Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
3 - 7 years
9 - 16 Lacs
Pune
Hybrid
Job Profile -Expert level technical support for network security product. -Handling customer technical escalations. -Troubleshooting, diagnosing and resolving technical customer issues. -Recreating, tracking, and verifying software defects in the field or under lab conditions reported by customers. -Authoring technical knowledge base articles for use by other technical support personnel and/or customers and partners. Skill sets desired Advanced Networking Skills - Detailed understanding of the protocols surrounding IP service provider networks. Strong network security skills required. Networking skills should include: a. TCP/IP fundamentals b. IP subnetting and supernetting and hierarchical routing principles c. Routing protocol operation (BGP) d. Routing policies at BGP peering points e. VPNs and the associated tunneling technologies (GRE/IP. L2TP, MPLS, etc.) f. Hands-on configuration and operational knowledge of Cisco and Juniper routers g. Hands-on Understanding and knowledge of Netflow, SNMP Security skills DDOS, IPS, IDS, Threat detection and mitigation Operating systems - Basic to Intermediate knowledge of Linux Database: Basic to Intermediate knowledge of database - postgres, sqlite Good to have: Scripting - shell and/or high level languages (Python, Perl, Php) Other: Customer focused candidate, strong attention to detail, ability to establish and maintain strong working relationships with key internal and customer personnel to work effectively. Outstanding customer service and advanced written and verbal communications skills.
Posted 1 month ago
2 - 5 years
4 - 7 Lacs
Hyderabad
Work from Office
At F5, we strive to bring a better digital world to life. Our teams empower organizations across the globe to create, secure, and run applications that enhance how we experience our evolving digital world. We are passionate about cybersecurity, from protecting consumers from fraud to enabling companies to focus on innovation. Everything we do centers around people. That means we obsess over how to make the lives of our customers, and their customers, better. And it means we prioritize a diverse F5 community where each individual can thrive. Role Overview: The Network Support Engineer II (NSE II) is an experienced technical support professional who provides remote assistance on F5 solutions to customers and partners. They manage multiple complex cases, analyze network environments, and apply sound judgment within defined procedures to resolve issues and ensure customer satisfaction. NSE IIs work independently, follow scheduled shifts, and use various troubleshooting tools. They maintain strong relationships with internal teams and external clients, communicate effectively, and take full ownership of cases until resolution. This role will be based in Hyderabad . Sounds interesting? Read on! What you will do: Demonstrates good judgement to select the best methods and techniques to provide a diverse scope of technical support (Level 1 to Level 3) to troubleshoot and resolve hardware and software issues on F5 product and services, based on data analysis of a complex set of customer specific factors. Proactively and effectively communicates status, plan-of-action, and resolution of issues based on an ISO Quality Management System defined set of procedures. Provides F5 customers and partners with a consistently high-quality support experience Participates in on-going training with F5 products and related technologies Maintains high schedule adherence (work hours and on-phone time) Effectively manages case escalations to tier 3 (Engineering Services) while maintaining customer communication, with limited assistance/mentoring from senior support personnel or management Manages multiple routine cases and prioritizes based upon customer and business needs Performs additional projects as required Responsible for upholding F5’s Business Code of Ethics and promptly reporting violations of the code or other company policies. What you will bring: 5 years experience in a professional technical support role or equivalent experience, working with relevant technologies Bachelors BA/BS, Honors, Graduate Certificate preferred. Certification to 201 level certification is expected to be achieved at NSE II level in their core module area of expertise. Level 301 certification is preferred but not expected. Excellent customer service skills together with experience supporting corporate customers and service providers in production environments. Key areas of knowledge – Protocols, Linux, Networking, Popular Public Cloud Vendors, containerization, Experience with AI technology. Thorough understanding and experience with HTTP and web applications and Hands-on technical experience preferred with inter-networking/data center operations. NetworkOSI Model, Network & routing protocols, WAN operations SecuritySSL, Cryptography, Firewall, VPN, DDoS & experience in network security exposure. Familiarity with Windows, MacOS, working knowledge of UNIX/Linux operating systems and commands Proficiency in cloud platforms such as AWS, Azure, or Google Cloud. Experience with containerization and orchestration technologies such as K8s and Docker. Experience with VMware, KVM or equivalent hypervisors. Experience with Salesforce service CRM system. API knowledge, Basic Programming/Scripting skills (Python, tcl, bash, JavaScript) Experience interacting with AI and prompting for questions. What You’ll Get: Hybrid working mode Career growth and development opportunities Recognitions and Rewards Employee Assistance Program Competitive pay, comprehensive benefits, and cool perks Culture of Giving Back Dynamic Diversity & Inclusion Interest Groups Apply if you believe your own unique capabilities can contribute to the success of this role and our organization! #LI-BH1 The About The Role is intended to be a general representation of the responsibilities and requirements of the job. However, the description may not be all-inclusive, and responsibilities and requirements are subject to change. Please note that F5 only contacts candidates through F5 email address (ending with @f5.com) or auto email notification from Workday (ending with f5.com or @myworkday.com ) . Equal Employment Opportunity It is the policy of F5 to provide equal employment opportunities to all employees and employment applicants without regard to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical, or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. This policy applies to all aspects of employment, including, but not limited to, hiring, job assignment, compensation, promotion, benefits, training, discipline, and termination. F5 offers a variety of reasonable accommodations for candidates . Requesting an accommodation is completely voluntary. F5 will assess the need for accommodations in the application process separately from those that may be needed to perform the job. Request by contacting accommodations@f5.com .
Posted 1 month ago
2 - 5 years
4 - 8 Lacs
Hyderabad
Work from Office
At F5, we strive to bring a better digital world to life. Our teams empower organizations across the globe to create, secure, and run applications that enhance how we experience our evolving digital world. We are passionate about cybersecurity, from protecting consumers from fraud to enabling companies to focus on innovation. Everything we do centers around people. That means we obsess over how to make the lives of our customers, and their customers, better. And it means we prioritize a diverse F5 community where each individual can thrive. F5 optimizes, secures, and manages applications across multi-cloud and on-premises environments, specializing in SaaS-based Distributed Cloud services. As a Technical Training Content Creator for web based technical knowledge, you will develop and curate engaging educational materials to enhance the skills of F5 Distributed Cloud users and partners. Your role involves creating comprehensive guides, tutorials, and videos that simplify complex concepts related to application optimization, security, and management across multi-cloud and on-premises environments. By collaborating with subject matter experts, you will ensure that the content is accurate, up-to-date, and aligned with F5s SaaS-based Distributed Cloud services. Qualifications Experience in creating online self-service technical training content for SaaS-based networking, application security, and application management services Proficiency in using online content development platforms to craft educational materials Knowledge of various learning management systems to deploy and manage training content Experience with GitLab for version control and collaboration in content creation Skilled in using multimedia tools to produce engaging images and videos that enhance technical explanations Familiarity with generative AI technologies for generating text, images, and videos to support content creation Strong understanding of services provided by F5 Distributed Cloud and related technical aspects Excellent written and verbal communication skills to convey complex technical information clearly Ability to work collaboratively with technical teams and subject matter experts Passion for continuous learning and staying updated with the latest trends in technology and training methodologies Familiar with application security, networking services and application management services technologies Additional desired experiences: CDN, WAF, Bot defense, DDoS, load balancers, multi-cloud networking, public cloud services, ZTNA, NGINX, distributed applications, kubernetes Responsibilities Develop and maintain high-quality, engaging, and interactive training content for F5’s web-based technical knowledge platform, focusing on services provided by F5 Distributed Cloud Create comprehensive training materials, including tutorials, guides, videos, and assessments, to help users effectively understand and utilize F5’s application optimization, security, and management solutions Collaborate with subject matter experts, product managers, and engineering teams to ensure accuracy and relevance of the training content Design and implement a structured learning path for different user levels, from beginners to advanced users, to facilitate a smooth onboarding and continuous learning experience Conduct regular reviews and updates of existing training content to reflect the latest product features, industry trends, and user feedback Utilize modern e-learning tools and technologies to enhance the user experience and engagement with the training content Track and analyze user engagement and learning outcomes to identify areas for improvement and optimize the training content accordingly Support the creation of certification programs and exams to validate users’ knowledge and skills in F5’s solutions Participate in the development of marketing materials and promotional content to increase awareness and adoption of the training platform Provide technical support and guidance to users, addressing their questions and concerns related to the training content and F5’s solutions The About The Role is intended to be a general representation of the responsibilities and requirements of the job. However, the description may not be all-inclusive, and responsibilities and requirements are subject to change. Please note that F5 only contacts candidates through F5 email address (ending with @f5.com) or auto email notification from Workday (ending with f5.com or @myworkday.com ) . Equal Employment Opportunity It is the policy of F5 to provide equal employment opportunities to all employees and employment applicants without regard to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical, or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. This policy applies to all aspects of employment, including, but not limited to, hiring, job assignment, compensation, promotion, benefits, training, discipline, and termination. F5 offers a variety of reasonable accommodations for candidates . Requesting an accommodation is completely voluntary. F5 will assess the need for accommodations in the application process separately from those that may be needed to perform the job. Request by contacting accommodations@f5.com.
