Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
10 - 12 years
30 - 35 Lacs
Chandigarh
Work from Office
Job description We are seeking a highly experienced and motivated Senior SOC Manager to lead our Security Operations Center (SOC) team. The Senior SOC Manager will be responsible for managing the day-to-day operations of the SOC, overseeing security monitoring, incident response, threat intelligence activities, and ensuring the organisation's information assets are protected. The ideal candidate will have a strong background in cybersecurity operations, team leadership, and incident management, with a strategic mindset and the ability to drive continuous improvement. Role & responsibilities Lead the analysis and investigation of information security events (IDS/DLP/SIEM/etc.) in a 24x7 SOC environment to immediately detect, verify, and respond swiftly to cyber threats, and remove false positive. Serve as a technical point of escalation. Responsible for investigating incidents, analysing attack methods, researching new defence techniques and tools, developing security policy, and documenting procedures for SOC. Maintain baselines for secure configuration and operations. Malware analysis and other attack analysis to extract indicators of compromise. Perform data security event correlation between various systems. Prepare reports, summaries, and other forms of communication that may be both internal and client facing. Ensure compliance to SLA, process adherence and process improvisation to achieve operational objectives. Develop and deploy processes to ensure efficient and effective security operations. Provide guidance and mentorship to other security analysts and junior members of the security team. Keep up-to-date with the latest trends and best practice developments in the field of cybersecurity and SIEM tools Values And Behaiviours Have Fun We take time and effort to make the workplace more enjoyable, we reward and celebrate success, our customers and partners see us as human. Move with Velocity We evolve and grow to stay ahead of the curve, we make decisions quickly and often, we are decisive and show initiative, we are outcome oriented and we question everything to determine what speeds or impedes the desired outcome. Go Further We go beyond delivering what works, we discover delights and help customers transform their business, we have a passion for learning, we have a desire to question the norms, and we are curious to step out of our comfort zones. Thrive Together We are high functioning, supportive and inclusive, collaboration is in our DNA, we step up to assist our team members, and we work as a team to achieve the right outcome. Skills and Capabilities At least 7 years of experience working in a SOC environment, with a focus on using multiple SIEM tools. Strong understanding of security operations and incident response processes Hands-on experience with at least two major SIEM tools (e.g., MS Sentinel Rapid7, Exabeam Splunk, ArcSight, QRadar,) Strong analytical and problem-solving skills Excellent communication and interpersonal skills Ability to work in a fast-paced, dynamic environment Qualifications B-Tech
Posted 2 months ago
10 - 17 years
30 - 45 Lacs
Chandigarh
Work from Office
Oreta is a leading technology services company that empowers business outcomes through advisory, delivery and managed services using network, cloud, security, and analytics. Our commitment to innovation and excellence has earned us numerous prestigious awards in the Australian technology sector, including recognition from ARN, Telstra, Deloitte and CRN. We maintain strategic partnerships with renowned industry leaders such as Microsoft, Telstra, Cisco, Sentinel One, Palo Alto Networks, VMwarePremium, and Qualys, enabling us to deliver top-tier solutions and services. Role & responsibilities Solution Design & Delivery of projects related to O365, Teams calling, SharePoint, Microsoft Teams, Intune, Azure, Active Directory, endpoint security, email security and VDI Responding and resolving issues within the required SLAs for proactive and reactive support tickets Configuring/troubleshooting Microsoft Collaboration solutions. Monitoring and controlling usage and help identify efficiencies in process and solutions Upgrading devices/solutions to the latest patches and major releases Monitoring system performance and capacity, and providing periodic system status reports Performing timely escalations as per SLAs Providing inputs for creation of SOPs and process improvements Maintaining high customer satisfaction Working collaboratively with the Service Delivery and Support team, Investigating faults in customers' O365 environment and maximizing performance through ongoing monitoring and troubleshooting Updating network equipment to the latest firmware releases Reporting on service scope to key stakeholders Preferred candidate profile 12+ years experience working in some of the following areas: IT service desk experience PC deployment and build O365, Microsoft Teams, Intune, Azure, Active Directory, endpoint security, email security, VDI, IP Telephony, VPN O365 mailbox migrations, Sharepoint migrations M365- Windows 10 Exposure to Cisco, Meraki, Check Point and other vendors (desirable) Exposure to any Video conferencing equipment (desirable). Prior experience working in an ITIL environment Microsoft certified Associate: MD-100, MD-101, AZ-104, MS-700, MS-100 Prior experience with Intune Perks and benefits Perks and benefits Oreta takes pride in providing a service of excellence to our customers and looking after our employees who enable our business to succeed. The successful applicant will enjoy working in a collaborative environment in Chandigarh, India with a friendly and highly driven people (the Oreos), where ideas are always welcome and ongoing training and development is strongly encouraged. The renumeration will be negotiated and based on the relevant skills and experience of the successful applicant. If you are interested in a long-term career with potential to develop and grow with the business and are available to start immediately, then we look forward to hearing from you.
