Jobs
Interviews

360 Dlp Jobs - Page 14

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 9.0 years

0 Lacs

Nagpur

Work from Office

Lead Engineer - Email gateway Reports to Senior Manager/Architect location) University degree in the field of computer science or IT. This role involves acting as primary point of contact for operational tickets resolution, enhancing, email security measures and providing document support. Experience/Qualifications * The ideal candidate will have a strong background in email security and vendor collaboration. * Must possess patching experience as well as upgrade and update and implementation of email gateways * Mandatory skills are Email authentication spf, dkim. dmarc also should be aware of spam, phishing, spoofing * Should possess basic networking and dns records knowledge Act as a primary point of contact for resolving operational tickets related to Trend micro email gateway which specifically includes ddei and imsva Daily monitoring reports for services, resource optimization, patching and Responsibilities upgrade activity. Rca preparation for mail flow issues Provide full email analysis for spam, spoofing,phishing, malware etc. Manage and maintaining server resources for email gateway

Posted 2 months ago

Apply

5.0 - 8.0 years

7 - 17 Lacs

Hyderabad

Hybrid

TEKsystems is hiring for DLP Sr Analyst!! Exp - 5+ Years NP - Immediate to 15 days Location - (Hybrid Mode) Hyderabad Role & responsibilities: Experience in monitoring and analyzing DLP events on the DLP solution. Experience in day-to-day operations of the Data Loss Prevention (DLP) process. Hands-on experience of following detailed processes and procedures in security incident response lifecycle and its phases. Ability to handle, resolve data security events minimizing the impact to the Bank, employees and customer. Ability to understand and follow the incident response process through event escalations. Ability to learn the proper use and protection of data (required). Ability to work through the DLP event queue and resolve tickets quickly. Good level knowledge of GDPR requirements and regulations. Strong knowledge of various data security tool & techniques incl DLP, CASB. Knowledge of common operating systems and platforms. Flexible work availability to support the DLP teams responsibilities.

Posted 2 months ago

Apply

5.0 - 8.0 years

7 - 17 Lacs

Hyderabad

Hybrid

TEKsystems is hiring for DLP Sr Analyst!! Exp - 5+ Years NP - Immediate to 15 days Location - Hyderabad Role & responsibilities: Experience in monitoring and analyzing DLP events on the DLP solution. Experience in day-to-day operations of the Data Loss Prevention (DLP) process. Hands-on experience of following detailed processes and procedures in security incident response lifecycle and its phases. Ability to handle, resolve data security events minimizing the impact to the Bank, employees and customer. Ability to understand and follow the incident response process through event escalations. Ability to learn the proper use and protection of data (required). Ability to work through the DLP event queue and resolve tickets quickly. Good level knowledge of GDPR requirements and regulations. Strong knowledge of various data security tool & techniques incl DLP, CASB. Knowledge of common operating systems and platforms. Flexible work availability to support the DLP teams responsibilities.

Posted 2 months ago

Apply

4.0 - 9.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Diverse Lynx is looking for Splunk Professional to join our dynamic team and embark on a rewarding career journey Collaborate with stakeholders to understand data requirements, use cases, and objectives for Splunk deployments Design and implement data ingestion processes, including data collection, parsing, normalization, and indexing in Splunk Develop custom Splunk queries, search strings, and data models to extract meaningful insights from machine-generated data Create interactive dashboards, reports, and visualizations using Splunk's search processing language (SPL) and visualization tools Implement and maintain Splunk apps, add-ons, and configurations to support specific use cases or data sources Automate data analysis workflows and alerting mechanisms to identify and respond to critical events and anomalies Optimize Splunk deployments for performance, scalability, and search efficiency Monitor and troubleshoot Splunk infrastructure and resolve issues related to data ingestion, search performance, and system availability Collaborate with security and operations teams to develop and implement Splunk-based security monitoring, log analysis, and incident response solutions Ensure data privacy and security by implementing access controls, data encryption, and compliance with relevant regulations Stay updated with Splunk product releases, new features, and best practices to recommend and implement improvements in Splunk deployments Provide training and support to end-users on utilizing Splunk for data analysis and visualization