Posted 1 month ago
5 - 10 years
15 - 20 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats. Do Design and develop enterprise cyber security strategy and architecture Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses Identify risks associated with business processes, operations, information security programs and technology projects Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge Identify security design gaps in existing and proposed architectures and recommend changes or enhancements Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. Provide support during technical deployment, configuration, integration and administration of security technologies Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity Provide solution of RFP’s received from clients and ensure overall design assurance Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture Depending on the client’s need with particular standards and technology stacks create complete RFPs Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps Evaluate and recommend solutions to integrate with overall technology ecosystem Tracks industry and application trends and relates these to planning current and future IT needs Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers Provide training to employees on issues such as spam and unwanted or malicious emails Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Program Manager/Director Regular reporting & updates Infrastructure (CIS team) For infrastructure support External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming security technologies (e.g. Firewalls, IPS, DDoS, SIEM, WAF, Endpoint etc.) and understanding of compliance regulatory requirement like PCI DSS, HIPAA, etc.- Expert Systems Thinking - Understanding of the Wipro system (interrelatedness, interdependencies and boundaries) and perform problem solving in a complex environment - Expert Leveraging Technology - In-depth knowledge of and mastery over ecosystem technology that commands expert authority respect - Master Technical Knowledge - Certified Information Systems Security Professional (CISSP), Cloud Architect Certification from AWS and Azure, ToGAF or SABSA certification- Master Competency Levels Foundation Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. Competent Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. Expert Applies the competency in all situations and is serves as a guide to others as well. Master Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. Behavioral Competencies Effective Communication Managing Complexity Client centricity Technology Acumen Innovation Problem Solving approach Collaborative Working Execution Excellence Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2. Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led
Posted 1 month ago
4 - 7 years
10 - 15 Lacs
Thane
Work from Office
Job Summary : The Cloud Network Security Administrator shall have strong technical knowledge of perimeter, networking and security practices of key public cloud offerings such as Microsoft Azure and Amazon Web Services to build and administer cloud infrastructure platform. The Cloud Network Security Admin is expected to individually solve problems of higher complexity. The Cloud Network Security Admin shall also participate in the development and enhancement of the information security solutions and to ensure it maintains relevancy with prevalent threats and industry changes. Work Location: Mumbai. Roles and Responsibilities : Must understand various types of attacks like Cross site scripting, SQL Injection, Cookie Poisoning, DDoS attacks, Web scraping, brute force, etc. Must define, administer and manage policies accordingly. Creates WAF rules/signatures to mitigate threats and implements best practices Creation and implementation of custom alerting dashboards in SIEM for investigations Works extensively with different stakeholders for tuning WAF policies or creating custom signatures Design and Develop Cloud-specific security policies, standards and procedures e.g. Identity and Access Management (SSO, SAML), and Privilege Access Management (PAM), Firewall management, SSL/IPSec, Encryption Key Management (BYOK), Security incident and event management (SIEM), Data protection (DLP, encryption), Vulnerability Management in partnership with Infrastructure Services, and Application Development. Orchestrate & Automate security control (guardrails) in Azure and AWS compute &/or Container services. Follows automate-first automate-everything philosophy with use of technologies like Terraform. Focus on Platform Governance & Security and automating operational tasks wherever possible. Requirements : Bachelor's Degree in Computer Science, Software Development or related field. Working knowledge of AWS WAF administration and management, associated policy management, Ingress Egress rules, VPC setup and administration. Must understand and have working knowledge of AWS Landing Zone and Control Tower. Experience with Container technologies (Docker, Kubernetes) Experience with Vulnerability Management and Privilege Account management Strong understanding of TCP/IP, web protocols and networking concepts Excellent understanding of OWASP Risks, Vulnerabilities and Mitigation Mechanisms Experience with Web Application Firewall management and rules Well versed in system exploits (e.g. Buffer Overflows, PTH attacks, windows authentication framework etc.) Excellent understanding of DDoS techniques and mitigation mechanisms Ability to manage and prioritize tasks efficiently Solid resource planning and problem-solving skills Readiness to demonstrate a proactive attitude Excellent verbal and written communication skills Technologies : AWS WAF, VPC, related.
Posted 2 months ago
8 - 13 years
12 - 20 Lacs
Chennai, Bengaluru, Hyderabad
Work from Office
About Client Hiring for One of Our Multinational Corporations! Job Title : Firewall Engineer Qualification : Any Graduate or Above Relevant Experience : 6 - 15 Must Have Skills : 1.Firewall 2.IDS/IPS 3.DDOS, 4.Checkpoint Firewall, 5.Palo Alto Firewall. Roles and Responsibilities : Expertise in upgrading and managing code, image, firmware, bootstrap programs, software and security patches for network security devices like Firewalls/IDS/IPS (Cisco/Palo Alto/Juniper/Forti Gate/Check points), DDOS (Arbor) deployed in on-premises, remote and third-party data centers. Demonstrated ability to replace obsolete hardware and virtual appliances through detailed planning, including pre-upgrade checks, backup strategies, testing procedures, and rollback plans for both physical and virtual components. Risk assessment and execution, ensuring compatibility and performance in production environments. Firewalls & IDS/IPS: Plan and implement the lifecycle replacement of end-of-support (EOS) and end-of-life (EOL) security appliance, optimizing infrastructure resilience. Analyze configuration compatibility between old and new firmware versions or hardware models, identifying and resolving conflicts to ensure seamless transition. Migrate and validate configurations, including NAT policies, VPN tunnels, IDS/IPS rules and multi-context setups, to new hardware or virtual appliances. Conduct rigorous pre-upgrade and post-upgrade testing, including failover scenarios and security rule verification, to ensure operational stability and policy consistency. DDOS Protection (Arbor Networks): Proficient in upgrading and replacing DDOS mitigation hardware and virtual appliances, such as Arbor Edge Defense (AED). Ability to analyze network flow, configure threshold policies, and test mitigation strategies to ensure uninterrupted services. Skilled in integrating DDOS Protection with upstream and downstream devices during replacement/ upgrades. Capability to implement and validate the configurations, Security policies and Application policies post-upgrade. Documentation and compliance - Define lifecycle management strategies for hardware and software. Maintain comprehensive documentation of upgrade activities, including change management logs and compliance reports. Ensure adherence to organizational security standards, change processes and industry best practices throughout the upgrade process. Good to Have: Knowledge on ansible/python (For automation and troubleshooting), cloud-native networking services and tools (AWS, AZURE). -- Thanks & Regards, Sridevi S Black and White Business Solutions Pvt. Ltd. Bangalore, Karnataka, India. Direct Number: 8067432433
Posted 2 months ago
8 - 10 years
27 - 32 Lacs
Mumbai
Work from Office
The Role Are you passionate about cybersecurity and looking for an exciting role where you can make a difference? If so, we have an opportunity for you! As a Security Specialist at Kyndryl, you will play a crucial role in enabling and securing our customer organizations, cultures, and ecosystems. Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and security awareness workshops. You will be tasked with configuring, monitoring, and managing the performance of networks to maintain the quality of services, while also protecting organizational infrastructure from malicious cyber-attacks. As a key member of our team, you will assess, predict, prevent, and manage the risk of IT infrastructure and data, helping our customers stay ahead of the curve and ensure their systems are secure. You will develop and implement security policies and procedures, working closely with other departments to ensure that all security measures are in place and operating effectively. But that is not all at Kyndryl you will have the opportunity to explore innovation in CyberSecurity data science taking information that has been gathered and looking for areas to have that Ah Ha moment. Drawing conclusions and patterns from the data across single and multiple clients. Creating new ideas in the area of risk management and risk quantification. In addition to your technical responsibilities, you will also play a key role in raising awareness of potential security threats through technical security training on best practices. This is an exciting opportunity to help shape the culture of our clients' organizations and make a tangible impact on their security posture. If you have a passion for cybersecurity governance, risk and compliance, are looking for a challenging and dynamic role, and want to work with a team of like-minded individuals, then we want to hear from you! Join us as a Security Specialist and help us secure the future of our clients' organizations. Who You Are Youre good at what you do and possess the required experience to prove it. However, equally as important you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused someone who prioritizes customer success in their work. And finally, youre open and borderless naturally inclusive in how you work with others. Required Technical and Professional Expertise 8-10 years of experience in Security BSc BCA BE Diploma MCA MSc or equivalent Min 10 years of relevant experience as a Security engineer for troubleshooting security devices & BAU support. Good understanding on Next Generation Firewalls (Cisco, Palo Alto Networks, Fortinet) and experience in handling security concepts (Rule ADD/ Modify Delete, Nat, Faulty Firewall replacement, High Availability setup, packet capture, log analysis etc.) Advanced knowledge on Daily tickets & issues for security devices like Firewall, WAF, DDoS Protection, DLP, PIM/PAM, SOC EDR solution and their monitoring, troubleshooting & firmware upgrade Troubleshoot and fix high priority issues related to Firewall, Anti-Virus, WAF, EDR, DDOS, PIM & PAM, DLP, SASE, SOC issues is added advantage. Work with the HW Vendors/TAC for the SW/HW related issues and providing the fix. Involve in change management process for HW replacement/ IOS upgrade/ Config change/ BW upgrade/ Whitelisting or Blacklist URLs & FW Rule addition etc. Knowledge and experience in Incident, Change, Problem, Service request and Configuration Management Processes Monitor the queue and maintain regular updates on the Tickets as per agreed timeline, providing the detailed closure summary on the tickets. Detailed Root cause summary to be documented for the Problem tickets. Document Pre & Post implementation logs & Script for change. Network Diagram updates. Working on the assigned tickets within the agreed Timeline/SLA as per the Ticket Priority/Severity and Adhere to the ITIL process with zero noncompliance. Upskilling the technical knowledge by learning new Technology and doing relevant technical certifications Preferred Technical and Professional Expertise. At least 5 years experience in managing security domain.