Posted 2 months ago
0 - 2 years
2 - 3 Lacs
Pune
Work from Office
Role & responsibilities - Watching for security problems: Monitoring alerts from DLP, firewalls, and antivirus systems. Checking if problems are real: Investigating alerts to find actual threats. Getting IT to fix things: Working with the WPIT team to resolve security issues. Asking departments why: Getting explanations from departments for security-related actions. Keeping records: Documenting all alerts and actions taken. Preferred candidate profile - Basic understanding of network protocols & DLp, Logging & monitoring alerts Operating System :- Familiarity with Windows and Linux operating systems Log Analysis:Ability to analyze log files from various security devices and systems. Follow-up:Ability to track and follow up on incidents to ensure proper resolution. Excel :- Basic spreadsheet management & Data analysis and reporting. Note - Job Location - CommerZone, Yerwada, Pune Work Mode - Work from Office Work days - 5 days Domain - Payment/Card/Banking/BFSI/ Retail Payments Job Type - Full Time Notice period - Immediate or 30 days
Posted 2 months ago
5 - 10 years
5 - 10 Lacs
Bengaluru
Work from Office
IT Security - Team Lead - Bengaluru - Work from office Proven experience (5+ years) in IT security with team lead role experience. Deep knowledge of Security Technologies (like., Active Directory, Endpoint Protection, Web Gateway, DLP, firewalls, SIEM, IDS/IPS, Encryption, PAM, WAF, Vulnerability Assessment and Patch Management). Experience with Vulnerability Scanning Tools and Risk Assessment methodologies. Lead and mentor a team of Cyber Security Professionals, ensuring a high level of motivation, performance and continuous professional development. Manage Team workload, prioritize tasks and allocate resources effectively to meet security goals. Oversee day-to-day security operations, including security monitoring, incident detection and incident response. Analyse security logs and data to identify threats, vulnerabilities and anomalies and escalate issues as needed. Collaborate with IT and Development teams to integrate Security Best Practices into system architecture, network design and application development. Continuously evaluate and improve the company's security policies, procedures and controls. Foster a collaborative environment, providing support and guidance to junior and mid-level team members. Provide regular reports to Senior Management and Stakeholders on the Security Reports & Posture of the organization. Maintain clear and effective communication during security incidents and with other departments, ensuring timely resolution of issues. Conduct Security Awareness training for employees to promote security best practices. Ensure compliance with relevant industry regulations (e.g., GDPR, HIPAA, NIST, FDA). Stay current with the latest trends, tools and technologies in cyber security and bring innovation to the security program. Coordination with Vendor for Improvements and Deployment of new technology. ********************************************************************************* If interested with this opportunity, Kindly - do share your updated Resume along with below required details to devaraj.v@valuepointsystems.com OR WhatsApp to 8867682884 Notice Period: Total Experience: Relevant Experience: Current Location: Preferred Location: Current CTC: Expected CTC:
Posted 2 months ago
5 - 8 years
12 - 20 Lacs
Chennai
Work from Office
Maintain security architecture frameworks for enterprise systems/networks/cloud environments Design secure solutions as per NIST/ISO 27001 Implement secure cloud solutions for AWS/Azure environments & Zero Trust security models Required Candidate profile 5+ yrs exp Expert in NIST, MITRE ATT&CK CISSP/CISM/CCSP/AWS/Azure Speciality Research emerging technologies-PSM/MDM/MFA/DLP/CSPM/Disk Encryption Develop PoCs for new security tools
Posted 2 months ago
4 - 9 years
10 - 20 Lacs
Bengaluru
Work from Office
Preferred Knowledge The role requires efficient incident response and digital forensics skills to minimise the impact of cyber risks. The individual will oversee Security monitoring, Security tools Operations, Security incidents, ensure incidents are managed effectively and reported to stakeholders. This role primarily consists of first responder activities and to conducting thorough response activities on behalf of a wide variety of clients across every sector. Candidate required to work in complex security environments and alongside SOC team to design, communicate and execute incident response, containment, and remediation plans. Support incident response team analysts and incident management teams. Analyse tools, processes, and procedures for responding to cyber intrusions and come up with new methods for detecting cyber adversaries. Demonstrates proven expertise and success in incident handling, triage of events, network analysis and threat detection, trend analysis. Should have the following skills: Deep understanding of computer intrusion activities, incident response techniques, tools, and procedures Knowledge of Windows, Active Directory, DNS & Linux operating systems, Good Experience in SIEM monitoring (QRadar, Sentinel, Splunk, chronicle) Knowledge of SOAR technologies, working with playbooks (Cortex, chronicle, Splunk SOAR) Experience handling malware incidents and detections from EDR (MS Defender, Crowdstrike, SenitnelOne etc..) Working experience and knowledge of ITSM tools for incident management. Must be action oriented and have a proactive approach to solving issues. Knowledge of security logs, log quality review. Knowledge on IT (Operating systems, networking, databases) and IT security knowledge (system and network security) including IT security tools. Good knowledge of office collaboration tools Detect, Analyze, Investigate, and report qualified security incidents to the Client as per the defined SLA Provide recommendations to the security incidents reported as per SLA Investigates incidents using various security event sources (FW, IDS, PROXY, AD, EDR, DLP etc.). Investigations into non-standard incidents and execution of standard scenarios. Provide dashboard and data related to Incidents/Offenses for governance reports. Escalates to L3 if investigations uncover unusual or atypical situations. Monitoring unhealthy log source/data source and escalate to engineering team to fix them. Participate in incident response (IR) efforts; detect, identify, respond, contain and remediate all information security incidents. Rapidly and accurately determine the source of a security incident and moving quickly to identify and apply containment, mitigation, and remediation steps. Contribute to the execution of Cyber Security operations, incident response, and investigations spanning across all functions of the Corporate Security organization. Track, monitor incident actions while applying intelligence, situational awareness to prioritise incident actions based on risk Responsible for Incident and Breach communications, assessments, and reports and customer facing, to include leadership and executive management for the purpose of enabling Senior Management to make decisions in a crisis Develop and document processes to ensure consistent and scalable response operations.
Posted 2 months ago
5 - 10 years
7 - 12 Lacs
Gurgaon
Work from Office
Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Endpoint Protection Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Job Summary :We are seeking a skilled Beyond Trust Endpoint Privilege Management (EPM) Specialist to join our IT security team. The ideal candidate will be responsible for implementing, managing, and optimizing Beyond Trust EPM solutions on Windows 10 and Windows 11 environments. This role focuses on enhancing security by managing and controlling administrative privileges on endpoints, reducing attack surfaces, and ensuring compliance with security policies.Key Responsibilities: Implementation and Configuration:oDeploy and configure Beyond Trust EPM solutions on Windows 10 and Windows 11 systems.oCustomize EPM policies to meet organizational security requirements and best practices.oIntegrate Beyond Trust EPM with existing IT infrastructure and security tools. Privilege Management:oDevelop and enforce policies for least privilege access on endpoints.oMonitor and manage user and application privileges to prevent unauthorized access.oCreate and maintain whitelists and blacklists for applications and processes. Security and Compliance:oEnsure endpoint security compliance with organizational policies and regulatory requirements.oConduct regular audits of privileged access and generate compliance reports.oCollaborate with security and compliance teams to address findings and improve security posture. Monitoring and Reporting:oSet up and maintain monitoring and alerting systems for privileged access activities.oAnalyze and respond to security incidents related to privileged access.oGenerate regular reports on EPM activities, incidents, and compliance status. User Training and Support:oProvide training and support to end-users and IT staff on EPM policies and procedures.oAssist in troubleshooting and resolving issues related to EPM solutions.oDevelop and update documentation and training materials. Continuous Improvement:oStay up to date with the latest security threats, trends, and technologies.oRecommend and implement improvements to EPM policies and configurations.oParticipate in security assessments and risk management activities. Qualifications: Education:oBachelor's degree in information technology, Computer Science, Cybersecurity, or related field. Relevant certifications and experience may be considered in lieu of a degree. Experience:oProven experience in implementing and managing Beyond Trust EPM solutions.oStrong knowledge of Windows 10 and Windows 11 operating systems.oExperience with endpoint security and privilege management. Skills and Competencies:oDeep understanding of least privilege access principles and practices.oProficiency in configuring and managing EPM policies and rules.oFamiliarity with Active Directory, Group Policy, and other endpoint management tools.oExcellent troubleshooting and problem-solving skills.oStrong communication and interpersonal skills.oAbility to work independently and as part of a team. Certifications:oRelevant certifications such as Beyond Trust Certified Engineer (BTCE), Certified Information Qualifications 15 years full time education
Posted 2 months ago
3 - 8 years
5 - 10 Lacs
Gurgaon
Work from Office
Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Endpoint Protection Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Job Summary :We are seeking a skilled Beyond Trust Endpoint Privilege Management (EPM) Specialist to join our IT security team. The ideal candidate will be responsible for implementing, managing, and optimizing Beyond Trust EPM solutions on Windows 10 and Windows 11 environments. This role focuses on enhancing security by managing and controlling administrative privileges on endpoints, reducing attack surfaces, and ensuring compliance with security policies.Key Responsibilities: Implementation and Configuration:oDeploy and configure Beyond Trust EPM solutions on Windows 10 and Windows 11 systems.oCustomize EPM policies to meet organizational security requirements and best practices.oIntegrate Beyond Trust EPM with existing IT infrastructure and security tools. Privilege Management:oDevelop and enforce policies for least privilege access on endpoints.oMonitor and manage user and application privileges to prevent unauthorized access.oCreate and maintain whitelists and blacklists for applications and processes. Security and Compliance:oEnsure endpoint security compliance with organizational policies and regulatory requirements.oConduct regular audits of privileged access and generate compliance reports.oCollaborate with security and compliance teams to address findings and improve security posture. Monitoring and Reporting:oSet up and maintain monitoring and alerting systems for privileged access activities.oAnalyze and respond to security incidents related to privileged access.oGenerate regular reports on EPM activities, incidents, and compliance status. User Training and Support:oProvide training and support to end-users and IT staff on EPM policies and procedures.oAssist in troubleshooting and resolving issues related to EPM solutions.oDevelop and update documentation and training materials. Continuous Improvement:oStay up to date with the latest security threats, trends, and technologies.oRecommend and implement improvements to EPM policies and configurations.oParticipate in security assessments and risk management activities. Qualifications: Education:oBachelor's degree in information technology, Computer Science, Cybersecurity, or related field. Relevant certifications and experience may be considered in lieu of a degree. Experience:oProven experience in implementing and managing Beyond Trust EPM solutions.oStrong knowledge of Windows 10 and Windows 11 operating systems.oExperience with endpoint security and privilege management. Skills and Competencies:oDeep understanding of least privilege access principles and practices.oProficiency in configuring and managing EPM policies and rules.oFamiliarity with Active Directory, Group Policy, and other endpoint management tools.oExcellent troubleshooting and problem-solving skills.oStrong communication and interpersonal skills.oAbility to work independently and as part of a team. Certifications:oRelevant certifications such as Beyond Trust Certified Engineer (BTCE), Certified Information Qualifications 15 years full time education
Posted 2 months ago
7 - 12 years
9 - 14 Lacs
Jaipur
Work from Office
Project Role : Technology Architect Project Role Description : Review and integrate all application requirements, including functional, security, integration, performance, quality and operations requirements. Review and integrate the technical architecture requirements. Provide input into final decisions regarding hardware, network products, system software and security. Must have skills : Microsoft Intune Good to have skills : Microsoft Endpoint Configuration Manager Minimum 7.5 year(s) of experience is required Educational Qualification : BE BSc or equivalent Summary :As an Intune Architect, you will be responsible for the design, build, configure MECM infrastructure, application deployment, patch management process, OSD. Design and build Windows 10/11 SOE image, Intune configurations for Autopilot deployment, Configuration policies, MDM, Endpoint Security, Proactive Remediations, Reporting & Compliance Roles & Responsibilities:a)Ability to build new greenfield infrastructures for MECM.b)Able to build new solutions for modern device management.c)Design and plan Windows Servicing approach.d)Day to day administration of MECM environment to include engineering new solutions as needed.e)Providing technical guidance to MECM team and customer.f)Provide Tier 3 support for MECM Intune.g)Creating and updating technical documentation as required.h)Design and build Intune configurations for Windows 10 Autopilot, Configuration policies, endpoint security.i)Experience with PowerShell and OSD (Operating System Deployments)j)Configuring WDS, configuring PXE, configuring the VM build environment, and integration with MDT.k)Experience in performing large scale upgrade from windows to windows 11.l)Experience is managing deployment of device drivers. m)Experience in servicing MECM current branch infrastructures. Professional & Technical Skills:a)Should have strong experience on MECM & Intuneb)Ability to design, build and configure MECM environment.c)Design and build Windows 10 image, provide support in image rollout.d)Should be able to design policies in Intune for Windows 10/11e)Should have strong hand on Autopilot enrolments and associated configurations and rollout. Additional Information: The candidate should have a minimum of 8+ years of experience in Microsoft Endpoint Configuration Manager & Intune. The ideal candidate will possess a strong educational background in computer science or a related field, along with a proven track record of delivering impactful solutions Qualifications BE BSc or equivalent
Posted 2 months ago
4 - 9 years
8 - 18 Lacs
Bengaluru
Remote
Job Title: Cloud security & AI Engineer (Java) Duration: Full time role Location: Remote (Bengaluru, India) Note: Need someone who can join immediately OR at least in 30-45 days. Note: Need someone who can join immediately OR at least in 30-45 days. Job Description: Duties: Responsible for the complete software development life cycle including requirement analysis, design, development, deployment and support. Responsible for developing software products for Agentic AI Security. Write clean, testable, readable, scalable and maintainable Java/ Python/Go lang code. Design, develop and implement highly scalable software features and infrastructure on our security platform ready for cloud native deployment from inception to completion. Participate actively and contribute to design and development discussions. Develop solid understanding and be able to explain advanced Cloud Computing and Cloud Security concepts to others. Work cross-functionally with Product Management, SRE, Software, and Quality Engineering teams to deliver new security as a service offerings to the market in a timely fashion with excellent quality. Be able to clearly communicate goals and desired outcomes to internal project teams. Work closely with customer support teams to improve end-customer outcome. Skills: 5+ years of experience in software engineering, with a focus on cloud-native application development, at large organizations or innovative startups. 3+ Experience and deep understanding for building connectors for Low Code/No Code and Agentic AI platforms like Microsoft Copilot Studio, Microsoft Power Platform, Salesforce Agentforce, Zappier, Crew AI, Marketo etc. 5+ Experience building connectors for SaaS Applications like Microsoft O365, Power Apps, Salesforce, ServiceNow etc. Strong programming skills in Java, with experience in building distributed systems. Preferred experience with security products- Data and DLP, CASB Security, SASE, integration with third party APIs and services. 5+ years of Experience with running workloads on cloud-based architectures. (AWS/GCP experience preferred) 5+ years of experience in cloud technologies like ElasticSearch, Redis, Kafka, Mongo DB, Spring Boot. Experience with Docker and Kubernetes or other container orchestration platforms. Excellent troubleshooting abilities. Isolate issues found during testing and verify bug fixes once they are resolved. Experience with backend development (Rest APIs, Databases, Serverless computing) of distributed cloud applications. Experience with building and delivering services and workflows at scale, leveraging microservices architectures. Experience with the agile process and working with software development teams involved with building out full stack products, deployed on the cloud at scale. Good understanding of public cloud design considerations and limitations in areas of microservice architectures, security, global network infrastructure, distributed systems, and load balancing. Strong understanding of principles of DevOps and Continuous Delivery. Can-do attitude and ability to make trade-off judgements with data driven decision making. High energy and the ability to work in a fast-paced environment. Enjoys working with many different teams with strong collaboration and communications skills.
Posted 2 months ago
8 - 13 years
8 - 12 Lacs
Gurgaon
Work from Office
Role & responsibilities Minimum 7 years required. Should have experience in designing security solutions. Should have experience in designing Enterprise security needs. Should have experience in Cyber Security. Should have experience in Endpoint security. Should have work with internal IT and security teams to integrate, configure, and optimize OEM security solutions. Should have conduct POC testing. Should have Experience of Firewalls IDS/IPS, VPNs, NAC, SDWAN and other networking technologies. Should have use any of the platform SIEM & SOAR. Should have the knowledge of Data Loss Prevention (DLP) solutions, Email security, Endpoint Encryption. Should have experience in responding to government RFPs, RFIs, and tenders for cybersecurity and IT solutions. Preferred candidate profile Perks and benefits
Posted 2 months ago
5 - 8 years
7 - 10 Lacs
Bengaluru
Work from Office
Role Overview: Skyhigh Security is looking for you, someone with technical depth to join our team leading the implementations and integration of our product suite into customers environments. Your role is critical in ensuring that our products and solutions are configured in a way that maximizes the benefit of these solutions to our customers, thereby increasing adoption and usage of the product while successfully driving stickiness of these solutions within the customers ecosystem. In this role, you can expect to: Work alongside senior team members leading customer implementations to understand the technical requirements and customer environments. Assist project leads in developing the overall implementation project plan, utilizing your requirements understanding to define the solution configuration. Act as a specialist to install, configure and troubleshoot products and solutions as defined in the project plan. Ensure the customers policies are properly configured in accordance with their requirements. Assist customers in understanding how the technology functions, increasing adoption of the product and driving product stickiness. Learn and adopt best practices for customer deployments from senior team members, increasing your knowledge and skill. To Fly High in this role, you must have: A bachelors degree in computer science with 5+ years of technical experience in a large enterprise organization, or equivalent professional services experience. 3-5 years of experience in customer implementations of cybersecurity solutions. Demonstrated hands-on experience in working with cybersecurity customers to deploy relevant solutions within a product set. Sound fundamentals of Web Proxy/NGFW/Email Security Gateways, SIEM, SAML/SSO, DLP, Data Encryption technology, SAAS understanding Solid, in-depth knowledge of Networking & Security Concepts Solid demonstrated understanding of both business and technical requirements. Demonstrated ability to follow detailed direction and or project with an open approach to feedback. Demonstrated experience in contributing to deployment project plans. Solid communication skills, both written and oral across both the internal organization and to customers It would be great if you also have: Experience deploying on-premise or VM based web proxy solutions Experience deploying cloud-based solutions cloud cybersecurity solutions Experience deploying CASB solutions
Posted 2 months ago
4 - 9 years
15 - 30 Lacs
Hyderabad, Gurgaon, Noida
Work from Office
We are looking for "Infrastructure Security - DLP Admin" with Minimum 4 years experience Contact- Atchaya (95001 64554) Required Candidate profile Symantec DLP/ Broadcom DLP administration Experience, DLP ICAP, DLP network monitor/Prevent, DLP discover day operations. Strong Network fundamentals TCP/IP , Routing, Switching.
Posted 2 months ago
3 - 6 years
5 - 8 Lacs
Bengaluru
Work from Office
Job Title - Security Delivery Associate Management Level: L13 or L12 Associate Location: Bengaluru Must have skills: Data Loss Prevention Good to have skills Understanding of computer hardware / operating systems (Windows, Linux, OS X, iOS/Android, etc.), IT Security, is a plus Job Summary :Accenture's Cyber Incident Response Team (CIRT) monitors the cyber threat landscape, coordinates prevention, detection, and corrective activities, and manages vulnerabilities and incidents. Within this organization, is the Data Loss Prevention team. This team responds to cyber-security incidents identified through the Data Loss Prevention (DLP) tool. By following a set process, the team is responsible for analyzing, collecting relevant details, determining the type of security incident, and escalating accordingly. The team works closely with other functions within CIRT to handle incidents. The team is also responsible for coordinating with numerous other teams who are involved with conducting follow-up investigations to such incidents. Roles & Responsibilities: Review DLP alerts appropriately, escalate and close cases in accordance with the team's defined process. Liaise with different functions within CIRT to gather information including Investigations, Infrastructure, ASOC, and Cyber Threat Intelligence. Coordinate with various teams during the escalation process, including Technology Support teams, Legal teams, HR, and other teams as defined in the escalation process. Keep all tracking and recording tools current and update incidents in tracking database with appropriate details in a timely manner. Perform incident accuracy checks within Incident Tracking database and update details when necessary. Effectively work and collaborate with a global team. Adapt to continuous process improvements and change requests as needed. Have strong communication skills; attention to detail and accuracy of information is paramount. Professional & Technical Skills: Above average problem-solving skills Excellent oral and written English communication skills Ability to manipulate and present data using MS Office and Excel Strong sense of ethics & values, ability to handle confidential situations with discretion Must be able to work collaboratively across physical locations or geographies Ability to multi-task and prioritize assigned workload Additional Information: Security+ Certification Experience working in Information Security domain Willing to work overtime, rotating shifts, work during weekends and holidays, as necessary
Posted 2 months ago
10 - 12 years
12 - 17 Lacs
Bengaluru
Work from Office
The Role Kyndryls Security & Resiliency is one of our most critical practices, ensuring enterprises, regardless of their size and complexity, remain secure, available, reliable, and resilient. We take Cybersecurity seriously. We're not just invested; we're committed. We're not just protecting data; we're empowering. Kyndryl is committed to making the world safer, not only by investing in state-of-the-art services and technologies but also by empowering underserved communities with essential cyber skills. When you walk through our doors, you're not only joining a team but you're also becoming part of a legacy. Welcome to Kyndryl, where Cybersecurity isn't just a job its a passion; a commitment to designing, running, and managing the most modern and reliable technology infrastructure that the world depends on every day. As a Cybersecurity Defense professional at Kyndryl, you will encompass cybersecurity, incident response, security operations, vulnerability management, and the world of cyber threat hunting and security intelligence analysis all to protect the very heartbeat of organizations their infrastructure. In this role, you won't just monitor; you'll actively engage in the relentless hunt for cyber adversaries. In a world where every click and keystroke could be a potential gateway for attackers, your role will be nothing short of critical as you seek out advanced threats, attackers, and Indicators of Compromise (IOCs). Your expertise in endpoint detection and response (EDR) will be the shield that safeguards individual workstations, laptops, servers, and other devices from cybercrime. Your responsibilities go beyond vigilance. When it comes to network security, you'll utilize Network Detection and Response (NDR) to monitor the ever-flowing currents of network traffic. The incident management process will be used as you respond and manage to cybersecurity incidents. Cybersecurity Defense is all about information. You'll gather, analyze, and interpret data applying your own and external threat intelligence to uncover potential security threats and risks. These insights and your ability to analyze complex attack scenarios will be the foundation of our security strategy helping Kyndryl stay one step ahead of security breaches. In Cybersecurity Defense at Kyndryl, youre not just protecting the present youre shaping the future of digital security. Join us on this cybersecurity venture where your expertise and creativity will have a lasting impact in the world of digital defense. Who You Are Youre good at what you do and possess the required experience to prove it. However, equally as important you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused someone who prioritizes customer success in their work. And finally, youre open and borderless naturally inclusive in how you work with others. Required Technical and Professional Expertise: Minimum of 10-12 years' experience as a Splunk Security Engineer Expertise in designing and implementing Splunk Enterprise Security (ES) solutions Experience in configuring and optimizing Splunk search queries, dashboards, and reports In-depth knowledge of security technologies, including SIEM, IDS/IPS, DLP, and endpoint security Strong understanding of network protocols, TCP/IP, and security-related protocols Excellent analytical and problem-solving skills Ability to work independently and in a team environment Strong communication and interpersonal skills Preferred Technical and Professional Expertise Using Splunk, design and implement solutions to address and meet logging requirements in the client environment with remote logging capabilities. Configuring Splunk: Set up Splunk forwarding, configure the deployment server, and manage the Splunk indexer cluster Monitoring and troubleshooting: Monitor the Splunk infrastructure, troubleshoot performance issues, and identify bad searches and dashboards Managing security: Provide role-based security, restrict access to sensitive data, and manage Splunk license master Managing users: Manage users and their roles, and onboard new users Managing data: Manage indexes, create Splunk indexes, and design retention and retirement policies Deploying Splunk: Deploy Splunk dashboards and reports, and execute new projects Strong critical thinking and analytical skills and ability to think out of the box required. Must be able to work independently or with a team, under minimum supervision. Preferred Technical and Professional Experience Thorough knowledge on defining data sources monitoring based on clients business Thorough knowledge on MITRE Frameworks (ATT&CK, D3FEND)
Posted 2 months ago
8 - 10 years
27 - 32 Lacs
Mumbai
Work from Office
The Role Are you passionate about cybersecurity and looking for an exciting role where you can make a difference? If so, we have an opportunity for you! As a Security Specialist at Kyndryl, you will play a crucial role in enabling and securing our customer organizations, cultures, and ecosystems. Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and security awareness workshops. You will be tasked with configuring, monitoring, and managing the performance of networks to maintain the quality of services, while also protecting organizational infrastructure from malicious cyber-attacks. As a key member of our team, you will assess, predict, prevent, and manage the risk of IT infrastructure and data, helping our customers stay ahead of the curve and ensure their systems are secure. You will develop and implement security policies and procedures, working closely with other departments to ensure that all security measures are in place and operating effectively. But that is not all at Kyndryl you will have the opportunity to explore innovation in CyberSecurity data science taking information that has been gathered and looking for areas to have that Ah Ha moment. Drawing conclusions and patterns from the data across single and multiple clients. Creating new ideas in the area of risk management and risk quantification. In addition to your technical responsibilities, you will also play a key role in raising awareness of potential security threats through technical security training on best practices. This is an exciting opportunity to help shape the culture of our clients' organizations and make a tangible impact on their security posture. If you have a passion for cybersecurity governance, risk and compliance, are looking for a challenging and dynamic role, and want to work with a team of like-minded individuals, then we want to hear from you! Join us as a Security Specialist and help us secure the future of our clients' organizations. Who You Are Youre good at what you do and possess the required experience to prove it. However, equally as important you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused someone who prioritizes customer success in their work. And finally, youre open and borderless naturally inclusive in how you work with others. Required Technical and Professional Expertise 8-10 years of experience in Security BSc BCA BE Diploma MCA MSc or equivalent Min 10 years of relevant experience as a Security engineer for troubleshooting security devices & BAU support. Good understanding on Next Generation Firewalls (Cisco, Palo Alto Networks, Fortinet) and experience in handling security concepts (Rule ADD/ Modify Delete, Nat, Faulty Firewall replacement, High Availability setup, packet capture, log analysis etc.) Advanced knowledge on Daily tickets & issues for security devices like Firewall, WAF, DDoS Protection, DLP, PIM/PAM, SOC EDR solution and their monitoring, troubleshooting & firmware upgrade Troubleshoot and fix high priority issues related to Firewall, Anti-Virus, WAF, EDR, DDOS, PIM & PAM, DLP, SASE, SOC issues is added advantage. Work with the HW Vendors/TAC for the SW/HW related issues and providing the fix. Involve in change management process for HW replacement/ IOS upgrade/ Config change/ BW upgrade/ Whitelisting or Blacklist URLs & FW Rule addition etc. Knowledge and experience in Incident, Change, Problem, Service request and Configuration Management Processes Monitor the queue and maintain regular updates on the Tickets as per agreed timeline, providing the detailed closure summary on the tickets. Detailed Root cause summary to be documented for the Problem tickets. Document Pre & Post implementation logs & Script for change. Network Diagram updates. Working on the assigned tickets within the agreed Timeline/SLA as per the Ticket Priority/Severity and Adhere to the ITIL process with zero noncompliance. Upskilling the technical knowledge by learning new Technology and doing relevant technical certifications Preferred Technical and Professional Expertise. At least 5 years experience in managing security domain.
Posted 2 months ago
10 - 12 years
30 - 35 Lacs
Bengaluru
Work from Office
The Role Kyndryls Security & Resiliency is one of our most critical practices, ensuring enterprises, regardless of their size and complexity, remain secure, available, reliable, and resilient. We take Cybersecurity seriously. We're not just invested; we're committed. We're not just protecting data; we're empowering. Kyndryl is committed to making the world safer, not only by investing in state-of-the-art services and technologies but also by empowering underserved communities with essential cyber skills. When you walk through our doors, you're not only joining a team but you're also becoming part of a legacy. Welcome to Kyndryl, where Cybersecurity isn't just a job its a passion; a commitment to designing, running, and managing the most modern and reliable technology infrastructure that the world depends on every day. As a Cybersecurity Defense professional at Kyndryl, you will encompass cybersecurity, incident response, security operations, vulnerability management, and the world of cyber threat hunting and security intelligence analysis all to protect the very heartbeat of organizations their infrastructure. In this role, you won't just monitor; you'll actively engage in the relentless hunt for cyber adversaries. In a world where every click and keystroke could be a potential gateway for attackers, your role will be nothing short of critical as you seek out advanced threats, attackers, and Indicators of Compromise (IOCs). Your expertise in endpoint detection and response (EDR) will be the shield that safeguards individual workstations, laptops, servers, and other devices from cybercrime. Your responsibilities go beyond vigilance. When it comes to network security, you'll utilize Network Detection and Response (NDR) to monitor the ever-flowing currents of network traffic. The incident management process will be used as you respond and manage to cybersecurity incidents. Cybersecurity Defense is all about information. You'll gather, analyze, and interpret data applying your own and external threat intelligence to uncover potential security threats and risks. These insights and your ability to analyze complex attack scenarios will be the foundation of our security strategy helping Kyndryl stay one step ahead of security breaches. In Cybersecurity Defense at Kyndryl, youre not just protecting the present youre shaping the future of digital security. Join us on this cybersecurity venture where your expertise and creativity will have a lasting impact in the world of digital defense. Your Future at Kyndryl When you join Kyndryl, you're not just joining a company you're entering a space of opportunities. Our partnerships with industry alliances and vendors mean you'll have access to skilling and certification programs needed to excel in Security & Resiliency, while simultaneously supporting your personal growth. Whether you envision your career path as a technical leader within cybersecurity or transition into other technical, consulting, or go-to-market roles were invested in your journey. Who You Are Youre good at what you do and possess the required experience to prove it. However, equally as important you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused someone who prioritizes customer success in their work. And finally, youre open and borderless naturally inclusive in how you work with others. Required Technical and Professional Expertise: Minimum of 10-12 years' experience as a Splunk Security Engineer Expertise in designing and implementing Splunk Enterprise Security (ES) solutions Experience in configuring and optimizing Splunk search queries, dashboards, and reports In-depth knowledge of security technologies, including SIEM, IDS/IPS, DLP, and endpoint security Strong understanding of network protocols, TCP/IP, and security-related protocols Excellent analytical and problem-solving skills Ability to work independently and in a team environment Strong communication and interpersonal skills Preferred Technical and Professional Expertise Using Splunk, design and implement solutions to address and meet logging requirements in the client environment with remote logging capabilities. Configuring Splunk: Set up Splunk forwarding, configure the deployment server, and manage the Splunk indexer cluster Monitoring and troubleshooting: Monitor the Splunk infrastructure, troubleshoot performance issues, and identify bad searches and dashboards Managing security: Provide role-based security, restrict access to sensitive data, and manage Splunk license master Managing users: Manage users and their roles, and onboard new users Managing data: Manage indexes, create Splunk indexes, and design retention and retirement policies Deploying Splunk: Deploy Splunk dashboards and reports, and execute new projects Strong critical thinking and analytical skills and ability to think out of the box required. Must be able to work independently or with a team, under minimum supervision. Preferred Technical and Professional Experience Thorough knowledge on defining data sources monitoring based on clients business Thorough knowledge on MITRE Frameworks (ATT&CK, D3FEND)
Posted 2 months ago
15 - 20 years
35 - 40 Lacs
Pune
Work from Office
Job Title: Cloud Architecture and Engineering Corporate Title: Director Overview: Corporate Banking is a technology centric business, with an increasing move to real-time processing, an increasing appetite from customers for integrated systems and access to supporting data. This means that technology is more important than ever for business. Deutsche Bank is one of the few banks with the scale and network to compete aggressively in this space, and the breadth of investment in this area is unmatched by our peers. Joining the team is a unique opportunity to help rebuild the core of some of our most mission critical processing systems from the ground-up. Our Corporate Bank Technology team is a global team of 3000 Engineers (and growing!) across 30 countries. The primary businesses that we support within Corporate Bank are Cash Management, Securities Services, Trade Finance and Trust & Agency Services. CB Technology supports these businesses through vertical CIO aligned teams and by horizontals such as Client Connectivity, Surveillance and Regulatory, Infrastructure, Architecture, Production, and Risk & Control. Your Role - What Youll Do As a GenAI and Google Cloud Architecture and Engineer for Corporate Bank domains, you will be responsible for helping direct, create, review, and approve architectural designs for applications in the tribe. You are expected to be a hands-on developer with practical architecture depth to meet business and technical requirements as well as provide coaching and guidance to the team to enable future success. Key Responsibilities: An experienced architect to lead our global cloud infrastructure architecture across domains in Corporate Bank Technology This individual will create domain level architecture roadmaps that will ensure long-term business strategy success while reducing complexity and managing cost The individual will also be responsible to build solutions and deliver to production as needed for TAS business. This position will play a critical role in design and blueprints for GenAI and cloud infrastructure and migration projects. Provide technical leadership to globally distributed and diverse development team(s) across multiple TAS Tribes and potentially other Corporate Bank Domains Lead solution design and work with group architecture to deliver complex high and low-level designs Work closely with Senior architects/engineering heads/project/program management as well as managers of related applications to build and deliver the software Continually help to improve the performance of the team regarding SDLC, QA, CICD, DORA KPIs and post-release activities Act as an expert on the platform in various capacities, strategy meetings, and product development opportunities Coordinate with other Lead Software Development Engineers to create and deliver an application release plan with a focus on cloud implementation Work with SRE and L3 support for the application to help bring architectural improvements Skills Youll Need : Expert level knowledge of GenAI and cloud architecture at the solution implementation level. Overall experience of 15+ years with hands on coding/engineering skills with 6+ years in building cloud applications in production Excellent communication skills and experience to broadcast complex architecture strategies and implementation details. Prior experience with large scale enterprise architecture, road mapping, and design with applications in production on cloud. (not just poc) Architecture certifications for GCP (preferred) or AWS Deep knowledge of the Architecture and Design Principles, Algorithms and Data Structures, and UI Accessibility for both on-prem and cloud native solutions (GCP preferred) Good Knowledge of Micro frontend & Microservices Architecture, Kubernetes, Docker, Cloud Native application, Grafana/New Relic or other monitoring tools, APIs, Rest Services & Google Cloud Platform Working knowledge of GIT, Jenkins, CICD, Gradle, DevOps and SRE techniques Understanding of the Cryptography and principles of Information Security Strong knowledge of JavaScript, React, Node, Typescript, HTML, CSS Strong knowledge of Core Java, Spring-boot, Oracle, MySQL and/or PostgreSQL, Data processing, Kafka, MQ to help with migration of on prem application to cloud. Cloud Components (e.g. Big query, Dataflow, Dataproc, DLP, Big Table, Pub/Sub, Compos, Azure, AWS etc.) Experience with high-load, high traffic systems and performance testing and tuning Experience in building highly available distributed applications with zero-downtime release cycle Knowledge and experience with modern security eco-systems GCP cloud architect certification and implementation of mid to large systems
Posted 2 months ago
6 - 10 years
8 - 12 Lacs
Gurgaon
Work from Office
Requirements: Proficient with Active Directory and related concepts Familiar with access control methods (RBAC/ABAC) Working knowledge of identity lifecycle management processes and challenges Hands-on experience with cybersecurity tools that function in the following spaces: PAM / PIM / IAM, DLP, SOAR (XSIAM), Microsoft Security, AWS Security, Red Teaming / AppSec, Isolated Recovery Environments (IREs) Experience with identity federation and SSO solutions PAM experience or familiarity with specific vendor tools Able to speak to PAM best practices Understanding of the principle of least privilege, separation of duties Experience with REST API and app integration Experience configuring, guiding, or overseeing access review and certification, role management Past participation in identity steering committee Understanding of PIM, JIT, conditional access Familiarity with US compliance and regulatory frameworks that inform identity requirements Qualifications: 6+ years of working knowledge of one or more Identity-Based Security Solutions: Okta, Sailpoint, Delinea, BeyondTrust, CyberArk, etc. Any of the following preferred but not required: Security+, CISSP, any vendor-specific certifications related to Identity products Willingness to travel to support client projects and shadowing opportunities (50+ % of the time)
Posted 2 months ago
3 - 8 years
12 - 22 Lacs
Bengaluru
Work from Office
Develop data protection policies and procedures in accordance with privacy laws and regulations for clients Conduct assessments to identify potential data privacy and protection risks and develop mitigation strategies for clients as per their requirements Monitor and evaluate data processing activities to ensure compliance with data protection laws and company policies as per client requirements Provide guidance and support to the clients on conducting data protection impact assessments (DPIAs), conducting risk assessments, data governance, application, privacy impact assessments. Design and build security / privacy framework, design/re-design processes and privacy controls to ensure framework development for clients Recommend creative privacy solutions and participate in discussions regarding the recommendations with various stakeholders, define privacy metrics and corresponding dashboards for monitoring and reporting purposes Collaborate with internal teams to raise awareness of data protection policies and practices. • Stay informed about global developments in data protection laws and regulations and update policies and procedures accordingly. Develop proposals and engagement letters as per client requirements for project deliverables • Work on risk formalities as per internal requirements for project work Develop records of data processing activities and data protection compliance efforts as per client requirements
Posted 2 months ago
10 - 20 years
30 - 40 Lacs
Amritsar
Work from Office
Shift Timing: 2pm to 11pm IST Duration: 6-12 months (C2H; fulltime 40 hours/week) Overview We are seeking a skilled, adaptable, and teamwork-oriented Systems Administrator to assist with several ongoing IT and cybersecurity initiatives. Projects include: Planning, building, and testing DLP policy both in O365 and on user workstations Testing and implementing PAM solution (Delinea) Creating patching and reboot schedules for production Windows servers The successful candidate will be responsible for working with our Operations and Cyber Security teams to implement PAM and DLP solutions throughout the organization. This role will also assist with our MDM environment to deploy applications and policies to end user workstations, Windows and Mac. Creating patching windows for our production servers will require close partnership with various stakeholders to ensure maintenance downtime does not negatively impact the business. Responsibilities Design, test, and implement PAM solution alongside cybersecurity team. Strategize and test DLP policies to protect our data in the cloud and on end-user workstations. Create and enforce mobile device policies and procedures via JAMF and InTune. Experience with Windows patch management, preferably Automox. Collaborate with various teams to test new application builds before deploying through MDM. Perform advanced level troubleshooting and remediation of issues with endpoints devices and deployed applications. Create and audit data leak protection rules for BYOD devices via InTune (both laptop and mobile). Collaborate with the Cyber Security team to ensure all security protocols are being met by our various MDM solutions and deployments. Experience & Qualifications Minimum 3-5 years of relevant work experience with Endpoint Security, MDM, O365 Knowledge in managing both Windows and Apple devices. Knowledge in managing Apple Business Manager and DEP. Previous experience building and working with PAM solutions. (Delinea preferred) Previous experience building and working with DLP policies. Previous experience supporting workstations via InTune and JAMF Required Knowledge, Skills, and Abilities Ability to effectively contribute to multiple projects simultaneously. Strong understanding and background of working with large endpoint device management environments. Knowledge in MDM architecture and infrastructure. Excellent teamwork, time-management, and organizational skills. Excellent communication skills. Regularly work with multiple departments to accomplish changing business needs. Proven analytical and problem-solving ability. Demonstrated leadership and personal project management skills. Ability to act as an individual contributor as well as part of a larger team. Location - Remote, Hyderabad,ahmedabad,pune,chennai,kolkata.
Posted 2 months ago
10 - 13 years
27 - 30 Lacs
Ahmedabad, Bengaluru, Kolkata
Work from Office
Dear Candidate, We are looking for a Cloud Security Architect to lead the design, implementation, and governance of security solutions for cloud-based infrastructures. As businesses increasingly migrate to cloud platforms, ensuring robust security controls, compliance, and risk mitigation strategies is critical. Key Responsibilities: Design and implement cloud security strategies for public, private, and hybrid cloud environments . Develop cloud security architectures, security controls, and frameworks to protect cloud-native applications. Conduct risk assessments and threat modeling to identify cloud security weaknesses and implement mitigation strategies. Implement identity and access management (IAM), role-based access control (RBAC), and least privilege principles in cloud platforms. Ensure secure API gateways, microservices security, and container security (Docker, Kubernetes, serverless computing). Deploy and manage cloud security solutions , including Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWPP), and Cloud Access Security Brokers (CASB) . Develop and enforce secure cloud networking (VPC peering, firewalls, Zero Trust security, network segmentation). Perform continuous monitoring, logging, and anomaly detection using SIEM solutions (Splunk, IBM QRadar, Azure Sentinel). Implement data encryption at rest and in transit , utilizing AWS KMS, Azure Key Vault, Google Cloud KMS . Work with DevSecOps teams to automate security in CI/CD pipelines, infrastructure-as-code (IaC), and software development lifecycles . Develop disaster recovery and incident response strategies to mitigate cloud security threats. Collaborate with security teams to implement cloud compliance frameworks (SOC 2, ISO 27001, HIPAA, PCI-DSS, NIST, FedRAMP). Guide security awareness programs to train developers and engineers on cloud security best practices . Research emerging cloud security threats , vulnerabilities, and best practices, integrating them into security policies. Required Skills & Qualifications: Extensive experience in cloud security architecture, governance, and risk management . Deep knowledge of cloud security services in AWS (IAM, Security Hub, GuardDuty), Azure (Defender, Sentinel), and GCP (Cloud Armor, Security Command Center) . Hands-on expertise with container security tools (Kubernetes Security, Aqua Security, Prisma Cloud, Twistlock, Sysdig Secure). Strong understanding of Zero Trust security models and Secure Access Service Edge (SASE) . Proficiency in encryption standards (AES, RSA, TLS 1.3, Quantum-resistant cryptography). Experience with multi-cloud security configurations and security automation (Terraform, Ansible, CloudFormation). Familiarity with Cloud IAM, OAuth 2.0, SAML, OpenID Connect, MFA, and privileged access management (PAM) . Understanding of threat intelligence for cloud security (MITRE ATT&CK, cyber kill chain methodologies). Strong scripting knowledge ( Python, PowerShell, Bash ) to automate security controls. Experience in cloud security audits, penetration testing, and compliance assessment . Soft Skills: Strong problem-solving and analytical skills. Excellent communication skills to work with cross-functional teams. Ability to work independently and as part of a team. Detail-oriented with a focus on delivering high-quality solutions Note: If you are interested, please share your updated resume and suggest the best number & time to connect with you. If your resume is shortlisted, one of the HR from my team will contact you as soon as possible. Srinivasa Reddy Kandi Delivery Manager Integra Technologies
Posted 2 months ago
3 - 7 years
4 - 9 Lacs
Pune
Work from Office
Role & responsibilities 1. Setup and maintain Costing Systems and evaluation Costing Standards for Tooling & 3d Proto. 2. Managing RFQ & P2P cycle from Concept Development stage to Finished Goods stage. 3. Verify Supplier quotations and follow up costing issues with suppliers and in-house engineers. 4. Prepare ZBC / tooling cost breakdowns / analysis reports for cost evaluation and control. 5. Coordinate with other parties on product life cycle follow up and costing approval progress. 6. Understand toolmaker capability and capacity for direct & indirect tooling supplier and manage supplier relationships. 7. Negotiates all commercial aspects of tool & Proto purchasing. 8. Perform WAVE in Process to achieve the P SAVING. 9. Seek and attain cost avoidances / cost reduction opportunities for tool purchases. 10. Perform ad hoc duties as assigned by manager. 11. Should have min 2 years of experience in Proto parts sourcing through process like SLA, SLS, MJF , DLP and Vacuum casting of plastic parts. Preferred candidate profile Experience in Tools & Proto Purchasing Perks and benefits Insurance and other benefits
Posted 2 months ago
2 - 7 years
3 - 8 Lacs
Chennai, Mumbai
Work from Office
(1) JD for DLP Engineer - L2: Experience: 5-10 years Qualification: Graduation (Computer Science), Endpoint Certification Location: Mumbai, Chennai Job Responsibilities: Log source integration and troubleshooting. Management/ maintenance of DLP and data classification solutions deployed by bidder. Implementation of any new policies with respect to DLP and data classification with help of bidder offsite team/OEM. Handling all incidents reported by solutions until closed. Co-ordinate with all Teams for follow-up for open tickets & activities. Daily administrative tasks, reporting (including daily system health report), and communication with the relevant departments in the organization. Coordinate with OEM team in Incident Validation, Incident Analysis, Solution Recommendation, Resolve Escalations, Escalation point for device issue resolution, Resolve user queries. Monitor quality and risk related activities on solutions under bidder. The implementation of solutions on additional agents after UAT signoff of the solution. Integration of additional third-party (Network/Security/cloud or on [1]prem solutions) solutions with Deployed solutions. Job Requirements: Minimum 5 years of total IT experience. 3 years of experience in implementation of DLP and data classification solutions. Qualification in full time B.E./ B.Tech/ MCA/ MSc (IT/CS)/ B.Sc. (IT/CS). Experience on DLP Forcepoint Certified from any reputed Endpoint Protection Platform. Preference will be given to candidates having certification on the proposed solution Willing to work for long-term. (2) JD for DLP Engineer - L1: Experience: 2-4 years Qualification: Graduation, Endpoint Certification Location: Mumbai Key Responsibilities: Implement and manage DLP policies to prevent data breaches. Deploy and optimize EDR & XDR solutions for threat detection & response. Monitor security incidents, conduct forensic analysis, and mitigate risks. Enforce endpoint security best practices and ensure compliance. Collaborate with IT/security teams to strengthen defenses. Requirements: 1-3 years of experience in DLP, EDR, XDR solutions. Strong knowledge of network security, threat detection, and incident response . Certified from any reputed Endpoint Protection Platform.
Posted 2 months ago
6 - 10 years
8 - 15 Lacs
Pune, Mumbai (All Areas)
Work from Office
Hi, We are hiring for Leading ITES Company for Aggregate Report Writer Profile. Please Apply, We shall call back relevant profiles. Role & responsibilities: Minimum 2 - 3 years of medical writing work experience including 1 to 2 years of experience in periodic aggregate safety report writing (i.e. PBRER, PSUR, DSUR etc.) To perform all pre-DLP activities and planning for all assigned reports as per client instructions and timelines including the conducting of strategy meeting, kick-off meetings and other ad hoc report related meetings. Performs activities related to the preparation, writing and review of safety portions of Periodic Aggregate Safety Reports (PBRER, DSUR etc.). To perform compilation of all global and country specific periodic aggregate safety reports assigned by the supervisor. To perform peer review of the assigned periodic safety report and complete the corresponding QC checklists within the assigned timeline. To track and drive the progress of safety periodic reports as per the client defined timelines. To ensure compliance to SOPs (client e-manuals and training modules) and other process related documentation. To Apply WhatsApp 'Hi' @ 9151555419 and Follow the Steps Below: a) For Position in Mumbai Search : PV Aggregate Mumbai (Job Code # 54) b) For Position in Pune Search : PV Aggregate Pune (Job Code # 55)
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2