Posted 2 months ago

Apply

6.0 - 11.0 years

10 - 20 Lacs

Nashik, Pune, Bengaluru

Hybrid

Job Title: Senior Data Security Engineer Location: Pune, India Role Description As a Senior Data Security Engineer , you will lead a team of skilled engineers dedicated to protecting the organizations sensitive information and ensuring robust data security practices. Your role will encompass the design, implementation, and optimization of data security solutions across on-premises, cloud, and hybrid environments. Key areas included but not limited to are Data Discovery and Classification, Data Protection, Data Loss Prevention (DLP). You will collaborate across divisions, working closely with other security pillars and business units to deliver innovative solutions that mitigate threats and reduce risks. Combining strong managerial acumen with hands-on technical expertise, you will actively contribute to delivering outcomes, stepping in to resolve complex challenges directly when needed. As a pivotal figure in the Data Security pillar, you will define architectural and technological roadmaps, ensuring alignment with business objectives and global security standards. Your leadership will drive the adoption of best practices and foster a culture of delivery, whereby you ensure that your team delivers the book of work. What we’ll offer you As part of our flexible scheme, here are just some of the benefits that you’ll enjoy Best in class leave policy Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Leadership & Hands-On Engineering Lead a team of data security engineers, fostering technical excellence and collaboration. Drive knowledge sharing within the team and ensure alignment with best practices and adaptive way of working. Provide mentorship and hands-on guidance while ensuring high technical delivery standards. Actively participate in technical implementation and troubleshooting when necessary. Manage backlogs, prioritize the work and deliver in scope, budget and schedule. Security Architecture & Solution Design Define and maintain a data security implementation and technology roadmap aligned with the Data Security strategy and business objectives. Evaluate and recommend new security tools and technologies for e.g. data protection, DLP. Implementation & Technical Operations Lead the implementation, configuration, deployment and optimization of data security technologies, including but not limited to DLP, encryption, tokenization, and cloud security controls. Implement and fine-tune security controls to detect and prevent data exfiltration, malware, insider threats, etc. Threat & Risk-Driven Security Enhancements Work with threat intelligence teams to understand emerging data security threats and incorporate proactive defenses. Continuously assess risks associated with data security gaps and propose mitigation strategies. Cross-Divisional Collaboration & Stakeholder Engagement Work across other security pillars and IT teams to align data security initiatives with broader risk mitigation strategies. Act as a bridge between security operations, architects, and engineers, ensuring cohesive security execution. Collaborate with external vendors to evaluate and deploy best-fit security solutions and mature their solutions. Engage with leadership to translate business risk into practical, actionable security measures and KPIs Your skills and experience Mandatory (MUST) Qualifications Bachelor’s or master’s degree in information security, Computer Science, or a related field. 7+ years of experience in data security, cloud security, or DLP, with a mix of hands-on engineering and leadership responsibilities. Proven track record of leading security teams, managing priorities, and delivering projects within scope, budget, and schedule. Strong technical problem-solving skills, with the ability to troubleshoot, optimize, and enhance security implementations. Experience in security architecture, technology roadmaps, and aligning solutions with business objectives. Expertise in evaluating, selecting, and implementing security technologies, e.g. for DLP, encryption, tokenization, and cloud security solutions. Hands-on experience deploying, configuring, and optimizing security controls to mitigate data loss prevention, malware, and insider threats. Good understanding of risk assessment, threat modeling, and security mitigation strategies. Ability to collaborate with leadership and stakeholders, translating security risks into actionable KPIs and strategic initiatives. Experience working across security pillars, IT teams, and external partners to align security objectives and drive improvements. Including ability to communicate complex topics effectively to various stakeholders, particularly at the senior management level. Experience with Microsoft Purview, Symantec DLP, Palo Alto, and Zscaler; knowledge of Palo Alto and Proofpoint is a plus. Optional (Shall) Qualifications – plus! Advanced Technical Expertise in secure network architectures, encryption methodologies, data protection strategies, and cloud security best practices. Regulatory Compliance Knowledge, including familiarity with GDPR, CCPA, PCI DSS, NIST, and ISO 27001 in the context of data security. Continuous Learning & Industry Awareness, staying up to date with emerging security threats, technologies, and evolving regulatory landscapes. Knowledge of Zero Trust Security Models, including access control, micro-segmentation, and identity-based security approaches. Cloud Security & Infrastructure, worked with AWS, Azure, or GCP including Terraform, Ansible, or Kubernetes security. Programming & API Security, familiarity with secure coding practices and experience securing REST APIs, authentication flows, and data access layers. Holding preferred certifications like CISSP, CISM, CCSP, AWS Certified Security, Microsoft Purview, Google Professional Cloud Security Engineer How we’ll support you Training and development to help you excel in your career Coaching and support from experts in your team A culture of continuous learning to aid progression A range of flexible benefits that you can tailor to suit your needs About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htmRole & responsibilities Preferred candidate profile

Posted 2 months ago

Apply

4 - 5 years

5 - 7 Lacs

Hyderabad, Chennai, Bengaluru

Work from Office

Role & responsibilities Hands-on experience with implementation of Microsoft DLP technology across a large enterprise Experience in DLP security solutions covering DLP Endpoint, Discover, Web & Email. Design and implementation of AIP solution Expertise on design and implementation of Sensitivity labels, DLP policies Expertise in Cloud Data Protection using MCAS Expertise in configuration of AIP Scanner Expertise in Discovery and Classification of data across repositories using AIP solution Expertise to fine-tune DLP, AIP and MCAS policies to reduce false detection Provide advice on Data Secuirty compliance and regulations to reduce risk. Administration of the DLP tools to include configuration of policies, upgrading, patching etc. Experience to troubleshoot Microsoft DLP, AIP and MCAS issues Monitor and respond to alerts generated from the Microsoft DLP, AIP & MCAS technologies. Understand and follow the incident response process through event escalations. Collaborate with business groups to help them identify, classify and secure high value data. Implementation of proactive measures to enhance accuracy and effectiveness of Data Security tools. Create, review, maintain and update documentation including Documenting & Publishing fixes in central knowledge base. Work with global teams to provide consistent processes and solutions. Excellent presentation and written communication skills with strong interpersonal skills Good understanding on cloud security concepts Good understanding of organizational network architecture Experience in maintaining various metrices and SLAs

Posted 2 months ago

Apply

3 - 8 years

5 - 10 Lacs

Gurugram

Work from Office

Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Endpoint Protection Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Job Summary :We are seeking a skilled Beyond Trust Endpoint Privilege Management (EPM) Specialist to join our IT security team. The ideal candidate will be responsible for implementing, managing, and optimizing Beyond Trust EPM solutions on Windows 10 and Windows 11 environments. This role focuses on enhancing security by managing and controlling administrative privileges on endpoints, reducing attack surfaces, and ensuring compliance with security policies.Key Responsibilities: Implementation and Configuration:oDeploy and configure Beyond Trust EPM solutions on Windows 10 and Windows 11 systems.oCustomize EPM policies to meet organizational security requirements and best practices.oIntegrate Beyond Trust EPM with existing IT infrastructure and security tools. Privilege Management:oDevelop and enforce policies for least privilege access on endpoints.oMonitor and manage user and application privileges to prevent unauthorized access.oCreate and maintain whitelists and blacklists for applications and processes. Security and Compliance:oEnsure endpoint security compliance with organizational policies and regulatory requirements.oConduct regular audits of privileged access and generate compliance reports.oCollaborate with security and compliance teams to address findings and improve security posture. Monitoring and Reporting:oSet up and maintain monitoring and alerting systems for privileged access activities.oAnalyze and respond to security incidents related to privileged access.oGenerate regular reports on EPM activities, incidents, and compliance status. User Training and Support:oProvide training and support to end-users and IT staff on EPM policies and procedures.oAssist in troubleshooting and resolving issues related to EPM solutions.oDevelop and update documentation and training materials. Continuous Improvement:oStay up to date with the latest security threats, trends, and technologies.oRecommend and implement improvements to EPM policies and configurations.oParticipate in security assessments and risk management activities. Qualifications: Education:oBachelor's degree in information technology, Computer Science, Cybersecurity, or related field. Relevant certifications and experience may be considered in lieu of a degree. Experience:oProven experience in implementing and managing Beyond Trust EPM solutions.oStrong knowledge of Windows 10 and Windows 11 operating systems.oExperience with endpoint security and privilege management. Skills and Competencies:oDeep understanding of least privilege access principles and practices.oProficiency in configuring and managing EPM policies and rules.oFamiliarity with Active Directory, Group Policy, and other endpoint management tools.oExcellent troubleshooting and problem-solving skills.oStrong communication and interpersonal skills.oAbility to work independently and as part of a team. Certifications:oRelevant certifications such as Beyond Trust Certified Engineer (BTCE), Certified Information Qualifications 15 years full time education

Posted 2 months ago

Apply

3 - 6 years

9 - 13 Lacs

Mumbai

Work from Office

Senior Cyber Security Analyst - IND005A Company Worley Primary Location IND-MM-Mumbai Other Locations IND-KR-Bangalore, IND-AP-Hyderabad, IND-MM-Pune, IND-MM-Navi Mumbai Job Cyber Security Schedule Full-time Employment Type Employee Job Level Experienced Job Posting Apr 21, 2025 Unposting Date May 21, 2025 Reporting Manager Title Manager We deliver the worlds most complex projects Work as part of a collaborative and inclusive team Enjoy a varied & challenging role Building on our past. Ready for the future Worley is a global professional services company of energy, chemicals and resources experts headquartered in Australia. Right now, were bridging two worlds as we accelerate to more sustainable energy sources, while helping our customers provide the energy, chemicals and resources that society needs now. We partner with our customers to deliver projects and create value over the life of their portfolio of assets. We solve complex problems by finding integrated data-centric solutions from the first stages of consulting and engineering to installation and commissioning, to the last stages of decommissioning and remediation. Join us and help drive innovation and sustainability in our projects. The Role As a Senior Cyber Security Analyst with Worley, you will work closely with our existing team to deliver projects for our clients while continuing to develop your skills and experience etc. We are seeking a Senior Cyber Security Analyst -a Subject Matter Expert (SME)- to join our Information Security team. The ideal candidate will be responsible for designing, implementing, monitoring, reacting, and reporting on information security events within the DLP scope. Additionally, the role includes managing security tools and IT systems with a special focus on DLP enablement. DLP Strategy & Policy Design Serve as a Subject Matter Expert (SME)for DLP solutions, technologies, and best practices. Design, implement, and optimize DLP policiesto detect and prevent unauthorized access, sharing, and data exfiltration. Define and maintain DLP governance frameworks, aligning with regulatory requirements Identify sensitive data requiring protection across endpoints, cloud, email, and network. Implementation & Configuration Deploy and configure DLP controlsto monitor, alert, and block potential data leaks. Define and enforce DLP rules for structured & unstructured data, including Personally Identifiable Information (PII), Intellectual Property (IP), and financial data. Integrate DLP solutions with other security tools. Monitoring& Continuous Improvement Monitor and analyzeDLP alerts and incidents, identifying trends and areas for improvement. Ensuring DLP alerts and incidentsget routed to monitoring/response processes in accordance with defined internal procedures Perform regular tuning and updatesto enhance detection accuracy and reduce false positives. Develop automated response actionsto mitigate risks and ensure business continuity. Compliance & Stakeholder Collaboration Ensure compliance with data protection regulations and industry security standards. Collaborate with cross-functional teams to resolve complex technical issues and to align DLP policies with business needs. Provide guidance and training to employees on DLP policies, security best practices, and insider threat awareness. Reporting & Documentation: Define and generate DLP metric supporting the reporting needs across the organization Document DLP configurations, policies, and operational procedures. Provide technical recommendationsto enhance data security strategies. About You To be considered for this role it is envisaged you will possess the following attributes: Ability to balance security measures with business needs A proactive approach to identifying and mitigating data loss risks before they become security incidents Proven experience with DLP solutions (e.g., Microsoft Purview, Symantec, Forcepoint, McAfee/Trellix, Digital Guardian, Zscaler). Strong knowledge of DLP policies, rules, content inspection techniques, and data classification models. Experience working with cloud-based DLP (e.g., CASB, SaaS security, O365 DLP, Google Workspace DLP) Understanding of network security, endpoint security, and encryption techniques. Familiarity with SIEM, SOC workflows, and incident response processes. Moving forward together We want our people to be energized and empowered to drive sustainable impact. So, our focus is on a values-inspired culture that unlocks brilliance through belonging, connection and innovation. Were building a diverse, inclusive and respectful workplace. Creating a space where everyone feels they belong, can be themselves, and are heard. And we're not just talking about it; we're doing it. We're reskilling our people, leveraging transferable skills, and supporting the transition of our workforce to become experts in today's low carbon energy infrastructure and technology. Whatever your ambition, theres a path for you here. And theres no barrier to your potential career success. Join us to broaden your horizons, explore diverse opportunities, and be part of delivering sustainable change. Worley takes personal data protection seriously and respects EU and local data protection laws. You can read our full Recruitment Privacy Notice Please noteIf you are being represented by a recruitment agency you will not be considered, to be considered you will need to apply directly to Worley.

Posted 2 months ago

Apply

12 - 15 years

12 - 17 Lacs

Pune

Work from Office

About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Job Title - Azure Security Architect Experience - 12-15 years Technical Qualification/ Knowledge Hands-on knowledge on Azure security technologies and associated components and variations Azure Security Center, Azure Monitor, Log Analytics, Sentinel or any other SIEM integration Azure NetworkingVNET, Network Security Group (NSG), VNet peering, Azure Firewall Azure Storage Securitystorage accounts, managed disks, blobs, encryption at rest and in-transit, Azure KeyVault, Azure Active Directory, RBAC, MFA, SAML, Conditional Access, Managed Identity. Azure Load Balancers, WAF, Application Gateway, Availability Sets/Scale Sets Knowledgeable about Windows Operating System, Server hardening, Group Policies, event and log management Design, implement and support Microsoft Defender for O365 with Azure Information Protection and MS DLP for O365 and Endpoint Experience in deploying MDATP for Servers Experience with multiple security tools and technologies including Next-Gen Firewalls (Palo Alto), McAfee ePO, DLP, CrowdStrike, ZScaler, Vulnerability Assessment (Tenable.io) Ability to lead to troubleshooting of cloud security issues, detect and confirm anomalies, identify risks, perform root cause analysis Skilled in Graph API, Azure CLI / PowerShell automation experience Should be able to create, update, retry and delete Azure AD objects via PowerShell, Azure CLI Understanding of the Azure Subscription and Migration activities will be added advantages. Additional Qualifications and Experience Cloud Security certifications Microsoft certificationsAZ-900, AZ-500 , MS-900, MS-500, AZ-30X, SC200 – 300. Familiarity with Zero Trust principles

Posted 2 months ago

Apply

17 - 21 years

11 - 15 Lacs

Bengaluru

Work from Office

About The Role – Cyber Security Lead This is a senior level role that needs expertise in leading a security team to design & implement solutions, adherence to various compliance policies & regulations and managing the security technologies effectively that will enhance overall security across the enterprise. Need to have specialization in various security technology to support overall security operations for Data, Cloud & network security and strategic thinking with a hands-on approach to problem-solving, excellent stakeholder management, communication skills, proven experience driving cross-functional cybersecurity initiatives, continuously identify risks and enforce robust security controls that should result in an improved security posture without compromising on end user experience. Technology Expertise and leadership skills Lead the Cybersecurity operations team with a strong focus on DLP, Data protection, Cloud & Network security governance. Hand-on experience on security tool governance and control effectiveness to maintain the compliance on Data protection, Cloud & network security control. Expertise on security control program (Email security, Data protection, Network & Cloud security) and drive continuous improvements. Define, develop & execute cybersecurity strategies aligned with Business goals and regulatory requirements. Good understanding on Perimeter security control, Lateral movement, Web security & private access, Clou security posture & data security management, DLP operation & Incident management. Proven experience on security controls implementation, operation monitoring on data classification, data handling and sensitive data movement across the endpoints, cloud & network. Provides expertise and guidance on potential issues & risks remediations, enhancements, or delay experience in technology security areas to include cloud, data, storage, data access management, and emerging technologies resilience activities (Endpoint, Network security), security standards, policies & procedures, and control frameworks. Participate in security architecture review, security control assessment & support Audit. Expertise on operation management & governance to meet SLA metrics, health & compliance dashboards readiness, and reporting to the leadership. Strong leadership and team-building abilities. Education Bachelor or Master’s degree in computer science, Information Security, Cybersecurity, or a related field Relevant certifications such as CISM, CISSP, CISA or equivalent are highly desirable Experience 15+ years of experience in cybersecurity with at least 5 years in a team lead role. Proven track record of implementation and executing cybersecurity strategies & governance in a complex & fast paced environment In-depth knowledge of cybersecurity tools, technologies, best practices. About The Role ? ? ? ? About The Role – Cyber Security Lead This is a senior level role that needs expertise in leading a security team to design & implement solutions, adherence to various compliance policies & regulations and managing the security technologies effectively that will enhance overall security across the enterprise. Need to have specialization in various security technology to support overall security operations for Data, Cloud & network security and strategic thinking with a hands-on approach to problem-solving, excellent stakeholder management, communication skills, proven experience driving cross-functional cybersecurity initiatives, continuously identify risks and enforce robust security controls that should result in an improved security posture without compromising on end user experience. Technology Expertise and leadership skills Lead the Cybersecurity operations team with a strong focus on DLP, Data protection, Cloud & Network security governance. Hand-on experience on security tool governance and control effectiveness to maintain the compliance on Data protection, Cloud & network security control. Expertise on security control program (Email security, Data protection, Network & Cloud security) and drive continuous improvements. Define, develop & execute cybersecurity strategies aligned with Business goals and regulatory requirements. Good understanding on Perimeter security control, Lateral movement, Web security & private access, Clou security posture & data security management, DLP operation & Incident management. Proven experience on security controls implementation, operation monitoring on data classification, data handling and sensitive data movement across the endpoints, cloud & network. Provides expertise and guidance on potential issues & risks remediations, enhancements, or delay experience in technology security areas to include cloud, data, storage, data access management, and emerging technologies resilience activities (Endpoint, Network security), security standards, policies & procedures, and control frameworks. Participate in security architecture review, security control assessment & support Audit. Expertise on operation management & governance to meet SLA metrics, health & compliance dashboards readiness, and reporting to the leadership. Strong leadership and team-building abilities. Education Bachelor or Master’s degree in computer science, Information Security, Cybersecurity, or a related field Relevant certifications such as CISM, CISSP, CISA or equivalent are highly desirable Experience 15+ years of experience in cybersecurity with at least 5 years in a team lead role. Proven track record of implementation and executing cybersecurity strategies & governance in a complex & fast paced environment In-depth knowledge of cybersecurity tools, technologies, best practices.

Posted 2 months ago

Apply

8 - 10 years

12 - 17 Lacs

Bengaluru

Work from Office

About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Symantec DLP. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 2 months ago

Apply

1 - 3 years

6 - 10 Lacs

Hyderabad

Work from Office

Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: Symantec DLP. Experience1-3 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 2 months ago

Apply

2 - 6 years

5 - 9 Lacs

Hyderabad

Work from Office

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT ? ? Experience in wide range of DLP services - MIP/AIP, DAR, Policy . DLP policy - design, development, maintenance and fine tuning. Good stakeholder engagement experience - involvement in multiple projects. Good understanding of data controls and risk assessment. Experience in implementation of case management tool for DLP tickets. DLP tool - McAfee, Symantec.

Posted 2 months ago

Apply

2 - 5 years

11 - 16 Lacs

Sahibzada Ajit Singh Nagar

Work from Office

About Zscaler Serving thousands of enterprise customers around the world including 40% of Fortune 500 companies, Zscaler (NASDAQ: ZS) was founded in 2007 with a mission to make the cloud a safe place to do business and a more enjoyable experience for enterprise users. As the operator of the world’s largest security cloud, Zscaler accelerates digital transformation so enterprises can be more agile, efficient, resilient, and secure. The pioneering, AI-powered Zscaler Zero Trust Exchange™ platform, which is found in our SASE and SSE offerings, protects thousands of enterprise customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Named a Best Workplace in Technology by Fortune and others, Zscaler fosters an inclusive and supportive culture that is home to some of the brightest minds in the industry. If you thrive in an environment that is fast-paced and collaborative, and you are passionate about building and innovating for the greater good, come make your next move with Zscaler. At Zscaler, our Customer Success Organization is a global, customer-focused team dedicated to delivering high-impact experiences and identifying innovative solutions. We leverage valuable data and research to provide expert, hands-on support starting from the implementation phase and beyond, ensuring customers achieve their goals and leverage our technology to its fullest potential. Together, we create a customer-centric culture that fosters success, adoption, and continuous growth. We're looking for an experienced DLP Engineer to join our Customer Success team. Reporting to the Product Support Manager, you'll be responsible for: Providing Level II technical support for DLP solutions, including incident resolution, troubleshooting, and root cause analysis Assisting customers with DLP-related issues via phone, email, and remote sessions, ensuring timely and effective resolution Managing and prioritizing support cases, ensuring SLAs are met and customer satisfaction is maintained while resolving the customers’ issues Maintaining detailed documentation of support activities, including case notes, troubleshooting steps, and resolutions Contributing to the development and maintenance of a knowledge base, including creating and updating technical articles and FAQs What We're Looking for (Minimum Qualifications) Bachelor’s degree in Computer Science, Information Technology, or a related field, or equivalent work experience Minimum of 3-5 years of experience in technical support, with at least 2 years focused on DLP/CASB solutions Proficiency in DLP technologies and tools (e.g., Symantec DLP, McAfee DLP, Forcepoint DLP, etc.) What Will Make You Stand Out (Preferred Qualifications) Relevant certifications (CompTIA Security+, DLP vendor certifications) are a plus #LI-HYBRID #LI-RR1 At Zscaler, we are committed to building a team that reflects the communities we serve and the customers we work with. We foster an inclusive environment that values all backgrounds and perspectives, emphasizing collaboration and belonging. Join us in our mission to make doing business seamless and secure. Our Benefits program is one of the most important ways we support our employees. Zscaler proudly offers comprehensive and inclusive benefits to meet the diverse needs of our employees and their families throughout their life stages, including: Various health plans Time off plans for vacation and sick time Parental leave options Retirement options Education reimbursement In-office perks, and more! By applying for this role, you adhere to applicable laws, regulations, and Zscaler policies, including those related to security and privacy standards and guidelines. Zscaler is committed to providing equal employment opportunities to all individuals. We strive to create a workplace where employees are treated with respect and have the chance to succeed. All qualified applicants will be considered for employment without regard to race, color, religion, sex (including pregnancy or related medical conditions), age, national origin, sexual orientation, gender identity or expression, genetic information, disability status, protected veteran status, or any other characteristic protected by federal, state, or local laws. See more information by clicking on the Know Your Rights: Workplace Discrimination is Illegal link. Pay Transparency Zscaler complies with all applicable federal, state, and local pay transparency rules. Zscaler is committed to providing reasonable support (called accommodations or adjustments) in our recruiting processes for candidates who are differently abled, have long term conditions, mental health conditions or sincerely held religious beliefs, or who are neurodivergent or require pregnancy-related support.

Posted 2 months ago

Apply

4 - 8 years

10 - 15 Lacs

Hyderabad

Work from Office

Arcadis is the world's leading company delivering sustainable design, engineering, and consultancy solutions for natural and built assets. We are more than 36,000 people, in over 70 countries, dedicated toimproving quality of life. Everyone has an important role to play. With the power of many curious minds, together we can solve the worlds most complex challenges and deliver more impact together. Role accountabilities: Collaboration Proactively engages with Key Business Users to receive feedback, gauge satisfaction with system integrations, and address issues or concerns. Collaborates with OTE Application & Extension Manager to gather requirements and prioritize data transformation projects. Collaborates with OTE Team to deliver efficient and well-run processes. Application & Extension Services Supports development including: RequiredAPI Management RequiredDatabase Schema Design Ensures API endpoints conform to industry best practices and Oracle guidelines with focus on enterprise security and data privacy. Responsible for solution capacity planning, technical documentation, design review, refactoring and consolidation, upgrades and lifecycle for solutions. Establishes proactive application monitoring, alerting, and automating which adheres to industry best practices to ensure availability and performance to meet business demands. Coordinates with release manager the schedule of release activities across environments, teams, and vendors, identifying and resolving conflicts to minimize risk of business disruption. Accountable for incident and problem responses and resolutions, as well as service request queues to deliver high end-user satisfaction. Vendor Management Coordinates with 3rd parties who provide support for product enhancements, upgrades, patches and application monitoring. Key Profile Requirements Minimum of 8 years experience developing API endpoints, at least 4 of which with Oracle Cloud application services. Demonstrated experience successfully planning and implementing Cloud application services in a global company with a multi-national, multi-vendor environment. "‹Proven track record of achieving service excellence, including maintaining positive stakeholder relationships and coordinating multi-disciplinary teams with internal and external resources. Why Arcadis? We can only achieve our goals when everyone is empowered to be their best. We believe everyone's contribution matters. Its why we are pioneering a skills-based approach, where you can harness your unique experience and expertise to carve your career path and maximize the impact we can make together. Youll do meaningful work, and no matter what role, youll be helping to deliver sustainable solutions for a more prosperous planet. Make your mark, on your career, your colleagues, your clients, your life and the world around you. Together, we can create a lasting legacy. Join Arcadis. Create a Legacy. Our Commitment to Equality, Diversity, Inclusion & Belonging We want you to be able to bring your best self to work every day, which is why we take equality and inclusion seriously and hold ourselves to account for our actions. Our ambition is to be an employer of choice and provide a great place to work for all our people.

Posted 2 months ago

Apply

4 - 7 years

6 - 16 Lacs

Mumbai

Work from Office

The Information Security program protects Burns & McDonnell data, systems, and employees from evolving cyber threats with focus on continually reducing cybersecurity risk for the company. The Senior Information Security Analyst functions as a subject matter expert in evaluating the overall security posture. They will assess and identify vulnerabilities, analyze risks, and recommend solutions to mitigate these risks. Responsibilities : Risk Assessment: Conduct regular assessments of the organization's cybersecurity measures to identify vulnerabilities and risks. Monitoring and Analysis: Use various tools to monitor networks and systems for security breaches or intrusions. Analyze security breaches to understand their root causes. Incident Response: Play a key role in responding to security incidents and breaches, including assisting with investigations and remediation efforts. Reporting: Prepare detailed reports on security issues, such as breach incidents, current risk status, and improvement recommendations. Policy Development Support: Assist in developing and updating the organization's security policies and procedures based on the findings and evolving threat landscape. Training: Perform security awareness training program related to phishing campaigns. All other duties as assigned. - Bachelor's degree in Information Security, Computer Science, Computer Engineering, Information Technology, or related field. Minimum 8 years of experience in Information Security. Information Security certification (CISSP, GSEC, Security+) Demonstrated expert knowledge with two or more Information Security technologies such as EDR, IPS, SIEM, SOAR, CASB, CAASM, IAM, PAM, NAC, MFA, and DLP Broad understanding of network and security protocols such as, DNS, SPF/DKIM/DMARC, SSL/TLS, TCP/UDP, IPSec. Experience with CIS Critical Security Controls, OWASP Top 10, and MITRE ATT&CK framework. Demonstrated knowledge and experience of securing cloud environments such as Azure, AWS, and GCP. Broad experience and familiarity with Information Technology such as routers, load balancers, web application gateways, PKI, and Active Directory. Demonstrated knowledge of compliance frameworks (ISO 27001, SOC 2, NIST, FedRAMP, etc.). Demonstrated ability to evaluate cybersecurity risk and propose risk mitigations to technical and non-technical audiences. Highly effective oral and written communication skills with ability to convey security concepts and risks to non-technical personnel.

Posted 2 months ago

Apply

5 - 10 years

4 - 8 Lacs

Bengaluru

Work from Office

We are looking for a skilled Email Security Engineer with 5 to 10 years of experience to join our team in Bengaluru. The ideal candidate will have a strong focus on Microsoft Defender for Office 365 (MDO) technologies and be able to enhance email security, optimize delivery, and integrate various security technologies and protocols. ### Roles and Responsibility Architect, implement, and manage solutions with a focus on Microsoft Defender for Office 365 (MDO), including anti-phishing policies, safe links, and attachments. Configure and optimize MDO services and integrate with other security solutions such as Cisco, Proofpoint, and Fortra. Implement and manage protections for Microsoft Teams, SharePoint, and OneDrive. Manage email authentication protocols (SPF, DKIM, DMARC) and implement encryption solutions like S/MIME and Office 365 Message Encryption. Handle L4 email security incidents, develop incident response plans, and provide technical guidance. Monitor systems, analyze metrics, and optimize for performance and compliance. Conduct proof of concepts (PoCs), product evaluations, and manage requests for comment (RFCs). Prepare and deliver presentations to leadership and support the security awareness training program. Work independently on projects from conception to completion and manage vendor relationships. ### Job Requirements Bachelor’s degree in Computer Science, Information Security, or related field, or equivalent work experience. Minimum 5 years of experience in email security engineering, with proven experience in incident response and managing security solutions. Strong analytical, problem-solving, and communication skills. Ability to collaborate effectively with diverse teams and deliver presentations to senior leadership. Proficiency in PowerShell, Python, and understanding of network protocols (TCP/IP, SMTP, etc.). Expertise in Microsoft Exchange Online and Defender for Office 365. Proficient in email security tools and platforms, anti-spam, malware detection, phishing prevention, encryption, and DLP. Experience with SPF, DKIM, DMARC, and email security solutions from Cisco, Proofpoint, and Fortra. Knowledge of MDO protections for Teams, SharePoint, and OneDrive. Desired Certifications: CISSP, CESS, or Microsoft 365 Certified: Security Administrator Associate. ### Additional Information Occasional on-call support or off-hours work may be required. Join our team and play a vital role in safeguarding our organization's email communication against emerging threats. If you are passionate about email security, possess strong technical skills, and are committed to maintaining a secure digital environment, we encourage you to apply.

Posted 2 months ago

Apply

10 - 15 years

15 - 20 Lacs

Noida

Work from Office

We are looking for a skilled professional with 10 to 15 years of experience to join our team as an EY Data Protection & Privacy – Technology Consulting Manager in Bengaluru. ### Roles and Responsibility Develop, deliver, and lead cybersecurity and IT risk client engagements globally. Identify potential business opportunities for EY and GDS within existing engagements. Anticipate and identify risks within engagements and escalate them to senior management. Ensure high-quality work by following EY's quality standards. Foster teamwork and lead by example, contributing to people-related initiatives. Maintain an educational program to continually develop personal skills of staff. ### Job Requirements BE - B. Tech / MCA / M. Tech / MBA with a background in computer science and programming. More than 10 years of relevant experience in data protection and privacy. Strong Excel and PowerPoint skills, along with excellent analytical skills and knowledge of data analytics methods. Demonstrated leadership abilities and excellent interpersonal, written, verbal, communication, and presentation skills. Experience in managing large teams to deliver Cyber services or complex projects. Review of Data Protection & Privacy engagements during different phases of the lifecycle – assess, design, and implementation. Develop strategic and tactical Data security remediation recommendations / cyber risk roadmap to address identified security gaps. Hands-on experience with key components of Cyber Security including (but not limited to): Information Security concepts related to Governance, Risk & Compliance DLP/Data Classification/CASB/DAM, Encryption, Tokenization, PKI, CLM Technology support and Event Handling Regulations/standards such as ISO 27001, PCI DSS, HIPAA, HITRUST, GDPR, CCPA Extend required support for any reported data protection and privacy incidents such as information breaches and leakages. Ability to guide teams through the design and implementation of Data security solutions that reduce vulnerability, strengthen controls and optimize organizational efficiency In-depth knowledge of general security concepts, such as defense-in-depth, least privilege, security architecture and design, etc. Develops budget, scope, and staffing recommendations based on understanding of client budget and project economics

Posted 2 months ago

Apply

5 - 8 years

13 - 18 Lacs

Mumbai

Work from Office

We are looking for a highly skilled and experienced Cyber Security Consultant to join our team in Bengaluru. The ideal candidate will have 5-8 years of experience in supporting Data Security Technology, with a strong background in Information Security concepts related to Governance, Risk & Compliance. ### Roles and Responsibility Build and deploy DATA PROTECTION solution concepts and deployment requirements. Deploy and administer endpoint protection tools. Collaborate with vendors to support DATA PROTECTION technology, including troubleshooting and upgrades. Monitor and respond to alerts from Data Protection systems and other technologies. Follow incident response processes through event escalations. Respond to escalations by the Incident Response Team. Maintain leading DATA LOSS PREVENTION/CASB systems. Assist clients in privacy-related incident response activities and support their teams as an interim member (e.g., security officer, security manager, security analyst). ### Job Requirements Bachelor's or master’s degree in Computer Science, Information Systems, Engineering, or a related field. At least 5-8 years of experience in supporting Data Security Technology. Experience in administering DLP, CASB tools, including configuring policies, upgrading, and patching for leading vendors such as Digital Guardium, McAfee, Forcepoint, Netskope, Symantec CloudSOC, MCAS, etc. Technical/Vendor certification is an added advantage. Knowledge of core Information Security concepts related to Governance, Risk & Compliance. Ability to work independently and adapt to a changing environment. Demonstrated integrity in a professional setting. Strong analytical and problem-solving skills. Excellent verbal and written communication skills. Proficient in documentation and PowerPoint. Good social, communication, and technical writing skills. Ability to interface with internal and external clients. Flexible to work on rotational shifts and some weekend work may be required based on job needs. Professional certificate or active pursuit of related professional certifications such as CompTia Security+, CEH, CISSP, or Vendor/Technical certification; certified candidates are expected to complete one of the business-required certifications within 12 months of hire.

Posted 2 months ago

Apply

4 - 8 years

7 - 9 Lacs

Bengaluru

Work from Office

Job Summary We are seeking a skilled IT professional with hands-on experience in managing Google Workspace, securing email infrastructure, and handling endpoint/user device management. The ideal candidate will be responsible for ensuring smooth collaboration through Google Workspace, protecting email systems from threats, and maintaining secure and compliant end-user computing environments. Skill Set 4 - 8 years of experience in IT systems administration or similar role. Proven experience managing Google Workspace for a mid-to-large user base. Solid understanding of email security protocols (SPF, DKIM, DMARC). Experience with email security platforms and endpoint management tools. Strong troubleshooting skills and familiarity with ITIL-based service management. Excellent communication and documentation skills . Roles and Responsibilities Google Workspace Administration Manage user accounts, groups, and organizational units. Implement and maintain Google Workspace security and compliance settings (DLP, Vault, SSO, etc.). Automate routine administration tasks using GAM or Google Admin SDK. Email Security & Compliance Deploy and manage email security tools (e.g., Mimecast, Proofpoint, Google Advanced Protection). Monitor and respond to email-based threats such as phishing, spoofing, and malware. Define and enforce SPF, DKIM, DMARC policies. Collaborate with the InfoSec team for email compliance and retention policies. Endpoint/User Device Management Manage and monitor endpoints across operating systems (Windows, macOS, ChromeOS). Deploy and manage MDM/EMM solutions (e.g., Google Endpoint Management, Intune, Jamf). Enforce device compliance policies, encryption, and remote wipe capabilities. Provide Tier 2/3 support for device-related issues. Operational & Security Hygiene Maintain IT asset inventory and ensure timely patching and updates. Document system configurations, procedures, and support materials. Participate in incident response and root cause analysis for device and email-related incidents.

Posted 2 months ago

Apply

3 - 7 years

5 - 9 Lacs

Gurugram

Work from Office

AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation. AtAHEAD, we prioritize creating a culture of belonging,where all perspectives and voices are represented, valued, respected, and heard. We create spaces to empower everyone to speak up, make change, and drive the culture at AHEAD. We are an equal opportunity employer,anddo not discriminatebased onan individual's race, national origin, color, gender, gender identity, gender expression, sexual orientation, religion, age, disability, maritalstatus,or any other protected characteristic under applicable law, whether actual or perceived. We embraceall candidatesthatwillcontribute to the diversification and enrichment of ideas andperspectives atAHEAD. Requirements: Proficient with Active Directory and related concepts Familiar with access control methods (RBAC/ABAC) Working knowledge of identity lifecycle management processes and challenges Hands-on experience with cybersecurity tools that function in the following spacesPAM / PIM / IAM, DLP, SOAR (XSIAM), Microsoft Security, AWS Security, Red Teaming / AppSec, Isolated Recovery Environments (IREs) Experience with identity federation and SSO solutions PAM experience or familiarity with specific vendor tools Able to speak to PAM best practices Understanding of the principle of least privilege, separation of duties Experience with REST API and app integration Experience configuring, guiding, or overseeing access review and certification, role management Past participation in identity steering committee Understanding of PIM, JIT, conditional access Familiarity with US compliance and regulatory frameworks that inform identity requirements Qualifications: 6+ years of working knowledge of one or more Identity-Based Security SolutionsOkta, Sailpoint, Delinea, BeyondTrust, CyberArk, etc. Any of the following preferred but not required Security+, CISSP, any vendor-specific certifications related to Identity products Willingness to travel to support client projects and shadowing opportunities (50+ % of the time) Why AHEAD: Through our daily work and internal groups like Moving Women AHEAD and RISE AHEAD, we value and benefit from diversity of people, ideas, experience, and everything in between. We fuel growth by stacking our office with top-notch technologies in a multi-million-dollar lab, by encouraging cross department training and development, sponsoring certifications and credentials for continued learning. USA Employment Benefits include - Medical, Dental, and Vision Insurance - 401(k) - Paid company holidays - Paid time off - Paid parental and caregiver leave - Plus more! See benefits https://www.aheadbenefits.com/ for additional details. The compensation range indicated in this posting reflects the On-Target Earnings (OTE) for this role, which includes a base salary and any applicable target bonus amount. This OTE range may vary based on the candidates relevant experience, qualifications, and geographic location.

Posted 2 months ago

Apply

8 - 12 years

20 - 35 Lacs

Chennai, Bengaluru, Mumbai (All Areas)

Work from Office

Preferred candidate profile End Point Security Defender , Trend Micro - Server Identity and Access Management Sailpoint , Dilenea PAM , Microsoft PKI , Active directory Data Security Data Classification , DLP - MS pureview ,Imperva - Database activitiy monitoring , Data encryiption and clous app security

Posted 2 months ago

Apply

3 - 5 years

15 - 20 Lacs

Noida

Work from Office

Title: Information Security Cyber Security Data Loss Prevention - About Us : Paytm Payments Services Limited houses the Paytm payment gateway business which enables thousands of online merchants to offer world class frictionless payment experience to their customers. We are present across large enterprises and startups including well known unicorns alike. We strive to take payments beyond an enabler and an instrument to drive revenue and user growth for our merchants. Online Payment Gateway is Paytms B2B Business regulated by RBI as it allows only authorized entities to conduct PA PG (Payment Aggregator Payment Gateway) business. This business is responsible for growing the penetration of Paytms PA PG business in the Indian merchants. About the Team: - The Information Security team at Paytm Payments Services limited plays a critical role in shaping the companys information security strategy, infrastructure, and capabilities. The team helps the organization to identify current cybersecurity risks, threats, and vulnerabilities. To effectively implement the cybersecurity GRC program, PPSL is planning to add dedicated resources for information security Tool/Technologies like Data loss prevention, Cloud Security and SOC (Security operations) etc. About the Role: - PPSL's Cyber Security team is looking for Data Protection Engineer who will be responsible for configuring and improving DLP policies on multiple tools, working towards increasing DLP Program coverage, crafting and maintaining DLP Program process documentation, defining new processes and controls to further mature the DLP Program, and addressing gaps that impact the DLP process. You must have prior experience implementing cross-organizational DLP solutions and willing to go beyond the routine. Expectations/ Requirements: - Serves as SME for Forcepoint DLP tools. Establish data discovery, classification, tagging and content inspection solutions to help mitigate the risk of data loss and minimize the risks of data breaches. Define new and enhance existing DLP policies in multiple tools and have good knowledge on Forcepoint, AIP and other DLP tools Tune DLP policies on a continuous basis to maintain a mature set of policies within the scope of the DLP Program. Execute discovery scans and drive incident remediation as per defined processes. Partner with teams as needed to enhance DLP monitoring / response processes on an ongoing basis. Provide support in defining and building upon metrics and reporting to enhance understanding of DLP Program development and maturity. Scheduled maintenance activities to keep the infrastructure components robust with latest patches and updated versions of software running in the infrastructure stack. Support the DLP team in further expanding upon the established DLP Program by defining additional processes / controls for continuous risk reduction purposes and to meet the program objectives. Participate and contribute in Risk Management and Internal Audit discussions, actively document process and technology evidence to support Risk partners. Daily ticket management (change/service request) Handling the DLP incident as per defined SLA DLP Solution Implementation: Deploying and configuring Forcepoint DLP solutions and tools to monitor and protect data across an organization's network, endpoints, and cloud environments. Policy Development: Developing DLP policies and rules that define how data should be handled and protected, including identifying sensitive data types and their allowable use. Data Discovery: Scanning and identifying sensitive data within an organization, classifying it, and creating an inventory of sensitive data assets. Incident Detection and Response: Monitoring data flows and traffic for policy violations and security incidents, and responding to incidents by taking necessary actions, such as blocking data transfers. User Education and Training: Providing training and guidance to employees on data protection policies and best practices to prevent data breaches. Compliance and Regulations: Ensuring that the organization complies with data protection regulations and industry-specific standards by implementing DLP controls. Risk Assessment: Identifying data security risks and vulnerabilities and developing strategies to mitigate them. Security Awareness: Staying up to date with the latest threats, vulnerabilities, and trends in data security and DLP technologies. Qualifications: - 3-5+ years of relevant work experience with a bachelors degree Superpowers/ Skills that will help you succeed in this role: - Relevant security certifications such as Forcepoint DLP, CEH, CISSP etc. are a major plus. Experience with Forcepoint DLP, implementing endpoint and network security solutions in an enterprise and strong experience with DLP platforms and controls. Have excellent communication and interpersonal skills. Should be a team player Excellent understanding of cyber security concepts. Why join us: - A collaborative output driven program that brings cohesiveness across businesses through technology Improve the average revenue per use by increasing the cross-sell opportunities A solid 360 feedback from your peer teams on your support of their goals Respect, that is earned, not demanded from your peers and manager Compensation: If you are the right fit, we believe in creating wealth for you With enviable 500 mn+ registered users, 21 mn+ merchants and depth of data in our ecosystem, we are in a unique position to democratize credit for deserving consumers & merchants and we are committed to it. Indias largest digital lending story is brewing here. Its your opportunity to be a part of the story!

Posted 2 months ago

Apply

12 - 17 years

14 - 19 Lacs

Gurugram

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Palo Alto Networks Prisma Access Secure Access Service Edge (SASE) Good to have skills : NA Minimum 12 year(s) of experience is required Educational Qualification : 15 years full time education "Primary Skill :Good experience in security architecture design in Cloud and on-prem.Team management, Delegating responsibilities, Capablity development, Motivating team."Design and implementation in NGFW (PA/Fortinet/Checkpoint/cisco),Web Security( Zscaler, Symantec), in on-prem and Cloud, End point protection, multi-factor authenticationFirewall rule migration using tool and Data center migrationGood Hand-on Experience in AWS, Azure, GCP," Design and implementation experience of network security technologies - Next Generation Firewall (NGFW), Web Application Firewall (WAF), Intrusion Prevention / Detection System (IPS/IDS) - Fortigate / PaloAlto, F5, Imperva, Design and implementation experience of Endpoint Security Solutions - Antivirus, AntiMalware, Endpoint Detection and Response (EDR), Device Control, Vulnerability Protection, Application Control - Trend Micro, Crowdstrike, Sentinel One Design and implementation experience of Cloud Proxy Servers (Zscaler/NetSkope/ForcePoint/PaloAlto Prisma/McAfee) Design and implementation experience of Data Protection Solutions (Endpoint DLP, Network DLP (Email & Web), CASB) Design and implementation experience of Firewall Rule-set Analyzer Tools like Skybox / Algosec / Firemon / Tufin. Design and implementation experince of NAC solution ( Cisco ISE, Aruba) Data center migration experince and firewall rule migration using various tools." Hand-on experience in Azure/AWS design , Installation & configuration of various NGFW such as Paloalto, FortiGate, Checkpoint, Cisco, Prisma Cloud. End point protection as Symantec, Mcafee, Trend micro, EDR solution. Good Hands on experience and troubleshooting experience in NGFW such as Paloalto, Prisma, fortigate, Checkpoint, Cisco. End point protection as Symantec, Mcafee, Trend micro, EDR solution. Design and hands on experience to skybox, firemon, Tufin Firewall rule review tool, Firewall on-boarding Checkpoint, Cisco, Palo alto Certification, Cloud certification Experince on Infra Security tools Assessment and security standards like (NIST, CIS, ISO HIPPA & PCI DSS ) NAC, Cisco ISE, CASB Solution Netscope, Web security technologies as Zscaler,SymantecWeb security technologies as Zscaler, Symantec. Good conceptual and working knowledge around Workflow, Approval process.* Manageing and leading the team.* Good Articulation and presentation skills B.E or MCA or M.Sc with Good Computer Science Background with good academic record of 65% and above Presentation skill Qualifications 15 years full time education

Posted 2 months ago

Apply

3 - 6 years

5 - 8 Lacs

Bengaluru

Work from Office

Job Title - Security Delivery Associate Management Level: L13 or L12 Associate Location: Bengaluru Must have skills: Data Loss Prevention Good to have skills Understanding of computer hardware / operating systems (Windows, Linux, OS X, iOS/Android, etc.), IT Security, is a plus Job Summary :Accenture's Cyber Incident Response Team (CIRT) monitors the cyber threat landscape, coordinates prevention, detection, and corrective activities, and manages vulnerabilities and incidents. Within this organization, is the Data Loss Prevention team. This team responds to cyber-security incidents identified through the Data Loss Prevention (DLP) tool. By following a set process, the team is responsible for analyzing, collecting relevant details, determining the type of security incident, and escalating accordingly. The team works closely with other functions within CIRT to handle incidents. The team is also responsible for coordinating with numerous other teams who are involved with conducting follow-up investigations to such incidents. Roles & Responsibilities: Review DLP alerts appropriately, escalate and close cases in accordance with the team's defined process. Liaise with different functions within CIRT to gather information including Investigations, Infrastructure, ASOC, and Cyber Threat Intelligence. Coordinate with various teams during the escalation process, including Technology Support teams, Legal teams, HR, and other teams as defined in the escalation process. Keep all tracking and recording tools current and update incidents in tracking database with appropriate details in a timely manner. Perform incident accuracy checks within Incident Tracking database and update details when necessary. Effectively work and collaborate with a global team. Adapt to continuous process improvements and change requests as needed. Have strong communication skills; attention to detail and accuracy of information is paramount. Professional & Technical Skills: Above average problem-solving skills Excellent oral and written English communication skills Ability to manipulate and present data using MS Office and Excel Strong sense of ethics & values, ability to handle confidential situations with discretion Must be able to work collaboratively across physical locations or geographies Ability to multi-task and prioritize assigned workload Additional Information: Security+ Certification Experience working in Information Security domain Willing to work overtime, rotating shifts, work during weekends and holidays, as necessary

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies