP, CIPP, CCSK, or CCSP Public Cloud certifications (AWS, Azure, GCP) 2. Experience: 6 to 10 years of total experience with proven exposure to both IT and GRC functions . Experience in internal audits, consulting, and cybersecurity risk advisory. 3. Desired Skills: Deep understanding of information security principles and compliance frameworks. Strong understanding of the IT topology and application development principles Hands-on experience with security tools (e.g., vulnerability scanners, code review platforms). Strong exposure to IT/cybersecurity standards: ISO 27001/27005, NIST CSF, PCI DSS, SOC 1/2, GDPR, COBIT. Excellent communication skills, documentation abilities, and stakeholder engagement. Experience in program and project management within cybersecurity initiatives. 4. Personal Attributes: Self-starter with strong problem-solving skills. Highly motivated and able to work with minimal supervision. Strong prioritization and multitasking abilities under pressure.
Posted 4 days ago
6.0 - 10.0 years
15 - 25 Lacs
Gurugram
Work from Office
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you passionate about cybersecurity and looking for an exciting role where you can make a difference? If so, we have an opportunity for you! As a Security Specialist at Kyndryl, you will play a crucial role in enabling and securing our customer organizations, cultures, and ecosystems. Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and security awareness workshops. You will be tasked with configuring, monitoring, and managing the performance of networks to maintain the quality of services, while also protecting organizational infrastructure from malicious cyber-attacks. As a key member of our team, you will assess, predict, prevent, and manage the risk of IT infrastructure and data, helping our customers stay ahead of the curve and ensure their systems are secure. You will develop and implement security policies and procedures, working closely with other departments to ensure that all security measures are in place and operating effectively. But that is not all – at Kyndryl you will have the opportunity to explore innovation in CyberSecurity data science – taking information that has been gathered and looking for areas to have that “Ah Ha” moment. Drawing conclusions and patterns from the data across single and multiple clients. Creating new ideas in the area of risk management and risk quantification. In addition to your technical responsibilities, you will also play a key role in raising awareness of potential security threats through technical security training on best practices. This is an exciting opportunity to help shape the culture of our clients' organizations and make a tangible impact on their security posture. If you have a passion for cybersecurity – governance, risk and compliance, are looking for a challenging and dynamic role, and want to work with a team of like-minded individuals, then we want to hear from you! Join us as a Security Specialist and help us secure the future of our clients' organizations. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are Required Technical and Professional Experience 5+ years in IT security profile. Education : MCA / B.E. / B. Tech Project Experience : Minimum of 3+ years in security requirements, cyber security, IT security audits, certifications, etc., in at least 2 IT projects Certifications : ISO 27001 & CISSP (Certified Information Systems Security Professional) Responsibilities Facilitate review of the data security architecture as per the requirements. Facilitate review of the configuration of the required IT security infrastructure as per the law or as requested by the client against the acceptance criteria. Monitor activities related to periodic security testing/audits as per client requirements. Implement any new or existing guidelines/policies/acts issued by the Government of India on IT Security. Location : Requires working from Client location in Delhi Preferred Technical and Professional Experience CISSP (Certified Information Systems Security Professional) certification. ISO 27001 Certification. Other relevant certifications like CISM (Certified Information Security Manager) or CEH (Certified Ethical Hacker) can be beneficial. Excellent communication skills to effectively interact with stakeholders and educate employees on security best practices. Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted 4 days ago
3.0 - 5.0 years
5 - 10 Lacs
Bengaluru
Work from Office
Basic Qualifications: • Educational Background: o Bachelors or masters degree in Electronics, Computer Science, Cyber Security or a related field (or equivalent experience). • Experience: o 3+ years of experience in automotive embedded systems and communication protocols (CAN, LIN, Ethernet, etc.) Hands-on experience with cyber security testing, vulnerability assessment, penetration testing, and TARA (Threat Analysis and Risk Assessment). Familiarity with automotive security standards and regulations. • Technical Skills: Knowledge of CAN/LIN Communication Protocols and UDS Diagnostics Protocol. Knowledge of TARA Activities, Secure Boot, DM-Verity, Secure Storage, HARTOS, Kernel Hardening. Proficiency with security testing tools and scripting languages (Python, Bash, etc.). Experience with security testing tools (CANoe, Wireshark, Metasploit, Scapy). Knowledge of cryptographic methods used in automotive systems. o Proficient in Python scripting. Programming in CAPL scripting is a must. Experience using requirement management tools such as DOORS or DNG. • Methodologies and Standards: Familiar with Agile development methodologies and Test-Driven Development (TDD). Understanding of ISO/SAE 21434, UNECE WP.29, TARA, and other automotive cyber security standards. • Additional Skills: Knowledge of Machine Learning concepts is beneficial. o Strong problem-solving skills with a self-motivated and result-driven approach. • Communication Skills: \ Fluent in both written and spoken English, with the ability to effectively communicate complex technical issues. Preferred Qualifications: Leadership: Demonstrate character, clarity, courage, and commitment to high-performance o Build environment of trust, high performance, and engagement by establishing clear goals and a commitment to feedback, development, and recognition Change Orientation: Champion a better, faster, and simpler way of doing things. o Apply original thinking and continuous improvement to processes, products, systems, or services and manage change to better serve customer needs. Collaboration: Connect, engage, and communicate with others • Encourage open expression of ideas; communicate effectively at all levels and build strong relationships. Judgment: Make sound decisions • Demonstrate critical thinking to take appropriate risk and make sound and timely decisions. Results-Driven: Deliver extraordinary results. o Take initiative to achieve superior, quality results against internal or external standards of excellence. Eligibility Requirements: o Willingness to travel up to 20%. o Willingness to work in an office located in Bangalore, India.
Posted 4 days ago
0.0 - 4.0 years
2 - 6 Lacs
Madurai, Tiruchirapalli, Coimbatore
Work from Office
SOC Analyst / Security Engineer - Vacancies for FRESHERS (Level-1 / Those who completed the courses or learnt on their own) & EXPERIENCED (Level-1 & Level-2 / Those who have experienced in Cyber Security Domain only) SOC Analyst / Security Engineer who is familiar or interested to work with Windows, Linux, and cloud environments technical skills. Any courses/certification like CompTIA Security+, GSEC, EC-Council Certified SOC Analyst (CSA), Microsoft SC-200(Security Operations Analyst Associate), Cisco Cyber Ops Associate, Splunk Core Certified User / Analyst are preferable. Responsibilities Capable of understanding the training & Nature of works on Job Responsibilities. Monitor and assess alerts generated by security monitoring systems such as SIEMs and EDR platforms. Analyze logs, network activity, and endpoint behavior to detect suspicious or malicious activity. Execute initial incident triage and escalate complex threats to senior teams as needed. Collaborate with internal teams on containment, eradication, and recovery processes. Maintain detailed records of security events and actions taken in internal tracking systems. Continuously fine-tune detection rules and alert thresholds to improve incident accuracy. Stay informed on the latest tactics, techniques, and procedures (TTPs) used by threat actors. Support proactive initiatives like threat hunting and vulnerability assessments. Contribute to red/blue team simulations and post-incident reviews. Help develop and refine operational playbooks and standard response workflows. Capable for Rotational shifts (Morning / Forenoon / Evening / Night) as its 24 X 7 organization & Adoptable for the working environment & Night Shifts. Maintain the System Security, identify threats and install / configure Software. Solid grasp of network protocols, endpoint defenses, and common attack vectors. Familiar with one or more SIEM solutions (e.g., Splunk, Sentinel, QRadar). Comfortable navigating both Windows and Linux environment. knowledge of cloud platforms & Malware analysis is a plus. Understanding of TCP/IP, DNS, HTTP, and common attack vectors Understanding of cybersecurity frameworks such as MITRE ATT&CK or NIST. Strong Interpersonal and Oral/Non-Oral English Communication skills to Handle Chats & Mails if needed. 1 to 3 years of experience in a SOC or technical security role is an added advantage. To be Sincere and Honest towards the Job Responsibilities. Perks and Benefits Other Allowances Negotiable Based on Availability & Experience. For clarification Contact - HR +91 87543 01002 jobs@oryon.in
Posted 4 days ago
1.0 - 5.0 years
3 - 6 Lacs
Mumbai
Work from Office
About Sectona Sectona is a Privileged Access Management company that helps enterprises mitigate risk of targeted attacks to privileged accounts spread across data centers and cloud. It provides modern infrastructure access layer for new age workforce to build, confidently access and operate a faster, more secure technology environment. Sectona delivers a single stack integrated Security Platform which hosts multiple solutions, such as, Privilege Access Management (PAM), Privilege Access Governance (PAG), DevOps Secret Management (DSM) and Endpoint Privilege Management (EPM) for securing dynamic workforce access across on-premises or cloud workloads, endpoints and machine to machine communication. Sectona works with diverse set of customers from 25+ countries with focus on India, Middle East, Africa, South East Asia, Europe and UK. For more information, visit www.sectona.com and follow @sectona1 on X or @Sectona on LinkedIn What you will do for Sectona The Support Engineer is a seasoned professional who understands challenges faced by organizations in implementing security technologies in hybrid environments. You will be engaged in firsthand customer interactions to resolve customer issues. If you have technical depth and desire to work in dynamic and high growth environment, this role is for you. Provide well-thought out and reliable direction, both in technical and non-technical terms, to help customers integrate, deploy and maintain the Sectona products. Take end-to-end ownership of customer issues, including initial troubleshooting, identification of root cause and issue resolution. Meet or exceed customer expectations on response quality, timeliness of responses and overall customer experience. Serve as internal and external point of contact on customer issues and ensure they are resolved as expediently as possible. Collect information and document bugs with Engineering for product issues that are impacting customers. Provide feedback to the training and documentation organization so that common or emerging issues can be addressed before they become serious or widespread. Create process or troubleshooting documentation in the support knowledge base. Skills and Experience you require B.Sc (CS)/ B.Sc. (IT)/ IT Diploma • 3- 5 years experience of Support Engineering/ Customer Support/ Technical support/ System administration or related customer