Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
2.0 - 10.0 years
4 - 12 Lacs
Bengaluru
Work from Office
Designation: EndPoint Security Engineer Experience: 2-10 Years years Education: Any Graduate Location: Bengaluru Description: Trend Micro Antivirus, EDR (Endpoint Detection & Response)MDM (Mobile Device Management), DLP (Data Loss Prevention)Anti-Spam, Anti-APT (Advanced Persistent Threats)Vulnerability Management & PatchingKnowledge of ITIL Processes If you're passionate about securing endpoints and making a difference in cybersecurity, were looking for YOU!
Posted 3 weeks ago
2.0 - 6.0 years
8 - 9 Lacs
Mumbai
Work from Office
Diverse Lynx is looking for SOC Analyst to join our dynamic team and embark on a rewarding career journey. Monitor and analyze security events and incidents, identifying and investigating potential threats Maintain the security of our network and systems by implementing security controls and best practices Work closely with the rest of the security team to ensure that our systems and networks are secure and compliant with industry standards Maintain accurate documentation and reports on security events and incidents Communicate effectively with team members and other stakeholders to ensure that security issues are addressed in a timely and effective manner Stay up to date with the latest security technologies and threats
Posted 3 weeks ago
6.0 - 11.0 years
0 - 3 Lacs
Mumbai, Hyderabad
Work from Office
We are looking for candidates who could join our Information Technology vertical assist our Information Security and Governance team Role & responsibilities Develop policies in DLP system to monitor data exchange to external environment through emails, endpoints and web upload Investigation and conclusion of violation cases where data was exchanged externally Continuous improvement in existing DLP policies through the learnings from audits and violation cases Implementation & governance of OCR solution on DLP through Index Data Matching (IDM) Minimization of DLP violation cases through continuous improvement in existing DLP set up Incident management of DLP cases Regular interaction with internal stakeholders to close open incidents or audit observations on DLP Presentations for various management committees from DLP perspective Involvement in POC and discussions with DLP solution providers to upgrade/replace existing solution Support the Security Operations Center as subject matter expert and provide advice, training and technical support to internal/external stakeholders Mentor junior resources in DLP team Mandetory Skill Sets: Proven experience in implementation, maintenance and governance (min. 5-6 yrs relevant experience) of DLP solutions Technical skill sets to handle DLP system & understanding of infrastructure to support DLP system Strong understanding of Regulatory Guidelines on Data Privacy, Data Protection, DLP etc. Experience in internal stakeholders as well as vendor handling, monitoring, implementing processes Desirable Skills: Knowledge on retail loan sector/NBFC processes Good writing and communication skills Capable of handling multiple initiatives simultaneously Certification related to DLP, data privacy etc.
Posted 3 weeks ago
3.0 - 8.0 years
4 - 9 Lacs
Mumbai
Work from Office
Job Title: L2 Security Specialist Job Summary: The L2 Security Specialist will take a proactive role in threat hunting, security assessments, and improving defensive measures. This role involves deeper technical analysis, security tool management, and incident response. Key Responsibilities: Perform Data Discovery & Classification to enforce data protection policies. Manage File Upload Security Solutions to prevent malware and data leaks. Conduct Attack Surface Management (ASM) to reduce exposure to threats. Execute Breach & Attack Simulation (BAS) and assist Red Team operations. and analyze Phishing Simulation campaigns to improve security awareness. Implement and audit Active Directory (AD) Security controls. Lead IT Governance, Risk & Compliance (GRC) initiatives (e.g., ISO 27001, NIST). Deploy and analyze Decoy (Honeypot) systems to detect advanced threats. Administer Mobile Device Management (MDM) security policies. Ensure Secure Data Backup & Recovery (Ransomware Protection) effectiveness. Configure and maintain Network Access Control (NAC) solutions. Required Skills & Qualifications: 35 years of experience in cybersecurity operations. Hands-on experience with SIEM, BAS, ASM, and NAC tools. Strong knowledge of phishing, ransomware defense, and AD security. Experience in GRC frameworks (ISO 27001, NIST, GDPR). Familiarity with honeypots, incident response, and threat intelligence. Certifications like CISSP, CISM, OSCP, or CASP+ preferred.
Posted 3 weeks ago
10.0 - 15.0 years
35 - 50 Lacs
Bengaluru
Work from Office
Lead digital workforce platforms like messaging, scheduling, virtual workspace. Guide team delivery, platform execution, and agile coordination Required Candidate profile 10–15 yrs in IT delivery, workforce enablement, stakeholder collaboration. Agile/Scrum required.
Posted 3 weeks ago
7.0 - 12.0 years
15 - 25 Lacs
Gurugram, Bengaluru
Hybrid
Role & responsibilities : Designing and implementing Data Security solutions and capabilities that are clearly aligned to their business, technology, and threat drivers. Implementing Data Security tools like DLP, CASB, SASE etc. within a complex business environment, through requirements gathering, building, testing, and production roll-out. Demonstrating proven problem-solving skills with an emphasis on tool implementation and integration. Act as a subject matter expert for cybersecurity initiatives including the development and documentation of reference architectures and lab demonstrations including: Data Leakage Prevention (DLP) Cloud implementations of DLP and SWG Network micro segmentation Secure Access Services Edge (SASE) Zero Trust Network Architecture (ZTNA) Software-Defined WAN (SD-WAN) integration Cloud Access Security Broker (CASB) Database Activity Monitoring (DAM) Have Hands-on knowledge and capability to build Proof of Concept solutions and integrations with Workflow Management, Identity and Security Operations Developing SASE strategy and roadmap, operating model, policies/standards, and tool design and process documents. Evaluating new solutions and services, providing a business case on whether the firm should develop skills and vendor relations within new Data Security solutions and technologies. Identifying and addressing client needs and building relationships with clients. Demonstrating documentation and presentation skills. Strong critical thinking and problem-solving skills with clear communication The ability and mindset to fully own the production environment; to identify production issues, design and develop enhanced monitoring solutions and automate fixes for those issues.
Posted 3 weeks ago
3.0 - 7.0 years
5 - 12 Lacs
Hyderabad
Work from Office
Role & responsibilities JD of Security Engineer: Work on McAfee / Trellix products To monitor and maintain McAfee ePO To ensure that all the systems in the network are with DLP agent and reporting to ePO on regular basis with latest agent software. Work knowledge on various security products like Firewalls, UTMs, Antivirus, AntiSPAM, IDS & IPS, DLP products is required. Knowledge on MS Windows based server is considered advantage. Knowledge on working with DLP products on different operating systems like Windows, MAC & Linux is considered advantage. Knowledge on XDR / EDR and cloud-based services is considered advantage. Note: 5 Days work from Office and 1st and 3rd Saturday also working day for us. If your interested please share your resume to nagaraju.mudatanapalli@visaka.in
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Symantec DLP. Experience5-8 Years.
Posted 3 weeks ago
4.0 - 9.0 years
19 - 22 Lacs
Hyderabad
Work from Office
Job Area: Information Technology Group, Information Technology Group > Cyber Security Engineering General Summary: PeopleThis role is a combination of 'Data Loss Prevention (DLP) & security orchestration lead in Cyber Defense Center which operates 24x7 thus requires being available on call during weekends and off hours including night shift to support the business requirements of the organization.People management is essential to this role.Continuous focus on upskilling the CDC analysts to keep them upskilled in automation and in 'Data Protection'.Mentor the team to innovate solutions, also improve DLP investigations and operational efficiency.Help drive lower attrition using direct engagement methods like 'Rewards and Recognition' and other indirect engagement methods to retain staff.Ensure maximum coverage and efficient operations.ProcessManage the KPIs, operational deliverables, problem management & operational excellence.Maintain accuracy in DLP escalations to drive 'Zero Tolerance for Errors'.Lead the Shift Handovers & assist the team with direction to investigate key DLP alerts.Actively participate in the stakeholder meetings to review the escalation of Company Confidential Information (CCI) triggered from DLP team.Look for opportunities to gather patterns, anomalies from SOC escalations and drive feedback with relavent stakeholders on preventative measures to bolster the Data Loss Prevention (DLP) policies.Align with the CDC maturity roadmap on innovation and assign priorities for implementation.Drive enforcing and or governing the escalation process between CDC analysts and Cyber Investigations Team (CIT).Accountable for meeting the SOC KPIs that includes "Time Savings by Automaiton", "Quality Accuracy', 'Acknowledgement Time', 'Time to Escalate' & 'Resolution Time'.Synergies with cross-functional teams across Qualcomm.Technology and engineeringLook for opportunities to drive innovation within Cyber Defense Center. Leverage AI/ML to mature the current automation to become a NexGen capability center.Mature automation processes and capabilites to perform faster and more efficient responses leveraging automation and orchestration.Look for opportunities to gather patterns, change in CCI violation channels, techniques, anomalies from CDC investigations and drive feedback with relavent stakeholders on preventative measures. Minimum Qualifications: Bachelor's degree in Engineering, Information Systems, Computer Science, or related field and 3+ years of cybersecurity-relevant work experience. OR High School diploma or equivalent and 5+ years of cybersecurity-relevant work experience. Physical Requirements: Frequently transports and installs equipment up to 40 lbs. 8+ years of proffessional experience in IT with prior experience in automation & people managementThe individual must have a strong knowledge on programming skills, delivered automation projects & good awareness of current and developing security threats and technologies, especially on 'Data Protection'Knowledge on DLP tools is mandatory, while CASB is essentialStrong proficiency in DLP investigations, also in written and spoken EnglishExcellent Problem Solving and Critical Thinking SkillsStrong interpersonal skills and a good team playerBachelors degree or Masters Degree in Computer Sciences or in Cyber Security 6 years of 'Information Security' experience & min 3 years of expereience in managing people in 24x7 Security operationsCEH, Security+, OSCP or other industry-relevant cyber-security certifications and ITIL V3.0, 'SAFe Agilist' knowledge is a plus Bachelors Degree in Engineering/Masters in information security Bachelors degree or Masters Degree in Computer Sciences or in Cyber Security CEH, Security+, OSCP or other industry-relevant cyber-security certifications and ITIL V3.0, 'SAFe Agilist' knowledge is a plus Applicants Qualcomm is an equal opportunity employer. If you are an individual with a disability and need an accommodation during the application/hiring process, rest assured that Qualcomm is committed to providing an accessible process. You may e-mail disability-accomodations@qualcomm.com or call Qualcomm's toll-free number found here. Upon request, Qualcomm will provide reasonable accommodations to support individuals with disabilities to be able participate in the hiring process. Qualcomm is also committed to making our workplace accessible for individuals with disabilities. (Keep in mind that this email address is used to provide reasonable accommodations for individuals with disabilities. We will not respond here to requests for updates on applications or resume inquiries). Qualcomm expects its employees to abide by all applicable policies and procedures, including but not limited to security and other requirements regarding protection of Company confidential information and other confidential and/or proprietary information, to the extent those requirements are permissible under applicable law. To all Staffing and Recruiting Agencies Please do not forward resumes to our jobs alias, Qualcomm employees or any other company location. Qualcomm is not responsible for any fees related to unsolicited resumes/applications. If you would like more information about this role, please contact Qualcomm Careers.
Posted 3 weeks ago
3.0 - 7.0 years
17 - 22 Lacs
Hyderabad
Work from Office
Job Area: Information Technology Group, Information Technology Group > Cyber Security Engineering General Summary: PeopleThis role will be responsible for 24x5 in 'Data Loss Prevention (DLP) team in Cyber Defense Center thus requires being available on call during weekends and off hours including night shift to support the business requirements of the organization.People management is essential to this role.Continuous focus on upskilling the CDC analysts to keep them updated with changes in trend in cyber threat landscape, especially in 'Data Protection'.Mentor the team to improve DLP investigations and operational efficiency.Help drive lower attrition using direct engagement methods like 'Rewards and Recognition' and other indirect engagement methods to retain staff.Ensure maximum coverage and efficient operations.ProcessManage the KPIs, operational deliverables, problem management & operational excellence.Maintain accuracy in DLP escalations to drive 'Zero Tolerance for Errors'.Set shift schedules in a rotational basis.Lead the Shift Handovers & assist the team with direction to investigate key DLP alerts.Actively participate in the stakeholder meetings to review the escalation of Company Confidential Information (CCI) triggered from DLP team.Look for opportunities to gather patterns, anomalies from SOC escalations and drive feedback with relavent stakeholders on preventative measures to bolster the Data Loss Prevention (DLP) policies.Align with the CDC maturity roadmap and assign priorities for implementation.Drive enforcing and or governing the escalation process between CDC analysts and Cyber Investigations Team (CIT).Randomly audit the DLP investigations and cascade the feedback to improve operational efficiency.Accountable for meeting the SOC KPIs that includes "Quality Accuracy', 'Acknowledgement Time', 'Time to Escalate' & 'Resolution Time'.Synergies with cross-functional teams across Qualcomm.Technology and engineeringContinous fine tuning of false alarms to improve alert fidelity and reduce the fatigue.Mature automation processes and capabilites to perform faster and more efficient responses leveraging automation and orchestration.Look for opportunities to gather patterns, change in CCI violation channels, techniques, anomalies from SOC investigations and drive feedback with relavent stakeholders on preventative measures. Minimum Qualifications: Bachelor's degree in Engineering, Information Systems, Computer Science, or related field and 3+ years of cybersecurity-relevant work experience. OR High School diploma or equivalent and 5+ years of cybersecurity-relevant work experience. Physical Requirements: Frequently transports and installs equipment up to 40 lbs. 8+ years of proffessional experience in IT with prior experience in people managementThe individual must have a good awareness of current and developing security threats and technologies, especially on 'Data Protection'Knowledge on DLP tools is mandatory, while CASB is essentialStrong proficiency in DLP investigations, also in written and spoken EnglishExcellent Problem Solving and Critical Thinking SkillsStrong interpersonal skills and a good team playerBachelors degree or Masters Degree in Computer Sciences or in Cyber Security 6 years of 'Information Security' experience & min 3 years of expereience in managing people in 24x7 Security operationsCEH, Security+, OSCP or other industry-relevant cyber-security certifications and ITIL V3.0, 'SAFe Agilist' knowledge is a plus Bachelors Degree in Engineering/Masters in information security Bachelors degree or Masters Degree in Computer Sciences or in Cyber Security CEH, Security+, OSCP or other industry-relevant cyber-security certifications and ITIL V3.0, 'SAFe Agilist' knowledge is a plus CDC, SOC, DLP, Data Protection, CASB, Cyber Security Applicants Qualcomm is an equal opportunity employer. If you are an individual with a disability and need an accommodation during the application/hiring process, rest assured that Qualcomm is committed to providing an accessible process. You may e-mail disability-accomodations@qualcomm.com or call Qualcomm's toll-free number found here. Upon request, Qualcomm will provide reasonable accommodations to support individuals with disabilities to be able participate in the hiring process. Qualcomm is also committed to making our workplace accessible for individuals with disabilities. (Keep in mind that this email address is used to provide reasonable accommodations for individuals with disabilities. We will not respond here to requests for updates on applications or resume inquiries). Qualcomm expects its employees to abide by all applicable policies and procedures, including but not limited to security and other requirements regarding protection of Company confidential information and other confidential and/or proprietary information, to the extent those requirements are permissible under applicable law. To all Staffing and Recruiting Agencies Please do not forward resumes to our jobs alias, Qualcomm employees or any other company location. Qualcomm is not responsible for any fees related to unsolicited resumes/applications. If you would like more information about this role, please contact Qualcomm Careers.
Posted 3 weeks ago
8.0 - 13.0 years
3 - 7 Lacs
Pune, Bengaluru
Work from Office
Job Title:DLP Lead Experience8-14 Years Location:Bangalore /Pune : Technical Skills: Experience in configuring s and creating workflows on Email DLP - Proofpoint Prior experience with CASB Netskope or similar solution Knowledge of security principles including cloud , standards and techniques Understanding of cloud principles ,cloud applications and key cloud service providers Prior experience with Data loss prevention tools, SIEM, network devices and other infrastructure Reviews violations of data security procedures to eliminate violations Strong experience on Mimecast email Security solution for threat Protection, Spoofing, Encryption, Archive, URL Defense Strong understanding of email delivery architecture, email gateway and DNS technologies Strong understanding of networking, SMTP, DNS Experience of compliance requirements for database security (e.g. SOX, HIPAA, PCI etc.) Strong verbal and written communications skills; must be able to effectively communicate technical details and thoughts in non-technical/general terminology to various levels of the organization. Work well in team environments with internal and external resources as well as work independently on tasks Strong organizational, and time management skills Process Skills: Overall management of Email DLP solution - Proofpoint Analyze blocked emails Manage CASB operations ,maintain implemented Netskope CASB solution,respond and resolve incidentsinvestigate and conduct analysis Work on email release/drop as per requests Tune/Amend email DLP policies Perform Daily DLP System Health check and publish health report Update/Add - roles modification, response rules, complex and new policies modifications Email DLP – Microsoft E4 licenses CASB –Netskope Behavioral Skills: Effective interpersonal, team building and communication skills Ability to collaborate; be able to communicate clearly and concisely both to laypeople and peers, be able to follow instructions, make a team stronger for your presence and not weaker. Ability to see the bigger picture and differing perspectives; to compromise, to balance competing priorities, and to prioritize the user. Desire for continuous improvement, of the worthy sort; always be learning and seeking improvement, avoid change aversion and excessive conservatism, equally avoid harmful perfectionism, 'not-invented-here' syndrome and damaging pursuit of the bleeding edge for its own sake. Learn things quickly, while working outside the area of expertise. Analyze a problem and realize exactly what all will be affected by even the smallest of change you make in your design Ability to communicate complex technology to no tech audience in simple and precise manner. Ownership skills. Qualification: Must have 4 Year degree (Computer Science, Information Systems or equivalent) 4+ years overall IT experience.
Posted 3 weeks ago
5.0 - 8.0 years
8 - 12 Lacs
Bengaluru
Work from Office
Job Title:Architect Experience5-8 Years Location:Bangalore : Data Management and Integration:The data architect will be responsible for managing and defining/integrating data from various sourcesacross regionto ensure seamless data flow and accuracy. This includes addressing data security and privacy concerns, integration challenges, and ensuring real-time data accuracy AI Integration:A significant component of the CMO360 project is the integration of AI to provide insights and support user actions. The data architect will play a crucial role more from “Data” perspective for implementing AI features and ensuring they are effectively integrated into the system Collaboration with Teams:The data architect will work closely with various teams, including CMO, Engineering, across the organization to ensure that the data architecture aligns with the project's objectives and requirements. This includes participating in workshops and meetings to identify pain points and prioritize requirements Technical Assessment and Risk Management:The data architect will be involved in conducting technical assessments and managing risks associated with data security, integration, and user adoption. Mitigation plans will need to be developed and implemented to address these risks Documentation and Communication:The data architect will be responsible for documenting the data architecture and communicating it to relevant stakeholders. This includes creating and maintaining documentation that outlines the data architecture, data flow, and integration points LocationIndia – Bangalore
Posted 3 weeks ago
3.0 - 7.0 years
2 - 6 Lacs
Bengaluru
Work from Office
Drive projects and initiatives to improve and expand existing DLP platform capabilities. Implement and manage DLP solutions, including data labeling technologies. Work directly with stakeholders to define requirements and develop security solutions. Ensure the security of endpoint devices, including data protection and behavior analysis. Deploy and manage endpoint DLP solutions, such as those offered by Proofpoint. Manage email security policies and configurations, including DLP for email. Detect and prevent data loss through email channels, such as by identifying sensitive content and usebehavior. Gain deep knowledge of the Proofpoint platform, including its various modules (e.g., Endpoint DLP, Email DLP) Be proficient in using the Proofpoint console to manage alerts, investigate incidents, and analyze user behavior. Primary Skills DLP Endpoint Security Email Security Secondary Skills Data Labeling Behavior Analysis Incident Response
Posted 3 weeks ago
5.0 - 9.0 years
0 Lacs
Nagpur
Work from Office
Lead Engineer - Email gateway Reports to Senior Manager/Architect location) University degree in the field of computer science or IT. This role involves acting as primary point of contact for operational tickets resolution, enhancing, email security measures and providing document support. Experience/Qualifications * The ideal candidate will have a strong background in email security and vendor collaboration. * Must possess patching experience as well as upgrade and update and implementation of email gateways * Mandatory skills are Email authentication spf, dkim. dmarc also should be aware of spam, phishing, spoofing * Should possess basic networking and dns records knowledge Act as a primary point of contact for resolving operational tickets related to Trend micro email gateway which specifically includes ddei and imsva Daily monitoring reports for services, resource optimization, patching and Responsibilities upgrade activity. Rca preparation for mail flow issues Provide full email analysis for spam, spoofing,phishing, malware etc. Manage and maintaining server resources for email gateway
Posted 3 weeks ago
5.0 - 8.0 years
7 - 17 Lacs
Hyderabad
Hybrid
TEKsystems is hiring for DLP Sr Analyst!! Exp - 5+ Years NP - Immediate to 15 days Location - (Hybrid Mode) Hyderabad Role & responsibilities: Experience in monitoring and analyzing DLP events on the DLP solution. Experience in day-to-day operations of the Data Loss Prevention (DLP) process. Hands-on experience of following detailed processes and procedures in security incident response lifecycle and its phases. Ability to handle, resolve data security events minimizing the impact to the Bank, employees and customer. Ability to understand and follow the incident response process through event escalations. Ability to learn the proper use and protection of data (required). Ability to work through the DLP event queue and resolve tickets quickly. Good level knowledge of GDPR requirements and regulations. Strong knowledge of various data security tool & techniques incl DLP, CASB. Knowledge of common operating systems and platforms. Flexible work availability to support the DLP teams responsibilities.
Posted 3 weeks ago
5.0 - 8.0 years
7 - 17 Lacs
Hyderabad
Hybrid
TEKsystems is hiring for DLP Sr Analyst!! Exp - 5+ Years NP - Immediate to 15 days Location - Hyderabad Role & responsibilities: Experience in monitoring and analyzing DLP events on the DLP solution. Experience in day-to-day operations of the Data Loss Prevention (DLP) process. Hands-on experience of following detailed processes and procedures in security incident response lifecycle and its phases. Ability to handle, resolve data security events minimizing the impact to the Bank, employees and customer. Ability to understand and follow the incident response process through event escalations. Ability to learn the proper use and protection of data (required). Ability to work through the DLP event queue and resolve tickets quickly. Good level knowledge of GDPR requirements and regulations. Strong knowledge of various data security tool & techniques incl DLP, CASB. Knowledge of common operating systems and platforms. Flexible work availability to support the DLP teams responsibilities.
Posted 3 weeks ago
4.0 - 9.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Diverse Lynx is looking for Splunk Professional to join our dynamic team and embark on a rewarding career journey Collaborate with stakeholders to understand data requirements, use cases, and objectives for Splunk deployments Design and implement data ingestion processes, including data collection, parsing, normalization, and indexing in Splunk Develop custom Splunk queries, search strings, and data models to extract meaningful insights from machine-generated data Create interactive dashboards, reports, and visualizations using Splunk's search processing language (SPL) and visualization tools Implement and maintain Splunk apps, add-ons, and configurations to support specific use cases or data sources Automate data analysis workflows and alerting mechanisms to identify and respond to critical events and anomalies Optimize Splunk deployments for performance, scalability, and search efficiency Monitor and troubleshoot Splunk infrastructure and resolve issues related to data ingestion, search performance, and system availability Collaborate with security and operations teams to develop and implement Splunk-based security monitoring, log analysis, and incident response solutions Ensure data privacy and security by implementing access controls, data encryption, and compliance with relevant regulations Stay updated with Splunk product releases, new features, and best practices to recommend and implement improvements in Splunk deployments Provide training and support to end-users on utilizing Splunk for data analysis and visualization
Posted 3 weeks ago
6.0 - 11.0 years
10 - 20 Lacs
Nashik, Pune, Bengaluru
Hybrid
Job Title: Senior Data Security Engineer Location: Pune, India Role Description As a Senior Data Security Engineer , you will lead a team of skilled engineers dedicated to protecting the organizations sensitive information and ensuring robust data security practices. Your role will encompass the design, implementation, and optimization of data security solutions across on-premises, cloud, and hybrid environments. Key areas included but not limited to are Data Discovery and Classification, Data Protection, Data Loss Prevention (DLP). You will collaborate across divisions, working closely with other security pillars and business units to deliver innovative solutions that mitigate threats and reduce risks. Combining strong managerial acumen with hands-on technical expertise, you will actively contribute to delivering outcomes, stepping in to resolve complex challenges directly when needed. As a pivotal figure in the Data Security pillar, you will define architectural and technological roadmaps, ensuring alignment with business objectives and global security standards. Your leadership will drive the adoption of best practices and foster a culture of delivery, whereby you ensure that your team delivers the book of work. What we’ll offer you As part of our flexible scheme, here are just some of the benefits that you’ll enjoy Best in class leave policy Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Leadership & Hands-On Engineering Lead a team of data security engineers, fostering technical excellence and collaboration. Drive knowledge sharing within the team and ensure alignment with best practices and adaptive way of working. Provide mentorship and hands-on guidance while ensuring high technical delivery standards. Actively participate in technical implementation and troubleshooting when necessary. Manage backlogs, prioritize the work and deliver in scope, budget and schedule. Security Architecture & Solution Design Define and maintain a data security implementation and technology roadmap aligned with the Data Security strategy and business objectives. Evaluate and recommend new security tools and technologies for e.g. data protection, DLP. Implementation & Technical Operations Lead the implementation, configuration, deployment and optimization of data security technologies, including but not limited to DLP, encryption, tokenization, and cloud security controls. Implement and fine-tune security controls to detect and prevent data exfiltration, malware, insider threats, etc. Threat & Risk-Driven Security Enhancements Work with threat intelligence teams to understand emerging data security threats and incorporate proactive defenses. Continuously assess risks associated with data security gaps and propose mitigation strategies. Cross-Divisional Collaboration & Stakeholder Engagement Work across other security pillars and IT teams to align data security initiatives with broader risk mitigation strategies. Act as a bridge between security operations, architects, and engineers, ensuring cohesive security execution. Collaborate with external vendors to evaluate and deploy best-fit security solutions and mature their solutions. Engage with leadership to translate business risk into practical, actionable security measures and KPIs Your skills and experience Mandatory (MUST) Qualifications Bachelor’s or master’s degree in information security, Computer Science, or a related field. 7+ years of experience in data security, cloud security, or DLP, with a mix of hands-on engineering and leadership responsibilities. Proven track record of leading security teams, managing priorities, and delivering projects within scope, budget, and schedule. Strong technical problem-solving skills, with the ability to troubleshoot, optimize, and enhance security implementations. Experience in security architecture, technology roadmaps, and aligning solutions with business objectives. Expertise in evaluating, selecting, and implementing security technologies, e.g. for DLP, encryption, tokenization, and cloud security solutions. Hands-on experience deploying, configuring, and optimizing security controls to mitigate data loss prevention, malware, and insider threats. Good understanding of risk assessment, threat modeling, and security mitigation strategies. Ability to collaborate with leadership and stakeholders, translating security risks into actionable KPIs and strategic initiatives. Experience working across security pillars, IT teams, and external partners to align security objectives and drive improvements. Including ability to communicate complex topics effectively to various stakeholders, particularly at the senior management level. Experience with Microsoft Purview, Symantec DLP, Palo Alto, and Zscaler; knowledge of Palo Alto and Proofpoint is a plus. Optional (Shall) Qualifications – plus! Advanced Technical Expertise in secure network architectures, encryption methodologies, data protection strategies, and cloud security best practices. Regulatory Compliance Knowledge, including familiarity with GDPR, CCPA, PCI DSS, NIST, and ISO 27001 in the context of data security. Continuous Learning & Industry Awareness, staying up to date with emerging security threats, technologies, and evolving regulatory landscapes. Knowledge of Zero Trust Security Models, including access control, micro-segmentation, and identity-based security approaches. Cloud Security & Infrastructure, worked with AWS, Azure, or GCP including Terraform, Ansible, or Kubernetes security. Programming & API Security, familiarity with secure coding practices and experience securing REST APIs, authentication flows, and data access layers. Holding preferred certifications like CISSP, CISM, CCSP, AWS Certified Security, Microsoft Purview, Google Professional Cloud Security Engineer How we’ll support you Training and development to help you excel in your career Coaching and support from experts in your team A culture of continuous learning to aid progression A range of flexible benefits that you can tailor to suit your needs About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htmRole & responsibilities Preferred candidate profile
Posted 3 weeks ago
4 - 5 years
5 - 7 Lacs
Hyderabad, Chennai, Bengaluru
Work from Office
Role & responsibilities Hands-on experience with implementation of Microsoft DLP technology across a large enterprise Experience in DLP security solutions covering DLP Endpoint, Discover, Web & Email. Design and implementation of AIP solution Expertise on design and implementation of Sensitivity labels, DLP policies Expertise in Cloud Data Protection using MCAS Expertise in configuration of AIP Scanner Expertise in Discovery and Classification of data across repositories using AIP solution Expertise to fine-tune DLP, AIP and MCAS policies to reduce false detection Provide advice on Data Secuirty compliance and regulations to reduce risk. Administration of the DLP tools to include configuration of policies, upgrading, patching etc. Experience to troubleshoot Microsoft DLP, AIP and MCAS issues Monitor and respond to alerts generated from the Microsoft DLP, AIP & MCAS technologies. Understand and follow the incident response process through event escalations. Collaborate with business groups to help them identify, classify and secure high value data. Implementation of proactive measures to enhance accuracy and effectiveness of Data Security tools. Create, review, maintain and update documentation including Documenting & Publishing fixes in central knowledge base. Work with global teams to provide consistent processes and solutions. Excellent presentation and written communication skills with strong interpersonal skills Good understanding on cloud security concepts Good understanding of organizational network architecture Experience in maintaining various metrices and SLAs
Posted 4 weeks ago
3 - 8 years
5 - 10 Lacs
Gurugram
Work from Office
Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Endpoint Protection Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Job Summary :We are seeking a skilled Beyond Trust Endpoint Privilege Management (EPM) Specialist to join our IT security team. The ideal candidate will be responsible for implementing, managing, and optimizing Beyond Trust EPM solutions on Windows 10 and Windows 11 environments. This role focuses on enhancing security by managing and controlling administrative privileges on endpoints, reducing attack surfaces, and ensuring compliance with security policies.Key Responsibilities: Implementation and Configuration:oDeploy and configure Beyond Trust EPM solutions on Windows 10 and Windows 11 systems.oCustomize EPM policies to meet organizational security requirements and best practices.oIntegrate Beyond Trust EPM with existing IT infrastructure and security tools. Privilege Management:oDevelop and enforce policies for least privilege access on endpoints.oMonitor and manage user and application privileges to prevent unauthorized access.oCreate and maintain whitelists and blacklists for applications and processes. Security and Compliance:oEnsure endpoint security compliance with organizational policies and regulatory requirements.oConduct regular audits of privileged access and generate compliance reports.oCollaborate with security and compliance teams to address findings and improve security posture. Monitoring and Reporting:oSet up and maintain monitoring and alerting systems for privileged access activities.oAnalyze and respond to security incidents related to privileged access.oGenerate regular reports on EPM activities, incidents, and compliance status. User Training and Support:oProvide training and support to end-users and IT staff on EPM policies and procedures.oAssist in troubleshooting and resolving issues related to EPM solutions.oDevelop and update documentation and training materials. Continuous Improvement:oStay up to date with the latest security threats, trends, and technologies.oRecommend and implement improvements to EPM policies and configurations.oParticipate in security assessments and risk management activities. Qualifications: Education:oBachelor's degree in information technology, Computer Science, Cybersecurity, or related field. Relevant certifications and experience may be considered in lieu of a degree. Experience:oProven experience in implementing and managing Beyond Trust EPM solutions.oStrong knowledge of Windows 10 and Windows 11 operating systems.oExperience with endpoint security and privilege management. Skills and Competencies:oDeep understanding of least privilege access principles and practices.oProficiency in configuring and managing EPM policies and rules.oFamiliarity with Active Directory, Group Policy, and other endpoint management tools.oExcellent troubleshooting and problem-solving skills.oStrong communication and interpersonal skills.oAbility to work independently and as part of a team. Certifications:oRelevant certifications such as Beyond Trust Certified Engineer (BTCE), Certified Information Qualifications 15 years full time education
Posted 1 month ago
3 - 6 years
9 - 13 Lacs
Mumbai
Work from Office
Senior Cyber Security Analyst - IND005A Company Worley Primary Location IND-MM-Mumbai Other Locations IND-KR-Bangalore, IND-AP-Hyderabad, IND-MM-Pune, IND-MM-Navi Mumbai Job Cyber Security Schedule Full-time Employment Type Employee Job Level Experienced Job Posting Apr 21, 2025 Unposting Date May 21, 2025 Reporting Manager Title Manager We deliver the worlds most complex projects Work as part of a collaborative and inclusive team Enjoy a varied & challenging role Building on our past. Ready for the future Worley is a global professional services company of energy, chemicals and resources experts headquartered in Australia. Right now, were bridging two worlds as we accelerate to more sustainable energy sources, while helping our customers provide the energy, chemicals and resources that society needs now. We partner with our customers to deliver projects and create value over the life of their portfolio of assets. We solve complex problems by finding integrated data-centric solutions from the first stages of consulting and engineering to installation and commissioning, to the last stages of decommissioning and remediation. Join us and help drive innovation and sustainability in our projects. The Role As a Senior Cyber Security Analyst with Worley, you will work closely with our existing team to deliver projects for our clients while continuing to develop your skills and experience etc. We are seeking a Senior Cyber Security Analyst -a Subject Matter Expert (SME)- to join our Information Security team. The ideal candidate will be responsible for designing, implementing, monitoring, reacting, and reporting on information security events within the DLP scope. Additionally, the role includes managing security tools and IT systems with a special focus on DLP enablement. DLP Strategy & Policy Design Serve as a Subject Matter Expert (SME)for DLP solutions, technologies, and best practices. Design, implement, and optimize DLP policiesto detect and prevent unauthorized access, sharing, and data exfiltration. Define and maintain DLP governance frameworks, aligning with regulatory requirements Identify sensitive data requiring protection across endpoints, cloud, email, and network. Implementation & Configuration Deploy and configure DLP controlsto monitor, alert, and block potential data leaks. Define and enforce DLP rules for structured & unstructured data, including Personally Identifiable Information (PII), Intellectual Property (IP), and financial data. Integrate DLP solutions with other security tools. Monitoring& Continuous Improvement Monitor and analyzeDLP alerts and incidents, identifying trends and areas for improvement. Ensuring DLP alerts and incidentsget routed to monitoring/response processes in accordance with defined internal procedures Perform regular tuning and updatesto enhance detection accuracy and reduce false positives. Develop automated response actionsto mitigate risks and ensure business continuity. Compliance & Stakeholder Collaboration Ensure compliance with data protection regulations and industry security standards. Collaborate with cross-functional teams to resolve complex technical issues and to align DLP policies with business needs. Provide guidance and training to employees on DLP policies, security best practices, and insider threat awareness. Reporting & Documentation: Define and generate DLP metric supporting the reporting needs across the organization Document DLP configurations, policies, and operational procedures. Provide technical recommendationsto enhance data security strategies. About You To be considered for this role it is envisaged you will possess the following attributes: Ability to balance security measures with business needs A proactive approach to identifying and mitigating data loss risks before they become security incidents Proven experience with DLP solutions (e.g., Microsoft Purview, Symantec, Forcepoint, McAfee/Trellix, Digital Guardian, Zscaler). Strong knowledge of DLP policies, rules, content inspection techniques, and data classification models. Experience working with cloud-based DLP (e.g., CASB, SaaS security, O365 DLP, Google Workspace DLP) Understanding of network security, endpoint security, and encryption techniques. Familiarity with SIEM, SOC workflows, and incident response processes. Moving forward together We want our people to be energized and empowered to drive sustainable impact. So, our focus is on a values-inspired culture that unlocks brilliance through belonging, connection and innovation. Were building a diverse, inclusive and respectful workplace. Creating a space where everyone feels they belong, can be themselves, and are heard. And we're not just talking about it; we're doing it. We're reskilling our people, leveraging transferable skills, and supporting the transition of our workforce to become experts in today's low carbon energy infrastructure and technology. Whatever your ambition, theres a path for you here. And theres no barrier to your potential career success. Join us to broaden your horizons, explore diverse opportunities, and be part of delivering sustainable change. Worley takes personal data protection seriously and respects EU and local data protection laws. You can read our full Recruitment Privacy Notice Please noteIf you are being represented by a recruitment agency you will not be considered, to be considered you will need to apply directly to Worley.
Posted 1 month ago
12 - 15 years
12 - 17 Lacs
Pune
Work from Office
About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Job Title - Azure Security Architect Experience - 12-15 years Technical Qualification/ Knowledge Hands-on knowledge on Azure security technologies and associated components and variations Azure Security Center, Azure Monitor, Log Analytics, Sentinel or any other SIEM integration Azure NetworkingVNET, Network Security Group (NSG), VNet peering, Azure Firewall Azure Storage Securitystorage accounts, managed disks, blobs, encryption at rest and in-transit, Azure KeyVault, Azure Active Directory, RBAC, MFA, SAML, Conditional Access, Managed Identity. Azure Load Balancers, WAF, Application Gateway, Availability Sets/Scale Sets Knowledgeable about Windows Operating System, Server hardening, Group Policies, event and log management Design, implement and support Microsoft Defender for O365 with Azure Information Protection and MS DLP for O365 and Endpoint Experience in deploying MDATP for Servers Experience with multiple security tools and technologies including Next-Gen Firewalls (Palo Alto), McAfee ePO, DLP, CrowdStrike, ZScaler, Vulnerability Assessment (Tenable.io) Ability to lead to troubleshooting of cloud security issues, detect and confirm anomalies, identify risks, perform root cause analysis Skilled in Graph API, Azure CLI / PowerShell automation experience Should be able to create, update, retry and delete Azure AD objects via PowerShell, Azure CLI Understanding of the Azure Subscription and Migration activities will be added advantages. Additional Qualifications and Experience Cloud Security certifications Microsoft certificationsAZ-900, AZ-500 , MS-900, MS-500, AZ-30X, SC200 – 300. Familiarity with Zero Trust principles
Posted 1 month ago
17 - 21 years
11 - 15 Lacs
Bengaluru
Work from Office
About The Role – Cyber Security Lead This is a senior level role that needs expertise in leading a security team to design & implement solutions, adherence to various compliance policies & regulations and managing the security technologies effectively that will enhance overall security across the enterprise. Need to have specialization in various security technology to support overall security operations for Data, Cloud & network security and strategic thinking with a hands-on approach to problem-solving, excellent stakeholder management, communication skills, proven experience driving cross-functional cybersecurity initiatives, continuously identify risks and enforce robust security controls that should result in an improved security posture without compromising on end user experience. Technology Expertise and leadership skills Lead the Cybersecurity operations team with a strong focus on DLP, Data protection, Cloud & Network security governance. Hand-on experience on security tool governance and control effectiveness to maintain the compliance on Data protection, Cloud & network security control. Expertise on security control program (Email security, Data protection, Network & Cloud security) and drive continuous improvements. Define, develop & execute cybersecurity strategies aligned with Business goals and regulatory requirements. Good understanding on Perimeter security control, Lateral movement, Web security & private access, Clou security posture & data security management, DLP operation & Incident management. Proven experience on security controls implementation, operation monitoring on data classification, data handling and sensitive data movement across the endpoints, cloud & network. Provides expertise and guidance on potential issues & risks remediations, enhancements, or delay experience in technology security areas to include cloud, data, storage, data access management, and emerging technologies resilience activities (Endpoint, Network security), security standards, policies & procedures, and control frameworks. Participate in security architecture review, security control assessment & support Audit. Expertise on operation management & governance to meet SLA metrics, health & compliance dashboards readiness, and reporting to the leadership. Strong leadership and team-building abilities. Education Bachelor or Master’s degree in computer science, Information Security, Cybersecurity, or a related field Relevant certifications such as CISM, CISSP, CISA or equivalent are highly desirable Experience 15+ years of experience in cybersecurity with at least 5 years in a team lead role. Proven track record of implementation and executing cybersecurity strategies & governance in a complex & fast paced environment In-depth knowledge of cybersecurity tools, technologies, best practices. About The Role ? ? ? ? About The Role – Cyber Security Lead This is a senior level role that needs expertise in leading a security team to design & implement solutions, adherence to various compliance policies & regulations and managing the security technologies effectively that will enhance overall security across the enterprise. Need to have specialization in various security technology to support overall security operations for Data, Cloud & network security and strategic thinking with a hands-on approach to problem-solving, excellent stakeholder management, communication skills, proven experience driving cross-functional cybersecurity initiatives, continuously identify risks and enforce robust security controls that should result in an improved security posture without compromising on end user experience. Technology Expertise and leadership skills Lead the Cybersecurity operations team with a strong focus on DLP, Data protection, Cloud & Network security governance. Hand-on experience on security tool governance and control effectiveness to maintain the compliance on Data protection, Cloud & network security control. Expertise on security control program (Email security, Data protection, Network & Cloud security) and drive continuous improvements. Define, develop & execute cybersecurity strategies aligned with Business goals and regulatory requirements. Good understanding on Perimeter security control, Lateral movement, Web security & private access, Clou security posture & data security management, DLP operation & Incident management. Proven experience on security controls implementation, operation monitoring on data classification, data handling and sensitive data movement across the endpoints, cloud & network. Provides expertise and guidance on potential issues & risks remediations, enhancements, or delay experience in technology security areas to include cloud, data, storage, data access management, and emerging technologies resilience activities (Endpoint, Network security), security standards, policies & procedures, and control frameworks. Participate in security architecture review, security control assessment & support Audit. Expertise on operation management & governance to meet SLA metrics, health & compliance dashboards readiness, and reporting to the leadership. Strong leadership and team-building abilities. Education Bachelor or Master’s degree in computer science, Information Security, Cybersecurity, or a related field Relevant certifications such as CISM, CISSP, CISA or equivalent are highly desirable Experience 15+ years of experience in cybersecurity with at least 5 years in a team lead role. Proven track record of implementation and executing cybersecurity strategies & governance in a complex & fast paced environment In-depth knowledge of cybersecurity tools, technologies, best practices.
Posted 1 month ago
8 - 10 years
12 - 17 Lacs
Bengaluru
Work from Office
About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Symantec DLP. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
1 - 3 years
6 - 10 Lacs
Hyderabad
Work from Office
Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: Symantec DLP. Experience1-3 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2