Posted 2 months ago
3 - 5 years
6 - 15 Lacs
Bengaluru
Work from Office
Job Description: We are seeking an experienced and results-driven Network Security Engineer with a strong focus on Palo Alto firewalls to take full responsibility for securing and maintaining our network infrastructure. You will play a pivotal role in identifying security gaps, implementing solutions, and ensuring a robust, secure network environment. This role involves working with cutting-edge technologies to address vulnerabilities, configure network devices, and develop security strategies that align with industry best practices. Key Responsibilities: Network Security Policy & Configuration: Design, implement, and manage network security policies, configurations, and controls to protect the organization's network infrastructure. Firewall Implementation (Palo Alto): Implement and maintain Palo Alto firewalls, ensuring they are configured and optimized for maximum protection. Security Vulnerability Management: Identify, assess, and address security vulnerabilities, working to continuously improve the security posture of the network. Solution Design & Implementation: Collaborate with the team to design and implement new network security solutions that improve the resilience and security of the network environment. Disaster Recovery: Develop and implement disaster recovery plans to ensure swift recovery in the event of a security attack or breach. Network Device Management: Work with routers, switches, and other network devices to apply vendor-recommended upgrades, configurations, and optimizations with minimal downtime. Layer 7 Security Features: Manage and enhance Layer 7 security features such as URL Filtering, DDOS protection, IPS/IDS, and Antimalware/Antivirus for comprehensive network protection. Packet Capture & Analysis: Use tools like Wireshark and TCPdump for network packet captures, analysis, and troubleshooting. Remote & IPsec VPN: Maintain and configure remote VPN and IPsec VPN solutions to provide secure access to the network. Incident & SLA Management: Respond to network security incidents promptly, working to resolve issues while maintaining adherence to SLAs. Ticketing & Problem Solving: Work with ticketing tools (e.g., ServiceNow) to track and resolve network security-related incidents efficiently. Required Skills & Qualifications: Hands-on experience with Palo Alto firewalls (mandatory) 3 to 5 years of hands-on experience in network security roles. Strong understanding of network security fundamentals , including OSI/TCP layer, routing/switching, NAT, Proxy, DNS, AAA, etc. Proficient in network packet capture tools such as Wireshark and TCPdump. Experience with Remote VPN and IPsec VPN configuration and troubleshooting. Good knowledge of Layer 7 security features (URL Filtering, DDOS, IPS/IDS, Antimalware/Antivirus). Experience using ticketing systems (e.g., ServiceNow) for issue tracking and resolution. Incident management experience with a focus on SLA management. PCNSE or PCNSA certification (preferred but not mandatory). Ability to work with minimal downtime while managing complex network configurations.
Posted 2 months ago
3 - 8 years
5 - 10 Lacs
Bengaluru
Work from Office
F5 is seeking an Associate Technical Account Manager (TAM) to support enterprise customers, including banks and financial institutions , in securing their web applications. This role involves managing deployments, ensuring compliance, and providing proactive security guidance . The ideal candidate has 3+ years of experience in cybersecurity, system integration, or technical account management , preferably in banking, finance, or regulatory environments . Roles and Responsibilities: Act as the primary technical contact for customers, ensuring smooth onboarding and integration of F5 security solutions (WAF, Bot Defense, API Security, DDoS, CDN). Project manage the installation and integration of F5 security as a service solution for Fortune 500 and Global 1000 companies. Support customers with security best practices, audit readiness, and regulatory compliance. Work with customers to identify risks, optimize security postures, and enhance system resilience. Proactively anticipate customer needs and facilitate project success. Act as the primary representative between our customers and F5. Develop and implement best practices for program/project management, communication artifacts, reporting, and capability improvements. Develop models for resource planning and consumption as well as key performance metrics for project/program success. Communicate effectively; organize and prioritize; solve problems and make decisions; build teams and relationships. Minimum Qualifications: Strong technical background with at least 3+ years of system integration within complex environments. Experience working with major load balancers currently on the market. Exposure to cybersecurity solutions or cloud platforms (AWS, GCP, or Azure). Understanding of TCP/IP, HTTP, HTML, Javascript, CSS, and other technologies involved in delivering sophisticated web services. Bachelor's degree in Computer Science, Information Systems, or related engineering discipline, OR equivalent industry work experience. Certification is preferred but optional based on the level of experience. A customer-centric attitude and the ability to communicate well at all levels of an organization. Ability to work in a very fast-paced environment and communicate effectively. Desired Skills: Familiarity with networking concepts (CDNs, application delivery controllers, load balancers, and Web Application Firewalls). Experience of Content Delivery Networks and reverse proxy. Experience in Web Application Firewall, Bot Defense, API Security, DDOS, Reputation Service, and Multi Cloud networking. Experience with at least one of the Cloud Platforms (AWS, Azure, GCP) Basic programming or scripting knowledge (e.g., Python, Terraform). Understanding of containerization technologies like Kubernetes (certifications are a plus). Experience configuring networking equipment like BIG-IP or writing iRules (even if limited).
Posted 2 months ago
1 - 6 years
7 - 11 Lacs
Hyderabad
Work from Office
We are seeking a Distributed Cloud Support Engineer-I , who is hardworking and committed to customer success. You are comfortable in both the Support and Engineering environments, translating technical documentation and conversations into clear, concise directions for customers and partners. You are passionate about helping our customers tackle and solve problems. You will provide support via phone, email, messaging, and web portal. Support requests range in complexity from "how to" questions through involved debugging and forensic efforts when prioritizing operational issues. Visualizing problems remotely is key to being successful in this role along with excellent analytic and troubleshooting skills. You will have a significant career growth opportunity within a fast-paced SaaS company. What will you do? Fix reported issues and advocate for the customer. Collaborate with sales and engineering teams to provide support to resellers, service provider and enterprise customers, as well as end users via telephone, e-mail, Slack and the web portal. Issue reproduction and concise documentation of solutions provided through technical notes, case studies and knowledge base articles. Critical issue management and customer assurance when handling reported issues. Coordinate fixes by Engineering or Developers when required and relay appropriate information to our partners and customers. Provide recommendations on how to improve supportability, reliability, availability, and serviceability based on lessons learned through issue resolution. How do you qualify? 1 or more years of experience working in an operations environment. Background in customer service/support and IT, networking, or IT security incident management. Experience driving efficiency, handling growth, and delivering results. Good understanding of IT, Network, or IT SOC best practices and a real passion for continuous improvement. Strong organizational skills and work well with contacts in various business subject areas. Conversationally and technically fluent in English verbally and written. Advantageous to have: Strong understanding of Networking and Layer 7 Protocols. Familiarity with Container technologies (Docker and Kubernetes). Knowledge of Data Representation types (XML, JSON, YAML). Public cloud experience with Amazon Web Services (AWS), Google Cloud Platform (GCP) and/or Microsoft Azure is preferred. Security product/solutions experience (Firewalls, WAFs, DDoS Mitigation) is preferred. Strong troubleshooting skills, independent and collaborative. Approachable disposition and steadfast in delivering. Ability to prioritize and multitask when leading sophisticated technical issues. Proven understanding of routing and switching technologies. Ability to read different scripting and automation languages (Python, Shell and Ansible). Bachelors degree in technologically relatable field or equivalent practical experience. Physical Demands and Work Environment This role requires availability outside normal business hours to align with the distributed global teams or to respond to critical security events. Some travel may be required (less than 10%). The Job Description is intended to be a general representation of the responsibilities and requirements of the job. However, the description may not be all-inclusive, and responsibilities and requirements are subject to change.
Posted 2 months ago
17 - 20 years
55 - 60 Lacs
Ahmedabad, Bengaluru, Kolkata
Work from Office
Dear Candidate, We are looking for a skilled Cloud Security Architect to develop, implement, and maintain security frameworks in cloud environments. You will ensure the security and compliance of cloud platforms, mitigate risks, and design robust cloud security solutions. Key Responsibilities: Develop and implement security architectures for cloud environments (AWS, Azure, GCP). Ensure compliance with cloud security best practices and industry standards (NIST, CIS, ISO 27001). Assess and mitigate risks in cloud infrastructure and applications. Design IAM policies, encryption strategies, and secure networking in the cloud. Work with DevOps teams to integrate security into CI/CD pipelines. Implement and manage cloud security tools, including CSPM and SIEM solutions. Investigate and respond to cloud security incidents. Required Skills & Qualifications: Strong expertise in cloud security tools (AWS Security Hub, Azure Defender, GCP Security Command Center). Hands-on experience with IAM, network security, and encryption in cloud environments. Knowledge of container security (Kubernetes, Docker) and serverless security. Experience with Infrastructure-as-Code (Terraform, CloudFormation) security best practices. Familiarity with cloud compliance frameworks (SOC 2, HIPAA, GDPR). Soft Skills: Strong problem-solving and analytical skills. Excellent communication skills to work with cross-functional teams. Ability to work independently and as part of a team. Detail-oriented with a focus on delivering high-quality solutions. Note: If you are interested, please share your updated resume and suggest the best number & time to connect with you. If your resume is shortlisted, one of the HR from my team will contact you as soon as possible. Srinivasa Reddy Kandi Delivery Manager Integra Technologies
Posted 2 months ago
10 - 13 years
27 - 30 Lacs
Ahmedabad, Bengaluru, Kolkata
Work from Office
Dear Candidate, We are looking for a Cloud Security Architect to lead the design, implementation, and governance of security solutions for cloud-based infrastructures. As businesses increasingly migrate to cloud platforms, ensuring robust security controls, compliance, and risk mitigation strategies is critical. Key Responsibilities: Design and implement cloud security strategies for public, private, and hybrid cloud environments . Develop cloud security architectures, security controls, and frameworks to protect cloud-native applications. Conduct risk assessments and threat modeling to identify cloud security weaknesses and implement mitigation strategies. Implement identity and access management (IAM), role-based access control (RBAC), and least privilege principles in cloud platforms. Ensure secure API gateways, microservices security, and container security (Docker, Kubernetes, serverless computing). Deploy and manage cloud security solutions , including Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWPP), and Cloud Access Security Brokers (CASB) . Develop and enforce secure cloud networking (VPC peering, firewalls, Zero Trust security, network segmentation). Perform continuous monitoring, logging, and anomaly detection using SIEM solutions (Splunk, IBM QRadar, Azure Sentinel). Implement data encryption at rest and in transit , utilizing AWS KMS, Azure Key Vault, Google Cloud KMS . Work with DevSecOps teams to automate security in CI/CD pipelines, infrastructure-as-code (IaC), and software development lifecycles . Develop disaster recovery and incident response strategies to mitigate cloud security threats. Collaborate with security teams to implement cloud compliance frameworks (SOC 2, ISO 27001, HIPAA, PCI-DSS, NIST, FedRAMP). Guide security awareness programs to train developers and engineers on cloud security best practices . Research emerging cloud security threats , vulnerabilities, and best practices, integrating them into security policies. Required Skills & Qualifications: Extensive experience in cloud security architecture, governance, and risk management . Deep knowledge of cloud security services in AWS (IAM, Security Hub, GuardDuty), Azure (Defender, Sentinel), and GCP (Cloud Armor, Security Command Center) . Hands-on expertise with container security tools (Kubernetes Security, Aqua Security, Prisma Cloud, Twistlock, Sysdig Secure). Strong understanding of Zero Trust security models and Secure Access Service Edge (SASE) . Proficiency in encryption standards (AES, RSA, TLS 1.3, Quantum-resistant cryptography). Experience with multi-cloud security configurations and security automation (Terraform, Ansible, CloudFormation). Familiarity with Cloud IAM, OAuth 2.0, SAML, OpenID Connect, MFA, and privileged access management (PAM) . Understanding of threat intelligence for cloud security (MITRE ATT&CK, cyber kill chain methodologies). Strong scripting knowledge ( Python, PowerShell, Bash ) to automate security controls. Experience in cloud security audits, penetration testing, and compliance assessment . Soft Skills: Strong problem-solving and analytical skills. Excellent communication skills to work with cross-functional teams. Ability to work independently and as part of a team. Detail-oriented with a focus on delivering high-quality solutions Note: If you are interested, please share your updated resume and suggest the best number & time to connect with you. If your resume is shortlisted, one of the HR from my team will contact you as soon as possible. Srinivasa Reddy Kandi Delivery Manager Integra Technologies
Posted 2 months ago
3 - 7 years
4 - 8 Lacs
Karnataka
Work from Office
Akmai waf fitting for Cequence Defender Engineer 2 positionsWe are seeking a skilled and motivated Cequence Defender Engineer to join our growing security team. As a Cequence Defender Engineer, you will play a crucial role in protecting our organizations web applications and APIs from sophisticated cyber threats. You will be responsible for the implementation, configuration, and ongoing management of the Cequence Security Platform, ensuring its optimal performance and effectiveness in mitigating bot attacks, DDoS attacks, and API abuse. Responsibilities:Design, implement, and maintain the Cequence Security Platform, including Defender (WADC/WAAP), Unified API Protection, and Bot Defense. Integrate Cequence Defender with existing security infrastructure, including Imperva, Datapower/APIC, and threat intelligence platforms. Develop and maintain comprehensive security policies and rules within Cequence Defender to effectively mitigate threats. Analyze security events and incidents detected by Cequence Defender, conducting thorough investigations and implementing appropriate remediation actions. Proactively monitor the threat landscape for emerging threats and vulnerabilities, adapting Cequence Defender configurations accordingly. Create and maintain detailed documentation for Cequence Defender configurations, policies, and incident response procedures. Collaborate with other security team members to ensure the overall security posture of the organization is maintained. Stay up to date on the latest security best practices and industry trends, particularly in application security and API protection. Qualifications:Proven experience working with Cequence Security Platform, specifically Cequence Defender. Strong understanding of web application security principles, common vulnerabilities (OWASP Top 10), and attack methodologies. Hands on experience with security tools and technologies, such as firewalls, intrusion detection/prevention systems (IDS/IPS), and web application firewalls (WAFs). Familiarity with scripting languages (e.g., Python, Bash) for automation and integration purposes. Excellent analytical and problem solving skills, with the ability to troubleshoot complex technical issues. Strong communication and collaboration skills, with the ability to effectively communicate technical concepts to both technical and non technical audiences.Preferred Qualifications:Industry certifications in cybersecurity, such as CISSP, CEH, or CCNP Security. Experience with cloud security platforms (e.g., AWS, Azure, GCP). Knowledge of API security best practices and standards (e.g., OpenAPI Specification, OAuth 2.0).
Posted 2 months ago
8 - 10 years
6 - 10 Lacs
Chennai, Noida
Work from Office
Company Website : https://www.yotta.com/ Work Mode- Work from Office. Job Location Chennai, Noida. Rotational Shift - 5 Days working. Job Scope: Security L2. The Team Member Security L2 will be expected to work in multi-vendor network security infrastructure specifically on Data Center infrastructure environment. The desired candidate should have proficiency in managing runtime environment of Data center security infrastructure. Job Responsibilities Manage runtime environment of Data center security infrastructures comprises of Firewall, IDS/IPS, AV, Patch Management, WAF Configurations of Firewall/IPS Rules and Policies Management. Configuration of NAT/PAT, IPSEC and SSL VPN. Taking backup of Security devices Updating IPS signature as guided by security L3, blocking of unwanted traffic, Antivirus updates, Patch updates. Managing day to day run time security infrastructure. Required to support for Problem and Change Management Process. Troubleshoot and fix issues, execute regular changes on security infrastructure. Health and alert monitoring for security devices Follow & commit with Yotta’s Policy statements (eg. QMS/EMS/OHS/ISMS/PIMS/ITSM etc) Undertake applicable training as communicated from time to time. Participation in Risk assessment process, contribute in achieving departmental & management system objectives & Assist in maintaining PIMS controls throughout personal data lifecycle. Must Have Skill: Good Hands-on Experience on perimeter firewall like Checkpoint, Cisco ASA/Firepower, Fortinet, Palo Alto, etc. Experience with IDS/IPS, DDOS and WAF technologies Experience in IPsec Site to Site/Client to site and SSL VPN configuration and troubleshooting. Experience in working antivirus technologies like Symantec, MacAfee, TrendMicro etc. Strong understanding of network (LAN and WAN, routing and switching etc.) Knowledge on Routing (RIP, EIGRP, OSPF, MPLS and BGP) Conceptual knowledge on Cloud security Awareness on Environmental, Health and Safety, Energy, Information Security, Quality, Service Management, Business continuity and other management systems of the organization Firewall : Checkpoint, FortiGate & Palo Alto Monitoring : AlgoSec & Forti Analyzer Proxy: Zscaler & Netskope LB: Radware, F5 & Array Ddos WAF Firewall EDR PAM Good to Have Skill: Cloud Security VA/PT and security hardening Strategic planning & Management capabilities Good analytical and problem-solving skills Excellent communication & interpersonal skills Ability to handle high pressure situations A formal security industry accreditation would be an advantage e.g., CISSP, CISM, CEH, SABSA SCF, etc. Awareness on Environmental, Health and Safety, Energy, Information Security, Quality, Service Management, Business continuity and other management systems of the organization Behavioral Attributes: Action Orientation & Accountability Art of Skillful Conversation Creativity & Problem Solving Business Acumen Dealing with ambiguity Learning on the fly Building Trust Customer Focus Intellectual Horsepower Prioritizing, Planning & Organizing Process–Quality Excellence Listening, Sensing, Observing Building Collaborative Relationships Qualification and Experience: Relevant bachelor’s degree Minimum 5-8 years of experience covering enterprise IT security and Data Center company CCNA/CCSA, SANS or any other relevant network security certification
Posted 2 months ago
6 - 9 years
5 - 10 Lacs
Gurgaon
Work from Office
Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Technical Services Implementation Engineer (L2) is a developing subject matter expert, responsible for ensuring that client solution requirements are resolved in line with Service Level Agreements (SLA). This role performs configurations, action installations and attend to break/fix events. What you'll be doing Key Responsibilities: B.E. /B. Tech in Computer Science/ Electronics /ECE / EE / ECS / IT Engineering/MCA/BCA At least one SIEM solution certifications with one or more SIEM/ Security solutions (i.e., RSA NetWitness, Splunk ES, Elastic ELK, HP ArcSight, IBM QRadar Log Rhythm). At least one L3 level security certifications viz. CCIE/CISSP/CISA/CCNP etc. Minimum 7 years of experience in handling security related products& services in an organization and out of total experience, 5 years of minimum experience should be as an L2 in SOC management. Person should have adequate knowledge of Check point firewall and IPS and Cisco firewall and IPS, McAfee IPS, Web Application Firewall, DDOS and other security devices Administration of SIEM environment (eg: deployment of solution, user management, managing the licenses, upgrades and patch deployment, addition or deletion of log sources, configuration management, change management, report management, manage backup and recovery etc) Construction of SIEM content required to produce Content Outputs (e.g., filters, active lists, correlation rules, reports, report templates, queries, trends, variables) Integration of customized threat intelligence content feeds provided by the Threat Intelligence & Analytics service Identifies possible sensor improvements to prevent incidents Collects/updates threat intelligence feeds from various sources Creates situational awareness briefings Co-ordinates with the different departments for incident analysis, containment and remediation Liaise with Security monitoring team to discover repeatable process that lead to new content development Provides engineering analysis and architectural design of technical solutions Device integration, Creation of Co relation rules and Parser development Sound analytical and troubleshooting skills Good Team Management and co-ordination skills Academic Qualifications and Certifications: Bachelor's degree or equivalent in Computer Science / Information Technology Degree or equivalent together with specialized training in new technologies and legacy systems or equivalent. Required Experience: Moderate level of experience in a technical implementation engineering or similar role. Demonstrated experience engaging with clients and conducting presentations. Demonstrated project administration and documentation experience. Workplace type : Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
Posted 2 months ago
6 - 11 years
10 - 16 Lacs
Pune
Work from Office
Job Responsibilities : - WAF Implementation & Management: Install, configure, and maintain Web Application Firewalls (WAF) to protect web applications and APIs from common vulnerabilities and attacks (e.g., OWASP Top 10). Implement and update security rules, policies, and configurations within WAF tools (e.g., AWS WAF, Azure WAF, or third-party solutions like F5, Imperva, or Cloudflare). Collaborate with application development and infrastructure teams to ensure seamless WAF deployment across multiple environments (production, staging, etc.). Threat Detection & Mitigation: Continuously monitor traffic patterns, analyze logs, and identify potential security threats and performance issues. Perform regular vulnerability assessments and penetration testing on web applications to identify gaps in security coverage. Investigate and respond to security incidents involving web application attacks (SQL injection, XSS, DDoS, etc.). Optimization & Tuning: Optimize WAF configurations to minimize false positives and negatives, ensuring minimal impact on legitimate traffic. Fine-tune policies to handle evolving attack techniques and enhance application security. Incident Response & Troubleshooting: Collaborate with the incident response team to mitigate security incidents in real time. Troubleshoot and resolve complex WAF-related issues, working closely with network and application teams. Documentation & Reporting: Document WAF configurations, policies, and incident response activities for compliance and audit purposes. Generate regular security reports, providing insights into traffic patterns, security events, and recommendations for improvement. Continuous Improvement & Research: Stay up to date with the latest trends in web application security, WAF technology, and emerging threats. Participate in the evaluation and recommendation of new security tools and technologies to strengthen the overall security posture. Skills and Qualifications: Bachelors degree in computer science, Information Security, or a related field (or equivalent work experience). Technical Skills: In-depth experience with Web Application Firewalls (WAF) such as AWS WAF, Azure WAF, Imperva, F5, Cloudflare, or similar technologies. Strong knowledge of network security protocols (SSL/TLS, HTTP/HTTPS, DNS, etc.) and web application vulnerabilities (SQL injection, cross-site scripting, cross-site request forgery, etc.). Familiarity with security information and event management (SIEM) systems, log analysis, and incident detection tools. Hands-on experience in network traffic analysis and security monitoring tools (e.g., Wireshark, tcpdump, etc.). Experience with firewall rule creation, DDoS mitigation, and rate limiting within a WAF environment. Certifications (preferred but not required): Certified Information Systems Security Professional (CISSP). Certified Ethical Hacker (CEH). AWS Certified Security Specialty or similar cloud security certifications. CompTIA Security+ or equivalent certifications.
Posted 3 months ago
8 - 13 years
10 - 15 Lacs
Uttar Pradesh
Work from Office
Security network engineer Littelton/ Hyderabad o 8+ years of experience o Palo Alto firewall(s) and Panorama, Installation, configuration, and troubleshooting o Allot DDoS; o AWS security groups and public key infrastructure (PKI) services; o Support BGP routing protocols as it pertains to security functions. o Cisco identity services engine (ISE) management o AWS cloud security, IP Security(IPSec) o VPNs to AWS, IPSec VPNs to Palo Alto, and IPSec VPNs to any other 3rd Party Vendors
Posted 3 months ago
8 - 11 years
25 - 30 Lacs
Bengaluru
Work from Office
Role & responsibilities Scope of work to be updated: Assessment of MS Defender for cloud (MDFC) Analysis of the VM, DB, Kubernetes and other cloud infrastructure Assessment of roles configured for administrator, security teams, other teams Review overall security score provided by MDFC and analyze the gap specifically for resources with low score Compliance alignment and identify any gaps with regards to Audit and Compliance needs Analyze how the Vulnerability scanning is configured for VMs, DB, containers Analyze Cross cloud platform security analysis and the quality of MDFC dashboard Analyze the reporting on compliance posture improvement and resource misconfigurations Supporting the platform and bring improvements as needed in discussion with Everest Global Analyze the vulnerabilities reported in MDFC and work with Infrastructure, App Teams for remediation Document existing policies in MDFC and Implement Policy-Based Controls Help establish vulnerability governance based on potential impact and likelihood of exploitation Establish process for monitoring of security events in MDFC Integrate with ArmorCode, our VM platform in collaboration with existing VM Team Deliverables to Updates as per scope above: Complete assessment report of MS Defender for cloud (MDFC) Improvements completed in 3 months and change achieved in security score Future improvement opportunities and Roadmap Provide consulting on addressing the gaps identified in discussion with Everest Global
Posted 3 months ago
12 - 16 years
13 - 18 Lacs
Bengaluru
Work from Office
Project Role : Application Architect Project Role Description : Provide functional and/or technical expertise to plan, analyze, define and support the delivery of future functional and technical capabilities for an application or group of applications. Assist in facilitating impact assessment efforts and in producing and reviewing estimates for client work requests. Must have skills : Advanced Embedded System Engineering Good to have skills : Embedded C++, C++ Programming Language Minimum 12 year(s) of experience is required Educational Qualification : 15 years full time education Roles & Responsibilities: Must have Skills:-Strong experience on RDK video stack-Experience and knowledge on IEEE802.11/Wi-Fi protocols such as WPA, RADIUS, WPS, 802.11n/ac/ax -Work with vendors to integrate Wi-Fi chipset solutions-Provide technical assistance to other teams to trouble shoot customer Wi-Fi issues-Work on development of new Wi-Fi features on RDKB platform-Deep understanding of low-level video software stack AV Pipelines, middleware frameworks-Strong knowledge of TCP/IP internals and common network protocols such as DHCP, DNS, HTTP-Firewall and security:IPTables, NFtables, IPSEC/MACSec, DOS, DDOS.-Gateway WAN Technologies:DOCSIS, MTA, EPON, GPON, DSL-Message/Transport Protocols:MQTT, HTTPS, WEBSOCKET, XMIDT, OVSDB, HTTP (3), gRPC-Wi-Fi/Mesh:Open sync, Wi-Fi Easy Mesh, knowledge of Wi-Fi protocols -Good understanding of device drivers, low level platform software-Ability to quickly understand and translate product requirements into technical solutions-Familiar with emerging trends in system profiling CPU, GPU, NPU, TPU, Memory, etc. Profiling and performance optimizations-Native software development experience on Embedded Linux platforms-Understanding of Linux internals and media framework.-Good to have experience:-Domain knowledge in various middleware components like Browser, IP Video, Broadcast video, Bluetooth, Wi-Fi, networking etc.-Programming Languages:Proficiency in programming languages like C++, Java, Python, SQL, and scripting languages is essential.-Tools:Build tools (Yocto, make), Splunk, JIRA, GITHUB/Gerrit- Additional Information:-The candidate should have a minimum of 12 years of experience in Advanced Embedded System Engineering.-This position is based at our Bengaluru office.-15 years full-time education is required. Qualification 15 years full time education
Posted 3 months ago
2 - 7 years
8 - 18 Lacs
Bengaluru
Work from Office
DESCRIPTION AWS Sales, Marketing, and Global Services (SMGS) is responsible for driving revenue, adoption, and growth from the largest and fastest growing small- and mid-market accounts to enterprise-level customers including public sector. As a member of the AWS Support team you will be at the forefront of this transformational technology, assisting a global list of companies and developers that are taking advantage of a growing set of services and features to run their mission-critical applications. As a Cloud Support Engineer, you will act as the Cloud Ambassador’ across all the cloud products, arming our customers with required tools & tactics to get the most out of their Product and Support investment. Would you like to use the latest cloud computing technologies? Do you have an interest in helping customers understand application architectures and integration approaches? Are you familiar with best practices for applications, servers and networks? Do you want to be part of a customer facing technology team helping to ensure the success of Amazon Web Services (AWS) as a leading technology organization? If you fit the description, you might be the person we are looking for! We are a group of smart people, passionate about cloud computing, and believe that world class support is critical to customer success. Key job responsibilities First and foremost this is a customer support role – in The Cloud. On a typical day, a Support Engineer will be primarily responsible for solving customer’s cases through a variety of customer contact channels which include telephone, email, and web/live chat. You will apply advanced troubleshooting techniques to provide tailored solutions for our customers and drive customer interactions by thoughtfully working with customers to dive deep into the root cause of an issue. Apart from working on a broad spectrum of technical issues, an AWS Support Engineer may also coach/mentor new hires, develop & present training, partner with development teams on complex issues or contact deflection initiatives, participate in new hiring, write tools/script to help the team, or work with leadership on process improvement and strategic initiatives to ensure better customer experience and compliance with global AWS standards, practices and policies. As we operate on a follow-the-sun model, with Support Engineering sites located globally, there is no after hours on-call or mandated overtime in this role. A day in the life Every day will bring new and exciting challenges on the job while you: • Learn and use new technologies. • Apply advanced troubleshooting techniques to provide unique solutions to our customers' individual needs. • Interact with leading technologists around the world and resolve customer issues. • Partner with Amazon teams in India to help reproduce and resolve customer issues. • Leverage your extensive customer support experience to provide feedback to internal Amazon teams in India on how to improve our services. • Drive customer communication during critical events. • Drive projects that improve support-related processes and our customers’ technical support experience. • Write tutorials, how-to videos, and other technical articles for the developer community. • Work on critical, highly complex customer problems that may span multiple AWS services. About the team Diverse Experiences AWS values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn’t followed a traditional path, or includes alternative experiences, don’t let it stop you from applying. Why AWS? Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform. We pioneered cloud computing and never stopped innovating — that’s why customers from the most successful startups to Global 500 companies trust our robust suite of products and services to power their businesses. Inclusive Team Culture AWS values curiosity and connection. Our employee-led and company-sponsored affinity groups promote inclusion and empower our people to take pride in what makes us unique. Our inclusion events foster stronger, more collaborative teams. Our continual innovation is fueled by the bold ideas, fresh perspectives, and passionate voices our teams bring to everything we do. Mentorship & Career Growth We’re continuously raising our performance bar as we strive to become Earth’s Best Employer. That’s why you’ll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional. Work/Life Balance We value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why we strive for flexibility as part of our working culture. When we feel supported in the workplace and at home, there’s nothing we can’t achieve in the cloud. BASIC QUALIFICATIONS - Bachelor’s degree OR equivalent experience in a technical position. - 2+ years of security and operating system support and distributed systems experience; - Experience to information security and compliance experience. PREFERRED QUALIFICATIONS - Experience Deploying Identity and Access Management systems to secure production and corporate access, such as: SSO, SAML. - Understanding of Cloud Security across realms of Identity, Monitoring Auditing and Cryptography. - Knowledge or experience with broad array of security technologies, such as NextGen FW, WAF, SIEM, Endpoint Security and more. Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit https://amazon.jobs/content/en/how-we-hire/accommodations for more information. If the country/region you’re applying in isn’t listed, please contact your Recruiting Partner.
Posted 3 months ago
10 - 15 years
5 - 10 Lacs
Chennai
Work from Office
Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Manager, Managed Services Operations is a management role, responsible for operating within a Region/Country or Services function and is accountable for service delivery at the highest level thereby ensuring client satisfaction and the successful continuance of business operations within the organization. This role ensures managed service is provided to all clients, thereby ensuring that their IT infrastructure and systems remain operational. The primary objective of this role is to ensure contracted Managed Services outcomes are delivered to the client and assists with the planning, building and supporting of delivering managed services to meet business objectives. Experience: • Total experience of 10 years out of which minimum 8 years of experience in handling security related products & services in an organization of repute. • Minimum experience of 3 years as L3 level. Skills: • Experience in 5 or more areas of security like (Firewall, Anti- ATP, NIPS, WAF, Anti-DDoS, Web proxy, endpoint & web DLP, NAC, Privilege Identity Management, NBA, MDM, EPP, EDR, Anti-ATP and other security devices). • Person should have adequate knowledge of Security Orchestration Automation and Response (SOAR), Security Incident and Event Management (SIEM) solutions and Database Access Management (DAM) solutions. • Overall knowledge/experience of Architectural Design and Best practices on Network and Cyber Security. Mandatory Certification: At least one Security certifications PMP/ITIL expert/CISA/CISM/CISSP What you'll be doing Key Responsibilities: Proactively monitors and drives service delivery to clients. Manages client incidents by investigating and providing solutions that help solve client problems as escalated by team leaders and engineers. Works with client delivery teams to evaluate regional client reviews to ensure proactive incident management at client sites Ensures that the standard client information repository related to technology, operations manuals is current and accurate. Creates and maintains a comprehensive list of client requirements, the scope of deliverables, technology and the delivery model. Runs the managed services operations in alignment with the service management service operations (SMSO) process, delivering promised outcomes to clients. Provides operational support and continuous service improvement post client handover from Technical Services (or other) teams. Reviews training requirements for service operations teams. Engages with clients for technical operations as part of routine operations. Plans and implements key service improvement priorities based on a continual service improvement approach. Feeds continual service improvement priorities into the automation team. Ensures that tracking and monitoring of the performance of service delivery through all channels (human, digital, self-service, automated) is carried out, metrics and reports are analyzed, and issues are resolved. Responsible for the day to day running of the Managed Services Operations team in line with the performance established by the business. Ensures maximum uptime and the accurate and early response to client operational issues. Responsible for resource planning and work allocation to meet agreed service levels. Identifies opportunities for continuous service improvement. Knowledge and Attributes: Excellent organizational and team management skills. Excellent communication skills – both verbal and written coupled with excellent ability to collaborate with internal stakeholders and external clients. Advanced understanding of budgets and cost management. Excellent time management, prioritization and delegation abilities. Excellent focus on client centricity. Highly focused on business outcomes. Ability to guide the team through transformational objectives set out by the business. Excellent ability to work across different cultures and social groups. Ability to work well in a pressurized environment and adapt to changing circumstances. Academic Qualifications and Certifications: Bachelor’s degree or equivalent degree in Information Technology or Computing or related field. ITIL certification is desirable. Required Experience: Advanced experience in coaching and mentoring engineering team(s) gained within an information technology services organization. Advanced demonstrated experience implementing continual service improvement initiatives (through automation, process enhancements). Advanced demonstrated experience in organizational change management (transformational experience). Advanced demonstrated experience in domain towers such as Network, Collaboration/Customer Experience, Cloud, Security, Data Center. Workplace type : On-site Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
Posted 3 months ago
11 - 20 years
13 - 22 Lacs
Bengaluru
Work from Office
Job Title Consulting n Advisory_Generic Responsibilities Develop and implement comprehensive cyber security maturity model for enterprise IT or OT environment for evaluating overall security posture. Advise best method of protecting the enterprise network, data, applications, and information systems from any potential cyber threats Research on cyber security criteria, emerging security trends and solutions and validate the complimentary policies and processes are aligned with solutionsCalculate cost estimations on product, people, and processes to remediate any security gapsPlan, design and recommend, robust enterprise security architectures, processes, policies, procedures for customers IT projectsProvide technical reports and present to the enterprise CXOs based on advisory engagement results. Provide professional guidance and advisory to enterprise security teams & CISO’s on cyber strategy and roadmap Technical and Professional Requirements: infrastructure security e.gAnti-DDoS, Firewall, NIPS, WAF, NDR, NSPM, EDR, EPP, Deception, SASE, ZTNA etcData Security (e.g. DLP, DAM, PKI, Key Mgmt., Certificate Mgmt., DSPM, Data Masking, Encryption etc, Application Securitye.g. SAST, DAST, SCA, IAST etc, Cloud Security e.gCNAPP, CASB, SSPM, Native Security from AWS, AZURE, GCP etc.Zero Trust Architecture, OT Security, Security Incident Managemente.g. SIEM, SOAR, SOC etc.Identity & Access Management e.g. IDP, RBAC, SSO, MFA, Conditional access, PAM,PIM etc. Governance Risk & Compliance Eg Risk Management, TPRM, Control Testing, IT Audits & Assessments, Compliance Management etc Preferred Skills: Domain->Network->Network Security Applications Technology->Access Management->Desktop/Federated/Web based SSO Kerberos SAML->Sailpoint Identity IQ Technology->Application Security->Application Security - ALL Technology->Application Security->Vulnerability Management Technology->Cloud Platform->AWS Database Technology->Data Security->Data Security - ALL Technology->Identity Management->Identity Governance Framework Attestation/Access Cert Role Mgmt Auditing Entitlement Mgmt XACML->SailPoint identity now Technology->Identity Management->Identity/Account Provisioning and Reconciliation SPML->SailPoint identity now Technology->Infrastructure Security->Cloud Security Technology->Infrastructure Security->Infrastructure Security - ALL Technology->Infrastructure Security->Security Incident and Event Management (SIEM) Technology->Infrastructure Security->Security Incident and Event Management (SIEM)->Splunk Technology->Infrastructure Security->Virtual Private Network Firewall->Zscaler ZPA Technology->Application Security->Access Management->Sailpoint Technology->EUC-Security->Symantec End Point Protection Technology->Network-Firewall_and_Media->Bluecoat->firewall Technology->Network-Firewall_and_Media->Check Point->firewall Technology->Network-Firewall_and_Media->Cisco-Firewall_and_Media->firewall Technology->Network-Firewall_and_Media->Juniper-Firewall Technology->Identity Management->IDAM-Design work flow Implementation Technology->Network-Firewall_and_Media->Palo Alto Technology->Infrastructure Security->SOC Operations Technology->GRC Automation->GRC Tool implementation & maintenance->Servicenow GRC Technology->Infrastructure Security->Secure Web Gateway->Zscaler ZIA Technology->Cloud Platform->Azure Devops->Azure Deployment Manager Educational Requirements Bachelor of Engineering,Bachelor Of Technology (Integrated) Service Line Cyber Security * Location of posting is subject to business requirements
Posted 3 months ago
2 - 7 years
4 - 9 Lacs
Hyderabad
Work from Office
Job Area: Information Technology Group, Information Technology Group > Cyber Security Engineering General Summary: This role will be responsible for supporting 24x7 operations, requiring night and weekend shifts on a rotational basis to meet the organization's business needs. The primary responsibilities include monitoring and triaging all security events coming into the SOC/CDC from multiple sources, with a significant focus on malware reversing.Responsibilities:24x7 Operations:Working night and weekend shifts on a rotational basis.Monitoring and Triaging Security Events:Handling incidents such as social engineering attacks, malware, DDoS, data exfiltration, and ransomware.Initial Triage:Managing the first 20 minutes of an incident as per SOP, then escalating to Tier 2 if needed.Incident Analysis:Using orchestration tools and knowledge bases to analyze security events.Malware Analysis:Analyzing malware samples to support ongoing investigations.Reverse Engineering:Disassembling, deconstructing, and reverse engineering malicious code to understand its behavior and impact.Malware Intelligence:Compiling and presenting malware intelligence and research to business leaders and stakeholders.Staying Current:Keeping up to date with the latest malware trends and updating software defenses accordingly.Ticketing System:Keeping the system updated thoroughly and promptly.Stakeholder Communication:Making recommendations on mitigation and prevention techniques.Issue Resolution:Ensuring timely follow-up and resolution of issues per SLAs.Collaboration:Working closely with Tier 2 and Tier 3 teams.Continuous Learning:Staying updated with new use cases and process changes.Participation:Actively engaging in brown bag sessions. 'The individual must also have a good awareness of current and developing security threats and technologiesStrong proficiency in security event investigations, also in written and spoken EnglishStrong interpersonal skills and a good team playerPrior professional services experience in 24x7 SOC or CDC operations is desiredBachelors degree or Masters Degree in Computer Sciences or in Cyber Security Minimum Qualifications: Bachelor's degree in Engineering, Information Systems, Computer Science, or related field and 2+ years of cybersecurity-relevant work experience. OR High school diploma or equivalent and 4+ years of cybersecurity-relevant work experience. Physical Requirements: Frequently transports and installs equipment up to 40 lbs. Applicants :Qualcomm is an equal opportunity employer. If you are an individual with a disability and need an accommodation during the application/hiring process, rest assured that Qualcomm is committed to providing an accessible process. You may e-mail disability-accomodations@qualcomm.com or call Qualcomm's toll-free number found here. Upon request, Qualcomm will provide reasonable accommodations to support individuals with disabilities to be able participate in the hiring process. Qualcomm is also committed to making our workplace accessible for individuals with disabilities. (Keep in mind that this email address is used to provide reasonable accommodations for individuals with disabilities. We will not respond here to requests for updates on applications or resume inquiries). Qualcomm expects its employees to abide by all applicable policies and procedures, including but not limited to security and other requirements regarding protection of Company confidential information and other confidential and/or proprietary information, to the extent those requirements are permissible under applicable law. To all Staffing and Recruiting Agencies :Our Careers Site is only for individuals seeking a job at Qualcomm. Staffing and recruiting agencies and individuals being represented by an agency are not authorized to use this site or to submit profiles, applications or resumes, and any such submissions will be considered unsolicited. Qualcomm does not accept unsolicited resumes or applications from agencies. Please do not forward resumes to our jobs alias, Qualcomm employees or any other company location. Qualcomm is not responsible for any fees related to unsolicited resumes/applications. If you would like more information about this role, please contact Qualcomm Careers.
Posted 3 months ago
18 - 22 years
50 - 100 Lacs
Bengaluru
Work from Office
Hiring, Head of Information Security Job Purpose The Head of Information Security is tasked with creating and sustaining the enterprise vision, strategy, and program to safeguard the integrity, availability, and confidentiality of the organization's information assets. This involves implementing and maintaining comprehensive security measures and practices. This leadership position includes overseeing the development and execution of a strong cybersecurity framework, leading a team of security professionals, and working collaboratively with other departments to mitigate risks. Roles and responsibilities Strategy & Governance Development and implement a comprehensive information security strategy aligned with the organization goals and leading industry practices. Establish and maintain information security policies, standards and procedures to ensure compliance with relevant regulations and frameworks. Manage budget for IT security related activities and initiatives, ensure ROI on the same. Establish IT security governance frameworks, policies and procedures to ensure integrity and availability of information assets. Security Architecture Design Oversee design and implementation of a robust and resilient security architecture including network security, infrastructure and information security, and application security. Evaluate and select appropriate security technologies, tools and vendors to protect the organizations information assets. Review and assess the security controls and configurations of existing systems and applications and provide recommendations for improvement. Collaborate with enterprise architects/ technology partners to ensure security is integrated into the design and development of new systems and applications. Security Operations & Incident response Oversee the day-to-day operations of the organizations security infrastructure and develop incident response plans to address and mitigate security incidents effectively. Drive regular security, risk & vulnerability assessments to identify vulnerabilities and weaknesses in the organizations systems and infrastructure. Manage and resolve security incidents and lead incident response efforts, including investigations, containment, eradication and recovery in case of cyber attack Security incident & Threat Intelligence Stay updated on the latest security threats, vulnerabilities, and industry trends through continuous benchmarking and research. Proactively identify emerging threats and vulnerabilities and develop strategies to mitigate their impact. Collaborate with internal and external stakeholders to conduct penetration testing, vulnerability assessment and security audits. Develop standard operating procedures for incident response during ransomware attacks Vendor & Third-Party Risk Management Assess and manage security risks associated with third-party vendors and service providers. Provide input during vendor evaluation and selection based on their security capabilities and compliances with security standards. Compliance & Regulatory Requirements Ensure organization’s compliance with relevant laws, regulations and industry standards pertaining to information security. Monitor and interpret changes in security regulations and standards and assess their impact on the IT landscape. Lead and coordinate audits, assessments and certification processes related to information security. Collaboration Work closely with IT, legal, compliance, and business units to integrate security practices into daily operations. Act as the primary point of contact for security-related matters with external partners, vendors, and regulatory bodies Security awareness and Training Collaborate with learning & development team to implement security awareness and training programs about information security risks, leading practices and policies. Conduct regular security awareness campaigns, monitor and evaluate the effectiveness of security awareness efforts. Conduct Cyber War game drills with business users to enhance preparedness for handling ransomware attacks. People Management Provide direction and guidance to the team and foster a collaborative and high-performance environment. Qualification and Experience : A post-graduate or bachelor's degree in engineering with 18-22 years of work experience, including 7-10 years in leading a cybersecurity organization, is required. The role demands extensive experience in identifying and mitigating information & cyber security risks and a comprehensive understanding of regulatory requirements. Professional security certifications like CISA, CISSP, CISM, ISO 27001:2013 LA, etc., are highly desirable. Familiarity with security technologies is crucial, including firewalls, network access control, IDAM & ITDR, EDR, secure web gateways, email security gateways, data leak prevention (DLP), MFA, WAF, DDoS, PAM, SIEM & SOAR, and micro-segmentation. Other Skills: Excellent Communication, Presentation & inter-personal Skills Should possess knowledge of various Security Solutions (Endpoint Protection, Advanced Threat Protection, Data Leak Prevention), Network Security, Databases, OS, etc. Knowledge of the industry's standards and regulations in the Healthcare or Pharma industry is preferred.
Posted 3 months ago
6 - 10 years
15 - 25 Lacs
Mumbai
Work from Office
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you passionate about cybersecurity and looking for an exciting role where you can make a difference? If so, we have an opportunity for you! As a Security Specialist at Kyndryl, you will play a crucial role in enabling and securing our customer organizations, cultures, and ecosystems. Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and security awareness workshops. You will be tasked with configuring, monitoring, and managing the performance of networks to maintain the quality of services, while also protecting organizational infrastructure from malicious cyber-attacks. As a key member of our team, you will assess, predict, prevent, and manage the risk of IT infrastructure and data, helping our customers stay ahead of the curve and ensure their systems are secure. You will develop and implement security policies and procedures, working closely with other departments to ensure that all security measures are in place and operating effectively. But that is not all – at Kyndryl you will have the opportunity to explore innovation in CyberSecurity data science – taking information that has been gathered and looking for areas to have that “Ah Ha” moment. Drawing conclusions and patterns from the data across single and multiple clients. Creating new ideas in the area of risk management and risk quantification. In addition to your technical responsibilities, you will also play a key role in raising awareness of potential security threats through technical security training on best practices. This is an exciting opportunity to help shape the culture of our clients' organizations and make a tangible impact on their security posture. If you have a passion for cybersecurity – governance, risk and compliance, are looking for a challenging and dynamic role, and want to work with a team of like-minded individuals, then we want to hear from you! Join us as a Security Specialist and help us secure the future of our clients' organizations. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Expertise 8-10 years of experience in Security BSc / BCA / BE / Diploma / MCA / MSc or equivalent Min 10 years of relevant experience as a Security engineer for troubleshooting security devices & BAU support. Good understanding on Next Generation Firewalls (Cisco, Palo Alto Networks, Fortinet) and experience in handling security concepts (Rule ADD/ Modify Delete, Nat, Faulty Firewall replacement, High Availability setup, packet capture, log analysis etc.) Advanced knowledge on Daily tickets & issues for security devices like Firewall, WAF, DDoS Protection, DLP, PIM/PAM, SOC EDR solution and their monitoring, troubleshooting & firmware upgrade Troubleshoot and fix high priority issues related to Firewall, Anti-Virus, WAF, EDR, DDOS, PIM & PAM, DLP, SASE, SOC issues is added advantage. Work with the HW Vendors/TAC for the SW/HW related issues and providing the fix. Involve in change management process for HW replacement/ IOS upgrade/ Config change/ BW upgrade/ Whitelisting or Blacklist URLs & FW Rule addition etc. Knowledge and experience in Incident, Change, Problem, Service request and Configuration Management Processes Monitor the queue and maintain regular updates on the Tickets as per agreed timeline, providing the detailed closure summary on the tickets. Detailed Root cause summary to be documented for the Problem tickets. Document Pre & Post implementation logs & Script for change. Network Diagram updates. Working on the assigned tickets within the agreed Timeline/SLA as per the Ticket Priority/Severity and Adhere to the ITIL process with zero noncompliance. Upskilling the technical knowledge by learning new Technology and doing relevant technical certifications Preferred Technical and Professional Expertise. At least 5 years’ experience in managing security domain. Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted 3 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2