facing role. Freshers are encouraged to apply. Expertise in core Microsoft product stack, including Windows Server, Windows Workstation, Active Directory, DNS, DHCP, Group Policies and IIS. Experience with VMWare virtual environments, AWS Cloud Services or Microsoft Azure Platforms is preferred. Advanced troubleshooting & technical escalation management. Implement, Operate and provide L2 Support for PAM solutions. Demonstrate an understanding of risk management, security policies and controls, user account life-cycle management and role-based access. Ability to learn new technologies quickly. Excellent relationship management, customer service and communication skills in a variety of forms (written, live chat, conference calls, in-person.) Ability to work independently with little direct supervision and as a part of a team. Ability to remain calm, composed and articulate when dealing with tough customer situations. We will only be considering candidates based in Mumbai for this role.
Posted 4 days ago
6.0 - 10.0 years
22 - 30 Lacs
Hyderabad
Work from Office
This position is responsible for executing and troubleshooting test cases between lab systems, performing test-affected lookups, maintaining ancillary databases, and analyzing data impacts. This role requires advanced analytical skills and the ability to execute complex test plans. Duties and Responsibilities: Execute Secondary Interface and complex processing system test plans, including creating accessions, entering results, generating processing labels, reviewing results, and performing retesting. Perform test-affected analysis, document findings, and assess the impact of system changes. Conduct quality control reviews of database updates and ensure data integrity. Handle draw fee updates and modifications, including site-specific draw fee changes. Review and update SHLs (sample handling logic) in QTIM database. Manage eDBR cases and oversee database modifications in QTIM database. Perform Y-site updates and database maintenance in ancillary systems. Create interface test plans and oversee their execution. Review and process custom panel request, ensuring accuracy and compliance. Follow established processes and procedures to meet Service Level Agreements (SLAs) and Service Level Objectives (SLOs). Provide troubleshooting support for database-related issues. Ensure compliance with database policies, procedures, conventions, and guidelines. Perform additional database-related tasks as assigned.
Posted 4 days ago
8.0 - 13.0 years
0 - 0 Lacs
Noida, Greater Noida
Work from Office
Hiring for Semi Government Organization (MNC) Looking for Immediate Joiners or serving Notice period This role is a part of Tata Advanced Systems - Cyber Security Division, responsible for Solution Architect Role Supporting Sales & BD. The Enterprise Security Architect is responsible for managing, aiding and supporting Sales, Business Development and delivery teams in India by designing and positioning TASL Cyber Security solutions and its portfolio, as well as assisting in providing product/service and commercial overviews of TASL offerings The Enterprise Security Architect shall be supporting the development and answering solution designs and technical descriptions for RFIs & RFPs, drafting cost sheets and assists in closing deals with the Account Sales & BD teams Participate & also helps in co-ordinating demo / POCs Participate in architectural discussions to work through risk, security, and compliance concerns. Interlock with managed security services team to fully understand latest advancements, Managed Security Services operating models and value proposition As a SME, he/she will be accountable to lead and make security architecture decisions on all aspects of security solution presales, proposal design and integration with client ecosystems Attend training sessions, both in-house, vendor specific and external to broaden and master your skillset into advanced and emerging areas of cybersecurity like threat hunting, incident response, etc. An ideal candidate would be an ambitious and intuitive individual who can work under their own direction towards agreed targets/goals and with creative approach and managing time and change effectively about you Technical Competencies Required Preferred Network & Infra Security Solutions: Firewall / NIPS / Web Gateway /infra/ OT Security/ Web services Cyber Security Services Managed SOC, SIEM, SOAR Cyber Security testing – VAPT, Application Security Testing, offensive security, knowledge of a programming/scripting language Minimum 8-12 years of practical and proven experience within the information security field such as security solutions design, implementation and/or consulting. Proven experience building security reference architecture for enterprise deployments with strong understanding of infrastructure security architectures, solutions, processes, frameworks, and components Experience in writing proposals and scopes, responding to tenders/RFQ/RFP/RFI Good communication skills, both written and verbal Strong understanding of and ability to speak to security principles in areas such as network, systems, virtualization, cloud technologies, access control. Experience Preferred Minimum 8+ years of experience in a Security Solution Presales in a service provider background with hands-on solutioning and shaping Managed Services for clients CISSP/CCSP/CCSK/CISM/CEH certification or its equivalent is preferred Proven experience in creating solution prototypes, proof of concept and innovative solutions Experience in a customer-facing, sales-aligned role with track record of designing quality solution and presenting to customer stakeholders explaining the benefits and value of the solution. Experience in implementation of network and endpoint security solutions, developing security policies, and governance strategies Experience in Security Consulting with working knowledge of - ISO 27001:2013, - NIST Cybersecurity Framework. - Other industry standards such as SOC1/SOC2/ HIPAA, PCI DSS etc. Basic Requirement BE/B.Tceh BE/ Btech/ MBA with 6-9 yrs of experience Interested candidate can send mail @ tejasri.m@i-q.co
Posted 5 days ago
12.0 - 22.0 years
15 - 30 Lacs
Mumbai, Navi Mumbai
Work from Office
Role & responsibilities Position : Cloud Security Location : Belapur, Mumbai Experience : 12yrs+ Minimum 12 years experience in IT / IT Security / Information Security in Banking, Financial Services and Insurance (BFSI)/ Non-Banking Financial Company (NBFC)/ Payment industries/IT MNCs, out of which at least past 5 years should have been in Cloud deployments. Essential: Significant experience with deploying/ managing private and public cloud deployments, virtualized environment, and containerization platforms. Hands-on experience in deployment of cloud infrastructure and cloud security technology Should have experience with Azure / AWS / GCP/ VMware Cloud Foundation/ OCI Should have experience in Tanzu Kubernetes Grid/Openshift/OCI and Devsecops Experience in Inter-technology, Inter-OEM, inter-datacentre and inter-cloud integration from security perspective. Experience in Cloud Security Solutions Proficient with Cloud Security Solutions and Cloud Technologies including CASB/ CSPM/ CWPP/ CNAPP/ Micro segmentation/ Virtualization technologies/ containerization technologies. Thorough in concept of high availability Certifications: Any one of OEM certification – (VMware/Azure/GCP/AWS/OCI etc.). •(CCSP/CCSK/GCSA/CompTIA Cloud+/ VCAP etc.). Preferred Additional technical certification like CISA/CISM/CISSP/ GSEC/ CompTIA Security+/ SSCP Preferred candidate profile Encryption, hashing, basic networking protocols and their significance. Cloud deployment models and services . AWS/Azure security services and hands on implementation IaC ( Terraform) hands on experience.
Posted 5 days ago
4.0 - 9.0 years
20 - 25 Lacs
Noida
Work from Office
Location: Noida Experience: Minimum 4- 10 years Responsibilities: Assist in the implementation and maintenance of information security strategies, ensuring alignment with regulatory requirements, industry standards, and business goals. Support the development and enforcement of information security policies, procedures, and best practices to protect data integrity, confidentiality, and availability. Monitor security alerts, analyze potential threats, and assist in incident detection, response, and resolution to mitigate security risks. Conduct risk assessments and vulnerability scans to identify security weaknesses and assist in remediation efforts. Work closely with engineering and IT teams to embed security best practices across the software development lifecycle and cloud infrastructure. Assist in security audits, compliance checks, and regulatory reporting to ensure adherence to RBI guidelines, DPDP Act, ISO 27001, and Cert-IN regulations. Manage and configure security tools such as firewalls, IDS/IPS, SIEM, endpoint protection, and vulnerability scanners. Assist in access control management, ensuring appropriate permissions and role-based access policies are in place. Contribute to security awareness programs, helping employees understand cybersecurity threats and best practices. Stay updated on emerging security threats, attack vectors, and defensive technologies, recommending enhancements to security processes. Qualifications and Skills: Bachelors degree in Information Security, Computer Science, IT, or a related field. Minimum of 4 years of experience in information security, cybersecurity operations, or risk management. Hands-on experience with firewalls, IDS/IPS, SIEM tools, endpoint security, and vulnerability management. Strong understanding of network security, encryption, identity and access management (IAM), and cloud security (AWS, Azure, or GCP). Knowledge of security frameworks such as ISO 27001, NIST, CIS Controls, and RBI IT Guidelines. Exposure to penetration testing, security log analysis, incident response, and threat intelligence. Strong problem-solving, analytical, and communication skills. Relevant certifications preferred (CEH, Security+, CISSP (Associate), CISM). Ability to work in a fast-paced environment, collaborate with cross-functional teams, and maintain a security-first mindset.
Posted 5 days ago
3.0 - 6.0 years
8 - 12 Lacs
Chennai
Hybrid
Position Summary: The role will report into the Cyber Security Organization, the role will support key vulnerability management initiatives that will minimize security weaknesses in the environment by working with the Cybersecurity, IT Infrastructure, and Application teams to drive vulnerability remediation across RRD Globally. This is an excellent opportunity for an experienced Security Engineer to join our Growing Cyber Security team. The Security Vulnerability Management Engineer will work within a multi-national team comprised of both internal and external analysts. They will play a key role in ensuring the effectiveness of RRDs cyber security vulnerability Management program. The role will represent the Security Operation function within RRD Cyber Security and will champion best practices to both Cybersecurity and its business partners. The Security Engineer will support the security operations function continually improves, remains tuned to specific organizational threats, and operates an effective security toolset. Technology Specific Skills and Other Requirements for this role include: Bachelor degree in Computer Science, Information Systems or discipline related to functional work or role with 3 to 5 years of relevant work experience OR demonstrated ability to meet the job requirements through a comparable number of years of applicable work experience. We are looking for a highly motivated and talented analyst with a passion for Vulnerability Management. The ideal candidate will have experience supporting and managing vulnerability management activities in large enterprise environments. Need strong organization, coordination and negotiation skills to engage with other global and member firm teams. Sound knowledge of common infrastructure and web application vulnerabilities and common vulnerability categorizations such as CVE, CVSS, CWE Sound knowledge of common vulnerability identification & remediation tools, such as Rapid7/Nessus/ Qualys, Kali, Kenna, Tenable, RiskIQ, Microsoft SCCM and IBM BigFix/Tanium etc Secure DevOps experience would be a plus He or She should have a strong understanding of security operations concepts, vulnerability management and incident remediation within a complex global organization. Must have excellent communication skills; both verbal and written. Relevant Security certifications like CEH, CISSP etc ITIL foundation Certification and experience preferred Must have expert on OS knowledge on Windows, Linux and networking technologies Familiarity with Python or related programming language. Understanding of common security threats, attack vectors, vulnerabilities and exploits Expert level understanding of networking & Security concepts. Good Knowledge on AWS, Azure and other cloud Technologies. Highly self-motivated and directed; Strong organizational, oral communication and project management skills. Excellent attention to detail; Ability to effectively prioritize and execute tasks in a high-pressure environment; Experience in working in an onsite-offshore model. Knowledgeable in security concepts, techniques, tools, methods and practices Proven relationship management expertise with both business and technical personnel Ability to work well independently and in a team environment Ability to handle multiple tasks, prioritize and meet deadlines Must have flexibility and willingness to participate in the work processes of an international organization, including conference calls scheduled to accommodate global time zones.
Posted 5 days ago
2.0 - 6.0 years
5 - 9 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 5 days ago
5.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Role Overview We are seeking a highly skilled Cloud IAM (Entra/Azure) Senior Engineer to design, implement, and manage Identity and Access Management (IAM) solutions within Microsoft Entra ID (formerly Azure AD). The ideal candidate will have extensive experience in cloud IAM technologies, security best practices, and integration with enterprise applications. Key Responsibilities IAM Design & Implementation Architect, configure, and manage Microsoft Entra ID (Azure AD) for authentication, authorization, and identity governance. Implement Conditional Access Policies, MultiFactor Authentication (MFA), and Privileged Identity Management (PIM) to enhance security. Develop and enforce rolebased access control (RBAC) and least privilege principles for cloud and hybrid environments. Good to know, SSO (Single SignOn) integrations with SaaS, PaaS, and onprem applications using SAML, OAuth, and OpenID Connect. Security & Compliance Monitor IAM security posture, detect threats, and implement remediation strategies. Ensure IAM solutions comply with industry standards (ISO 27001, NIST, CIS Benchmarks, etc.). Conduct IAM audits, access reviews, and compliance reporting. Automation & Integration Develop PowerShell scripts, Azure Logic Apps, and APIs to automate IAM processes such as user provisioning, deprovisioning, and access management. Integrate IAM solutions with Microsoft Defender, Sentinel, and thirdparty security tools. Operations & Support Troubleshoot IAMrelated issues, provide L3 support, and collaborate with crossfunctional teams. Optimize IAM workflows to improve efficiency and security. Required Skills & Qualifications 5+ years of experience in Identity & Access Management, focusing on Microsoft Entra ID (Azure AD). Deep expertise in Azure IAM services, including Conditional Access, PIM, Identity Protection, and B2B/B2C authentication. Strong understanding of authentication protocols (SAML, OAuth, OpenID Connect, Kerberos, LDAP). Experience with PowerShell scripting for automation and IAM management. Handson experience integrating IAM with Microsoft 365, Azure, and hybrid Active Directory environments. Knowledge of Zero Trust principles and security frameworks (NIST, CIS, etc.). Familiarity with SIEM solutions (Microsoft Sentinel, Splunk, etc.) for identity threat detection. Preferred Qualifications Azure certifications (AZ500, SC300, MS102). Experience working in enterprise IAM projects and cloud migrations. Knowledge of thirdparty IAM solutions (SailPoint, Ping Identity). Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Microsoft Entra ID. Experience5-8 Years.
Posted 5 days ago
5.0 - 8.0 years
5 - 9 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: SAP Security. Experience5-8 Years.
Posted 5 days ago
5.0 - 8.0 years
5 - 9 Lacs
Mumbai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Active Directory. Experience5-8 Years.
Posted 5 days ago
5.0 - 7.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Job Summary Assist in implementing, maintaining and testing SOX controls supporting the Application Managers for custom applications and 3rd party Applications, support internal and external audits, and identify potential SOX compliance risks. Key Responsibilities: Pre-Implementation Quality CheckConduct a thorough review of controls design and implementation before product/functional go-live, based on evidence submitted by engineering and application management teams. SOX ITGC and Automated Controls EvaluationTest and evaluate the effectiveness of SOX IT General Controls (ITGC) and automated controls using audit checklists prepared by the Controls team to: Maintain SOX controls for internal and third-party products Support internal and external audits related to SOX compliance Control Testing DocumentationDocument control testing procedures and findings in a clear and concise manner. Control Deficiency Identification and ReportingIdentify and report any control deficiencies or weaknesses to ensure prompt remediation. SOX Compliance ReportingPrepare comprehensive reports and documentation for SOX compliance activities, including testing results and control evaluations. Cross-Functional CollaborationCollaborate with cross-functional teams to ensure the thoroughness and accuracy of controls implementation and testing. Educational Qualifications: Bachelor's degree in engineering, finance, or a related field CIA, CISA or CISSP certification Experience: 5-7 years of experience in SOX compliance testing, internal controls, or auditing Knowledge: Strong understanding of SOX regulations, internal controls, and accounting principles. Familiarity with auditing Oracle, Workday and/or Salesforce suite of applications. Skills: Strong analytical and problem-solving skills Excellent communication and interpersonal skills Ability to work independently and as part of a team CertificationCISA preferred Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: GRC Consulting. Experience5-8 Years.
Posted 5 days ago
8.0 - 12.0 years
14 - 24 Lacs
Bengaluru
Work from Office
Role & responsibilities Functional Validation Automation Cyber security Networking
Posted 5 days ago
15.0 - 20.0 years
30 - 35 Lacs
Mumbai
Work from Office
Reportsto GroupVP/ ChiefDeliveryOfficer, Dotted line to CSandSAVertical Heads ReBIT functions as a think tank for RBI for Information Technology and associated Security adoption for theplanning, executionand strategicroles of RBI in Central Banking. The Cyber Security (CS) Vertical provides the next Gen services and protection in CyberSecurity,Engineering and GovernanceforRBI. TheSystemAudit (SA) vertical is responsible forproviding technicalaudit supportto RBI ssupervision function. TheProject Management functionis responsible for building the platform, Enterprise applications and offer Enterprises services for various functions/ departmentofRBI. In order to offer relevant services and nextgeneration products and solutions in the areas of Cyber Security which are needed for CS and SA vertical core Research in various advancements in Cyber security is needed. Based on the varioustools,solutionsand applications need tobe developed whicharestateofthe art, proactive, smart and AI/ML enabled. The ESRD Business Unit is formed for this purpose and VP is responsible for spearheading this function, strategizing and execution of all functions in this Business Unit. The ESRD BU will have sub COEs of Security Research in multiple domain areas with association with CS/SA COEs and formulations of AI/ML models in association with Data Science COE. TheESRDBU also willhavea Core development teamfor developing and enhancing the solutions and products based on RBI Enterprise Platform. They will be augmented by various expert resources from various COEs/BUs of Project Management (PM) vertical. This role works closely with the teams of RBI in Department of Supervision (DOS), Department of Payment and Settlement Systems (DPSS), Department of IT (DIT) and Department of Risk Management as well as other Depts on a need basis. Mandatory qualifications Graduate degreein information systems,engineering, technology, computer science, or a related field. Masters degree in technology/management preferred Extensive experiencein technology function or in technology Research, Development. Relevant experience in financial services desirable. Strong understanding of application development, databases, networking, technology infrastructure and cyber security technologies. Handson experience in software development preferred Advanced knowledge of Technology Risk Management and cybersecurity Controls, including: Business Continuity Management Privacy and Data Protection Application Security (e.g., user entitlements, authentication, accountability) System Architecture and Design (e.g., availability, performance, scalability, data integrity) Technology Operations (e.g., change and release management, data backup and retention, capacity management) Technology Governance (e.g., technology risk management, metrics/ KRIs, cybersecurity rules and regulations) Interest in broad exposure in banking domain areas - banking operations, payment systems, investment management, sales, trading, operations, risk management, finance, legal, and compliance activities in the banking industry Proficient understanding of current regulatory and industry events Experience in Building solutions and products in Cyber security and AI/ML based Enterprise products Relevant professional certifications are a plus Research Papers, Patents will be definite advantage Desired Skills 22-24 Years of relevant industry experience, ofwhichatleast 5years asCTO/ Head of Engineering / Head of R&D. A history of proven delivery of results. Excellent communication (verbal, written, listening) and interpersonal skills Ability todevelopeffective working relationships with peersand stakeholders Should bea teamplayer with provenleadership qualities Intellectualand researchcuriosity andhealthy skepticism Abilityto synthesize and articulate complex ideas Critical thinking andproblem-solving abilities Strong project management, organizational, and presentation skills Commitmentandstrongwork ethic Domain IT/ITES, Banking captiveunits, Banking / financialservices , CyberSecurity Consulting/Auditing organizations Establishing ESRD asacore Business Unitwithin REBIT Gain respect within RBIand REBIT as Core and high performing Research unit and Building Cyber security-based solutions and Products for the functions of CS, SA and PM which will enable RBI for more effective Central Banking Building ahigh performing team, establishing processand delivery models Key Focus Areas will be NexGen Audit Toolsandapplications basedonAI/ML Modelling Autonomous and human-less/ agenticAI/MLmodels for Audit SIEM enhanced log analysis withML models ThreatHunting models / Proactive threat detections Enhancing threat attack detection with cyber kill chain patterns Critical infrastructure attack surface models NexGen Cybersecurity Mesh solutions and products Quantum based encryptions Data classification and privacy solutions Advanced endpoint/ perimeter security
Posted 5 days ago
0.0 - 1.0 years
6 - 10 Lacs
Mumbai
Work from Office
We are looking for candidates who have a zeal for technology and innovation. TheSelected candidates will be a part of any of the below Business Units. 1.Cyber Security Operations 2. CyberSecurity Engineering/ GRC EligibilityCriteria University degree in the field ofengineering and technology stream such as BE/ BTech/MTech/MSc/MCA preferablyspecialisation in Cyber Security, Computer Engineering, IT or EXTC Pass out: 2025 BatchONLY 10th & 12th 65 % & above Work Mode : Work From Office (5 Days) Experience/Knowledge: Fundamental knowledge in InformationTechnology Infra and Cyber Security Knowledge of Risk analysis , identification,resolution and management Awareness on Data security/privacy analysisand related practices Knowledge of Computer hardware / software /programming Networking and System/DatabaseAdministration knowledge Network Security Control knowledge asFirewall, Proxy, LB ,WAF etc. New Infra security project deploymentskills and excellent verbal and written communication skills Basic knowledge, VPN , VAPT , AD , SOC , DLP , Antivirus , Mail Gateway ,NAC etc Basic knowledge of Application & APISecurity best practices and standards including OWASP top 10, OSSTMM, SANS Top25, Attacks, Malware etc Basic knowledge about Information Security,network security, Data security, risk assessment and governance requirements. Understanding of secure coding practicesand application security Understanding of the IS and Cyber securityAudit Framework Excellent analytical skills Excellent English written and verbalcommunication. Good at public speaking and stakeholder management Responsibilities Cyber Security Operations Monitoring and protecting ITinfrastructure, edge devices, networks, and data. Responsible for preventing data breachesand monitoring and reacting to attacks. Supporting day-to-day support Tasks Cyber Security Engineering/GRC Basic documentation for Infra securityservices. Documentation of SOP, Product review. Perform Security configuration review &Hardening using CIS benchmarks. Define hardening documents for Firewalls,Load balancers, WAF, IPS/IDS, NTA etc Provide security compliance report tomanagement on periodic basis for Infrastructure landscape. Analysis and evaluation of openvulnerability within IT Infrastructure Responsible for deploying, tuning, andmaintaining security policies and enhancements on the web application firewall,Load balancer and infra devices.
Posted 5 days ago
8.0 - 15.0 years
11 - 15 Lacs
Mumbai
Work from Office
Education BE/BCA/B-TECH/Bsc.IT or any IT Graduate from authorised university Experience/ Qualifications Excellent written and verbal communication skills in English, high integrity, strong work ethic and ability to empathize with the customer. At least 8 - 15 years of Cyber Security experience with large organization, Bank, or global IT or consulting firm. Strong background of Application Security, Secure Software Development Lifecycle (SSDLC). Experience in Threat Modelling, Application Security Architecture Review, Security Testing- SCA, SAST, DAST. Exposure of security tools integration in DevOps architecture. Exposure of Microservices security and API security. Exposure implementation of evaluation and implementation of Application Security & Testing tools. Troubleshooting and problem-solving ability including analytical thinking and strong attention to details. Good understanding of Application Security Standards like OWASP, SANS, NIST etc. Good understanding of Security by Design and Privacy by Design. Good understanding of compliance requirements for payment and nonpayment applications. Product & platform security assessment exposure is desirable. Understanding of Load Balancer, WAF, CDN, API Gateway, Secrets Management etc. is desired. Exposure of cloud application (SaaS) security solutions is desirable. Good understanding of encryption tools and technologies; SSL, Keys Management, HSM and PKI infrastructure and secrets management. Ability to take assess solution and recommend proactive steps to mitigate Network, OS and Application Layer Security attacks. Subject Matter Expert for Application and Product Security. Understanding business requirements, complexity and solution architecture and estimate scope and effort of SSDLC and Cyber Security. Driving SSDLC for projects from initial stage to development and implementation. Planning, resource allocation and tracking of SSDLC service delivery. Conducting Threat Modelling, Application Architecture Review, SCA, SAST, DAST & IAST Implementation of SCA, SAST, DAST & IAST tools for application security testing. Continual learning and enhancement of skills and processes for service delivery. Provide advice on Secure coding best practices. Conduct Application Security related trainings for team and developers. Managing small team of Application Security & SSDLC. Provide inputs for product and platform security. Assess application, product and platform security as per scope of the engagement. Prepare application risk summary & register and trace for closure. Prepare weekly/monthly service delivery reports and review with BU Lead and VH.
Posted 5 days ago
9.0 - 14.0 years
20 - 32 Lacs
Pune
Hybrid
Cloud security management Implement & manage security controls for cloud platforms (e.g., AWS, Azure, Google Cloud) Ensure compliance Monitor security alerts and incidents Implement automation scripts (e.g Python, PowerShell) Up-to-date documentation Required Candidate profile Must have Proven experience in security operations, preferably in a multi-cloud environment (AWS, GCP, Azure Strong knowledge of security frameworks and tools & incident response & vulnerability Mgmt
Posted 5 days ago
4.0 - 9.0 years
8 - 17 Lacs
Bengaluru
Work from Office
Key Skills: Email Security, Cyber Security, SIEM. Roles and Responsibilities: Configure and fine-tune Proofpoint Email Security Gateway for optimal email filtering and threat detection. Design and implement Proofpoint policies to protect against spam, phishing, malware, and other email-based threats. Collaborate with the cybersecurity team to design secure email infrastructures. Assess and recommend improvements to current email security architecture. Monitor email traffic for malicious activity and potential security threats. Investigate and respond to email-related security incidents. Integrate Proofpoint with other security tools such as SIEM and identity management systems. Ensure seamless integration with the organization's email systems. Develop and maintain policies for data loss prevention (DLP) and encryption. Configure alerts and notifications for timely response to email threats. Generate and analyze reports on email security trends and threat activity. Provide technical support and troubleshoot Proofpoint-related issues. Work with support teams to resolve escalated security incidents. Document all configurations, processes, and response procedures. Keep documentation updated as changes are made. Train team members and end-users on Proofpoint and email security best practices. Stay updated with evolving email security threats and share knowledge internally. Experience Requirements: 4-10 years of experience in configuring and designing Proofpoint email security solutions. Strong understanding of email security principles and phishing prevention techniques. Familiarity with cybersecurity frameworks such as NIST, ISO 27001. Experience integrating Proofpoint with SIEM, IAM, and other security platforms. Experience in threat investigation and mitigation in email environments. Experience using Cofense for threat intelligence and phishing detection (preferred). Knowledge of scripting languages like Python for automation (preferred). Relevant certifications such as Proofpoint Certified Administrator (a plus). Education: Any Graduation.
Posted 5 days ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6464 Jobs | Ahmedabad
Amazon
6352 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane