Jobs
Interviews

357 Dlp Jobs - Page 6

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

10.0 - 20.0 years

30 - 45 Lacs

Bengaluru

Work from Office

Implement, monitor, and enhance IT security infrastructure; manage SIEM, endpoint protection, vulnerability scanning, and incident response within IT environments. Required Candidate profile Experienced IT security professionals with strong knowledge of enterprise cybersecurity tools, SIEM, firewalls, and security standards like NIST, ISO 27001.

Posted 4 weeks ago

Apply

3.0 - 8.0 years

9 - 18 Lacs

Hyderabad

Hybrid

Hands-on experience with the Zscaler data protection module. Minimum 3+ years of experience Experience working in multi-cloud environments (AWS, Google Cloud). Familiarity with SIEM, SOC, and incident response processes. Excellent understanding of data loss prevention, data security and privacy principles and regulations (GDPR, CCPA, etc.). Strong analytical and problem-solving skills. Excellent written and verbal communication skills, proficient in English. Location : Hyderabad. Shift Timings: 2 PM - 11 PM Notice Period : Immediate Joiners to 30 Days. Hybrid Mode of Work Graduation : Any

Posted 4 weeks ago

Apply

3.0 - 4.0 years

5 - 10 Lacs

Bengaluru

Work from Office

REPORTING STRUCTURE: Senior Manager - IT QUALIFICATION: Bachelors Degree. REQUIREMENTS: Should have minimum 3+ years experience in IT operations. Should have expertise in making service level dashboard & MIS. Excellent interpersonal, verbal, and written communication skills with the ability to communicate compliance related concepts to a broad range of technical and non-technical staff. Advanced understanding of technology hardware, including desktop computers, laptops, tablets, mobile, printers, projectors, and scanners. Demonstrated ability to understand and interpret audit, as well as security requirements. Antivirus patch management for end user devices. Windows patch management for end user devices. DLP patch management for end user devices. Implement and adhere the baseline security for existing and new laptops. Should have worked on IT Helpdesk & IT Inventory tool. Successful experience working, collaborating, and establishing credibility and relationships with senior leadership, colleagues, and clients. Demonstrated success working with internal audit, external auditors, outside consultants, and legal affairs. Knowledge of one or more operating systems, such as Microsoft Windows and Mac OS. Familiar with IT support tools, such as Active Directory and service desk software. KEY ROLES/RESPONSIBILITIES: Make broad recommendations on improving compliance related processes and/or procedures as it pertains to the IT department. Work along with Infrastructure team to achieve compliance with ISO 27001, RBI, NHB, and other security standards and regulatory frameworks. Responsible for developing, implementing, and maintaining as information security compliance program. Develop IT policies and procedures and provide improvement recommendations to current policies and procedures. Collaborate with system administrators to ensure that appropriate controls are implemented, operating properly, in accordance with the corporate policies. Conduct audit readiness assessments and coordinate with internal and external functions and audit resources. Develop, collect, and analyse security metrics to determine compliance and risk levels, as well as trends in systems and processes, and make recommendations on improvements and decisions based on information from the metrics. Work closely with Information Security Team and other business teams as required to understand IS related challenges and develop plans aimed at meeting those challenges. Act as a single point of contact for Top Management incident resolution, coordinating with other resolver groups to ensure the reported incident are resolved/escalated as required. IT Infrastructure service delivery to in-house customers. IT Service desk supervision and management. Monthly review of IT support helpdesk partner services SLA and team performance.

Posted 4 weeks ago

Apply

10.0 - 19.0 years

22 - 37 Lacs

Gurugram

Work from Office

Role Name: Sr. Project Manager Job Description : Airtel Business is looking for Sr. Project Manager (Project Director), for managing the Cybersecurity & Managed Security Services to keep our fast-growing MSS portfolio on track. Location : Gurgaon Job Summary: This is an opportunity for a highly motivated individual to join a high energy team of Information security professionals responsible for managing Own 812 concurrent security projects, covering SIEM, SOAR, XDR, firewall management, and cloud security. This position is to be part of a global team, reporting to the Program Head. Be the face of delivery for CXOstranslate tech into business impact, run QBRs, and make renewals feel obvious. Keep us audit-ready (ISO 27001, PCI-DSS, RBI, IRDAI, GDPR, etc.) and drive root-cause fixes. Champion automation and shift-left security, bagging at least two efficiency wins every quarter. Responsibilities: An information security director is responsible for leading and overseeing the information security function. They are entrusted with protecting the confidentiality, integrity, and availability of the Customer information assets. The information security director develops and implements comprehensive strategies, policies, and procedures to identify and mitigate risks, ensure compliance with industry regulations, and respond effectively to security incidents. They work closely with stakeholders across the organization to promote a culture of security and to align information security practices with Client business objectives. Security operations director is responsible for managing the day-to-day activities of the security operations center (SOC) or incident response team. He/She oversee the monitoring of security events, investigations of security incidents, and coordination of incident response efforts. He/She work closely with other Bank teams to ensure timely detection, response, and resolution of security issues. In addition to strategic planning and risk management, the information security director plays a vital role in establishing governance frameworks and ensuring regulatory compliance. Some Common duties and responsibilities include: Strategic Planning: Develop and implement the organization's information security strategy, aligning it with business objectives and risk tolerance. Identify and prioritize security initiatives, establish security goals, and create a roadmap for their implementation. Risk Management: Conduct regular risk assessments to identify and evaluate potential security threats and vulnerabilities. Develop and implement risk mitigation strategies, including security controls, policies, and procedures. Monitor and manage security risks through ongoing assessments and the implementation of appropriate safeguards. Stakeholder Management – Sync with Sales, Pre-Sales, Finance, HR, and tech partners so everyone’s rowing in the same direction. Policy and Procedure Development: Establish and enforce information security policies, standards, guidelines, and procedures. Ensure that they align with industry best practices and regulatory requirements. Communicate and educate employees on security policies, promoting a culture of security awareness and compliance. Compliance and Regulatory Requirements: Stay abreast of relevant laws, regulations, and industry standards pertaining to information security. Ensure that the organization's security practices and controls are in compliance with applicable requirements. Liaise with regulatory bodies, auditors, and stakeholders to address compliance issues and maintain regulatory alignment. Incident Response and Management: Develop and maintain an incident response plan to address and manage security incidents effectively. Establish protocols for detecting, responding to, and recovering from security breaches or other security-related incidents. Coordinate with relevant teams to investigate incidents, implement remediation measures, and report on the outcomes. Security Awareness and Training: Develop and deliver security awareness and training programs for employees at all levels of the organization. Ensure that employees understand their role in maintaining information security and are equipped with the knowledge to identify and respond to security risks. Vendor Management: Assess and manage the security risks associated with third-party vendors and suppliers. Establish security requirements and standards for vendor contracts, conduct security assessments of vendors, and monitor ongoing compliance. Security Governance: Establish and maintain security governance frameworks and structures to ensure effective oversight and accountability. Participate in security committees and provide regular updates to executive leadership and the board of directors on the organization's security posture, risks, and compliance status. Security Incident Reporting and Communication: Develop and implement processes for reporting and communicating security incidents to appropriate stakeholders, including executives, legal counsel, and regulatory bodies. Ensure that incident reports are timely, accurate, and comprehensive. Continuous Improvement: Stay abreast of emerging threats, vulnerabilities, and technologies in the information security field. Continuously evaluate and enhance the organization's security posture, controls, and processes through regular reviews, audits, and testing. Travel – Up to 10 % across India Technical Skills: 15+ years in IT services with 8+ steering large, multi-tower security or ITOM programs; PMP or Agile cert helps. Strong knowledge in network & Information security Fundamentals. Deep, hands-on exposure to SIEM, SOAR, EDR/XDR, firewall and IPS/IDS stacks. Solid experience with AWS, Azure, or GCP controls, logging, and compliance tooling. Experience in handling large team of Information Security Professionals (>25 nos.) OT/ICS security, GenAI in SOC workflows, or experience with Scaled Agile frameworks. Familiarity with incident response techniques, intrusion prevention systems, information security methodologies, authentication protocols and different IT Security threat mechanisms. Comfortable running ITIL-aligned ops, SLAs, and continual-service-improvement cycles. Good extensive Knowledge of IT Security Standards (ISMS / ISO 27001, PCI-DSS, SOX, CMMi etc.) Mandatory Security Certification (either of CISA, CISM, CISSP, CIPP/R etc.)

Posted 4 weeks ago

Apply

6.0 - 11.0 years

15 - 25 Lacs

Mumbai

Work from Office

Role & responsibilities Presales resource, prior experience in the BFSI sector preferred. Able to understand banking, insurance and NBFC customers' requirements. Prepare and present the cybersecurity solutions to the customer. Prepare and submit RFP specifications as per the customer's needs. Respond to the RFP with all aspects of the cybersecurity requirements. Excellent verbal communication and written skills. Soft skill requirements - excellent presentation skills and customer management skills. Job location - Mumbai Preferred candidate profile Technical skills requirement: SSE/ZTNA - Zscaler, Netskope, SkyHigh, Forcepoint - any two Endpoint Security - Crowdstrike, SentinelOne, Trend Micro - any two DLP - Forcepoint / Trellix - anyone for endpoint security Vulnerability Management - Tenable/Qualys WAF with DDoS & BOT Management - F5, Cloudflare, Akamai, Radware - any two Knowledge about the SOC process and the SIEM tool. At least skills in 3 domains as mentioned above are a must requirement.

Posted 4 weeks ago

Apply

3.0 - 6.0 years

12 - 15 Lacs

Mumbai, Mumbai Suburban, Mumbai (All Areas)

Work from Office

Job Title: Cloud Security Engineer Department: Information Technology Location: Lower Parel, Mumbai Who we Are? Axis Asset Management Company Ltd (Axis AMC) was founded in 2009 and is amongst India s largest and fastest growing mutual fund. We serve 1.3+ Cr customers and associates with highest humility across 100+ cities. Our success is attributable to 3 founding principles- Long Term Wealth Creation, Outside-in (Customer) View & Sustainable Relationships. Our investment philosophy embraces culture of risk management. It encourages our partners & investors to transition from transactional investing for quick gratification to investing for fulfilment of critical life goals. Thus, our endeavour is to offer a basket of investment solutions which helps customers create a financially independent & happier tomorrow. Our recent accolades: Brandon Hall Group HCM Excellence Awards for Learning & Development 2022 - Silver Award Morningstar Awards 2022: Best Fund House: Equity, Debt & Overall Outlook Money Awards 2021: GOLD in Equity AMC of the Year 2021 World Leadership Congress & Awards 2022: Business Transformation Leadership Awards Digital Transformation Project (Mobile App) Why Join Us? At Axis, our constant endeavour is to provide a career path for job seekers which is laden with learning & winning. We foster a culture where success is celebrated. What will you Do? You will serve as the security and compliance expert at Axis AMC, translating strategic and technical needs into innovative security solutions. As a cloud security evangelist, you'll ensure alignment with internal security and regulatory standards while guiding stakeholders. Key Responsibilities: Design, implement, and maintain a secure and reliable infrastructure platform for delivering Axis AMC services. Contribute to the building, operating and maintaining of the cloud security infrastructure to improve our prevent, detect and response capabilities. Own and ensure that internal and external SLAs are met, Security Engineering centric KPIs are continuously monitored and improved. Create tools for automating deployment, monitoring and operations of the overall security platform. Provide ongoing maintenance and support of internal tools, improve system health and reliability. Collaborate with internal teams and external auditors to support and facilitate successful audit processes. Develop, maintain, and enforce comprehensive cloud security policies and procedures aligned with industrys best practices and regulatory requirements. Interpret and implement security controls in accordance with the SEBI Cloud Framework, ensuring compliance and risk mitigation across cloud environments. Conduct risk assessments and provide recommendations to enhance the security posture of cloud-based systems. Stay updated with emerging cloud security technologies and trends, and evaluate their applicability to the organizations cloud strategy. What makes you a Great Fit? B.Tech/M.Tech/MCA or equivalent from a premium engineering campus with 3+ years of work experience, preferably from a Fintech or e-commerce domain Preferred Certifications AWS Certified Security Specialty, AWS Certified Solutions Architect Associate Technical proficiency in AWS and/or Azure including security solution architecture. Good working knowledge of Cloud Security and understanding of Security Operations, DevSecOps, or Security Automation Implementation of security features like IAM, DLP, Security groups, AWS Security Hub GuardDuty, Cloudwatch alerts Awareness of Cloud automation tools (CloudFormation, Auto scaling, IAM, etc.) Awareness of containers and server less computing (Docker, Kubernetes etc.) CI/CD pipeline tools such as Jenkins or GitHub Actions. Awareness of various flavors of Linux, RDS, etc. Integrating events with the SOC, playbooks etc. Good understanding of VPC networking, Multi AZ, VPN, DNS, LAN/WAN concepts Technical writing experience

Posted 4 weeks ago

Apply

3.0 - 8.0 years

6 - 16 Lacs

Bengaluru, Mumbai (All Areas)

Work from Office

Role & responsibilities Project Delivery Knowledge Solid understanding of the Project Delivery Framework (PDF) , with the ability to apply both Waterfall and Agile methodologies appropriately. Capable of supporting project setup , ensuring alignment with delivery standards and frameworks. Project Management Support Experienced in creating and maintaining key project deliverables: Project Charter Project Plan/Schedule Risk & Issue Tracker Communication Plan Stakeholder Mapping Supports end-to-end project management alongside the Project Manager. Governance and Control Ensures proper project governance practices are followed. Involved in budgeting and forecasting efforts. Drives process standardization and defines templates for consistent project documentation. Reporting & Insights Prepares fit-for-purpose dashboards and reports that are timely, accurate, and actionable. Maintains quality data to support decision-making. Oversees status reporting , ensuring effective communication with stakeholders. Manages change logs to track scope and delivery changes. Resource & Financial Management Supports resourcing and resource utilization optimization . Coordinates invoicing and billing , ensuring accuracy and timeliness. Manages project cost control , including contingency planning and monitoring. Knowledge & Tool Management Promotes knowledge sharing , organizes training , and maintains knowledge repositories . Ensures effective use of PMO tools and platforms (e.g., project workspaces, dashboards). Manages document control and ensures version integrity. Operational and People Support Manages onboarding and offboarding processes for project team members. Supports the setup and usage of the PMO environment and toolset . Preferred candidate profile Possess 2 to 4 years of overall professional experience in the IT industry, with a minimum of 1 to 2 years specifically in a PMO role. Educational background: BE/BTech; MBA preferred for added strategic and managerial competence. Mandatary Skills Excellent communication and stakeholder management skills Demonstrates the ability to engage, influence, and align diverse stakeholders across business and technical functions. Strong command over SDLC and project governance processes Well-versed in Software Development Life Cycle (SDLC) , gate reviews , and risk management activities , ensuring structured project delivery and proactive issue mitigation. Foundational understanding of cybersecurity tools and frameworks Familiar with Identity and Access Management (IAM) and Data Loss Prevention (DLP) solutions Awareness of key Cyber Governance and Compliance frameworks , including industry standards like ISO 27001, NIST, and GDPR Understands the role of security in enterprise project management and regulatory alignment.

Posted 4 weeks ago

Apply

6.0 - 11.0 years

10 - 20 Lacs

Bengaluru

Work from Office

Role & responsibilities Investigate high complexity cyber security incidents (2nd Level) with minimal direction, determine the root cause and establish defense measures as part of the global Cyber Defense Center team. Analyze operational logs and event console activities to identify security related events; Develop targeted defense response measures for implementation Create Management communication for Major Incidents and drive and facilitate Communication bridges/briefs to upper management as necessary Improve and maintain cyber defense related processes and procedures . Provide strong technical expertise in using and customizing of cyber defense tools like SIEM, AEP, DLP or UEBA solutions for CIRT actions Participate in the "on-call" duty of the global incident response team, and provide the fallback insurance for IT and SOC Participate in international IT security projects Represent Bayer in external technical user groups. Prepare and design system security reports by framing data, insights, and trends to support the proposal of proactive cyber defense capabilities.

Posted 4 weeks ago

Apply

7.0 - 11.0 years

15 - 17 Lacs

Pune

Hybrid

Job Roles and Responsibilities : Setting up Encryption using Technologies such as Voltage, Secupi, Microsoft Purview Understanding Key Management framework and best practices around Bring Your Own Key and Hold Your Own Key. Setting up DLP Policies in Microsoft Defender for Cloud Apps (CASB) , Microsoft Defender for Endpoint and Microsoft Purview Assisting the Implementation of Data Loss Prevention and guide on unit testing, and support documentation; Knowledge/Skills Demonstrable knowledge of information security best practices Background in networking, data security and cloud-based applications. Experience with distributed computing platforms for high-scale systems.

Posted 1 month ago

Apply

4.0 - 9.0 years

6 - 11 Lacs

Mumbai, Pune, Bengaluru

Work from Office

4+ years experience in designing, implementing, and managing SCCM and Intune solutions. Strong understanding of endpoint management concepts, including device provisioning, software distribution, patch management, and security. Experience with Microsoft Endpoint Manager (SCCM and Intune) integration, configuration, and administration. Familiarity with modern management concepts, such as cloud-based management, autopilot, and zero-touch deployment. Experience working with PC/Mac infrastructure as an engineer level SCCM & Intune Certification. Experience with system provisioning and imaging using tools such as DEP and SCCM. Experience with managing 802.1x on MacOS/Windows (for wifi and wired network connections). Experience with end point management client software deployment (SCCM + Intune), inventory, antivirus and end point security solution. Experience with Azure/AWS, Network troubleshooting, Background in server administration, networking, troubleshooting, scripting, automation Experience with desktop operating systems including Windows 10/11 and OS X Scripting via PowerShell, BASH, and others. Primary skills 4+ years experience in designing, implementing, and managing SCCM and Intune solutions. Hands on experience in Operating System Deployment, Autopilot, Intune, and Co-management. Experience in application Deployment, Patching, and Imaging. Secondary skills Knowledge on DB replication Knowledge on custom Report creation SQL

Posted 1 month ago

Apply

4.0 - 7.0 years

10 - 15 Lacs

Pune

Work from Office

Role & responsibilities Must Have: 3 + years hands-on experience with cybersecurity Data Loss Prevention (DLP), Endpoint Detection and Response (EDR), antivirus (AV), Identity and Access Management (IDAM), Security Information and Event Monitoring (SIEM) Security Orchestration and Automation (SOAR) platforms Key Ask for the discussed role: Candidate should be able to support for security related incidents Troubleshooting experience is essential. Should be able to identify and applies mitigation controls (where possible) to remediate alerts Good to have Skills: Cybersecurity certifications including CompTIA Network+, Security+, Cloud+, Ethical Hacker, EnCE, GCFE, GCFA, GNFA, GDAT, GCIH, GREM, CISA, CISM, CISSP, and/or similar cybersecurity certifications

Posted 1 month ago

Apply

4.0 - 7.0 years

8 - 11 Lacs

Pune

Work from Office

For IR L2-Position: 5Yrs+ hands on Exp. Ready to work for Rotational shifts.(24*7), T Location: Pune Roles and Responsibilities For Soc/IR L2-Role: 5Yrs+ hands on Exp. Ready to work for Rotational shifts.(24*7) Roles and Responsibilities Key Skills: 1.SIEM tool exp-preferably Arc sight, 2. Log Analysis 3.Incident Response 4.DLP experience 5.Investigation Knowledge 6.Rules creation 7.Alert management. 8.Network monitoring Tool (Cisco Nbad) 9.Use case Creation Key Responsibilities To handle the daily monitoring of information security events. To function as an intrusion analyst by examining security events for context, appropriateness and criticality To act as an information security researcher to provide insight and understanding of new and existing information security threats Key Operational Activities Daily checklists and tasks Log analysis and review Vulnerability management activities Alert analysis Investigation of suspicious security event activity Maintain and enforce adherence to corporate standards, policies and procedure Please share your profile to anwar.shaik@locuz.com

Posted 1 month ago

Apply

9.0 - 14.0 years

19 - 25 Lacs

Pune

Work from Office

Must Have Skills Windows Servers | Domain Controllers | Active Directory | Azure Active Directory | Group Policy Enterprise Proxy Solution - Preferably Zscaler or Netskope. Inline CASB, Web DLP. Zero Trust Platform (Zero Trust Application Access / Zero Trust Remote VPN) Privilege Access Management (PIM/PAM) Basics of hardware, networking, IP addressing, VLAN, LAN, WAN, MPLS Endpoint Security Management. Preferably EDR/XDR CS Falcon, Sentinel One, MS Defender for Endpoint, DLP, ATP, Web Security. Good in Soft skills, logical and analytical thinking, troubleshooting and problem management, ticketing systems, SLA Management, Good to have Azure information protection Microsoft Enterprise Mobility and Security Office 365 Security administration Cloud Computing Basics with Azure / AWS Security administration Web Application Firewall management. Qualifications Basic Graduation and Proficiency in technology areas mentioned. Professional Certifications would be an added advantage. Qualifications Basic Graduation and Proficiency in technology areas mentioned. Professional Certifications would be an added advantage. Additional Information 100% Work from Office (24 X7) Rotational shifts Current office location is Vikhroli however team will move to Thane (GB) in few months Job Location

Posted 1 month ago

Apply

10.0 - 15.0 years

22 - 37 Lacs

Bengaluru

Work from Office

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you a tech-savvy problem-solver with a passion for ensuring optimal network performance? If so, look no further – Kyndryl is seeking a Security Support Specialist who will be the go-to expert for installing, maintaining, and troubleshooting computer networks. As our Security Support Specialist, you'll be working in a complex, multi-vendor environment, and will use your analytical skills to identify and resolve network issues, make configuration changes, and implement security policies. This role requires someone who can think on their feet, test and apply corrective actions (including emergency changes), and participate in change reviews as needed. And with the ever-changing nature of technology, you'll be constantly learning and growing in your role. You will work alongside a talented team of experts to plan and execute routine network changes, troubleshoot and solve network issues and outages, and maintain excellent communication with our end customers, project managers, and service engineers. You’ll be responsible for maintaining network components, monitoring network performance, and maintaining network security. You will also be providing user support for network-related issues, ensuring that our customers receive the highest level of support possible. If you're ready to take on a fast-paced and rewarding role in the world of network support, apply to join the Kyndryl team today! Key Responsibilities: Integrate firewall solutions with SIEM, IDS/IPS, endpoint protection, and cloud security tools Monitor network performance and security systems, responding to security incidents and conducting root cause analysis Investigate and respond to security breaches, malware infections, and intrusion attempts and Major incident handling Configure and manage EDR and XDR solutions, enterprise antivirus solutions (such as TrendMicro, CrowdStrike, or similar), Web Application Firewalls (WAF) in on-premises and cloud environments & NAC for wired, wireless, and VPN network access control. Monitor and analyze security alerts, logs, and reports for malware infections and security incidents install and uninstall endpoint security solutions Implement network virtualization, micro-segmentation, distributed firewalling (DFW). Design and implement .1X authentication, MAB (MAC Authentication Bypass), posture assessment, and profiling policies Understanding of PKI, certificate-based authentication, endpoint profiling, and device posture assessment Configure, and manage Arcon PAM solutions to secure privileged accounts and sensitive data across the organization, troubleshoot PAM issues. Implement and optimize web filtering policies, SSL decryption, and content inspection Configure DLP rules, keyword detection, fingerprinting, and machine learning-based policies Monitor and analyze DLP alerts, incidents, and logs for potential data breaches or policy violations. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career, from Junior Administrator to Architect. We have training and upskilling programs that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. One of the benefits of Kyndryl is that we work with customers in a variety of industries, from banking to retail. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Expertise Strong knowledge of network security, endpoint security Experience in cybersecurity, SOC, or security engineering roles. 12+ years of Total IT experience. Hands-on experience with SDWAN, PaloAlto , FortiGate and Checkpoint. Implement and maintain VPNs, IPSec tunnels, and SSL VPNs using Palo Alto and FortiGate technologies Proficiency in routing protocols BGP, OSPFConfigure proxy and network access control (NAC) solutions Hands-on experience with FortiManager, and FortiAnalyzerCreate and Perform firmware upgrades, patches, and routine maintenance on firewalls. Hands-on experience with WAF, IBM DAM, IBM GDE, Forcepoint Proxy, DLP, Email Gateway. Preferred Technical and Professional Experience Experience with DAM solutions such as IBM Guardium. BSc. B.E./B. Tech, M.E. /M. Tech Ability to monitor and audit database activities for unauthorized access and suspicious activities & Experience with Thales Cipher Trust. Understanding of key management solutions (KMS) and Hardware Security Modules (HSMs). Troubleshoot and optimize NSX networking components, including VXLAN, Overlay, Edge Services Gateway (ESG), and Distributed Logical Routers (DLR) Configure NSX Security Policies, NAT, VPN, Load Balancing, and Firewall rules Expertise in NSX-T components such as Transport Zones, Edge Nodes, and T0/T1 Gateways. Certifications (Preferred, but not Mandatory): Network Virtualization (VCTA-NV) , Forcepoint DLP, Web Security Administrator Certification , CEH , CompTIA Security+ Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 1 month ago

Apply

3.0 - 6.0 years

5 - 15 Lacs

Chennai

Work from Office

Role & responsibilities The role holder will be responsible for leading customer discussion on analyzing Cyber Security requirements Proactively and accurately identify prospect pain and propose right solutions. Engage with customers as a trusted advisor, listening and understanding their challenges and requirement - both technical and business, and clearly articulate and communicate to the sales and governance team and document them. Research and develop appropriate working solution and value proposition, engaging with the respective solution principal, distributors, OEM and service team to address customer requirement Scope and clearly translate defined requirements, proposed solutions and value proposition into proposals/Statement of Work (SOW), building project plans, conducting reviews with the technical team on the project progress. Proposal writing, expertise in MS word, MS Excel, presentation, understanding of various security technologies, coordinating with sales team, OEMs and distributors. Be the solution owner, taking lead and working with cross-functioning team Experience in conducting demo and PoC / PoV is a plus Ensure personal technical, communication and commercial skills are kept up to date to ensure successful execution of role, e.g. maintaining CPE, attending training and webinars Partner with sales team to generate leads. Negotiate and contract closing by providing support to the Sales Team. Preferred candidate profile Technical implementations on security technologies or presales experience is highly desirable. (Technical knowledge of security technologies (across multiple domains such as Firewall, Network IPS, SIEM, DLP, Cloud Security etc), information security concepts and familiar with security products (Checkpoint, Palo Alto, Cisco, Splunk, McAfee, Symantec etc) is a plus. • Professional security related qualifications will have an advantage

Posted 1 month ago

Apply

3.0 - 8.0 years

10 - 12 Lacs

Mumbai

Work from Office

Management of proxy devices deployed in the Bank. Providing internet access to user/application on need basis as per approval of the Bank. Handling internet related issues for user desktops and applications server. Required Candidate profile 1. Person should have adequate knowledge of network devices. 2. Sound analytical and troubleshooting skills. 3. Good Team Management and co- ordination skills

Posted 1 month ago

Apply

5.0 - 8.0 years

15 - 20 Lacs

Bengaluru

Hybrid

Key Skills: Vulnerability, DLP, Crowdstrike, Malware, Cyber Security, Threats, Cyber Threat, SIEM, Siemens Ops center Roles and Responsibilities: Operational Maturity: Create clear documentation for processes, metrics, and outcomes, ensuring adherence to Service Level Agreements (SLAs) and compliance requirements. Promote continuous improvement in threat hunting and DLP management. DLP Leadership: Offer technical leadership in developing and enhancing the DLP program at Fortive. Establish metrics to measure the program's success. Security Tool Operations: Manage and oversee relevant security tools, ensuring comprehensive coverage and effectiveness across the enterprise while continuously enhancing detection and prevention mechanisms. Cloud and DevOps Security: Drive security capabilities by embedding security into DevOps workflows, leveraging cloud-native tools, and advancing automation for detection and response. Continuous Improvement: Stay current and share best practices in both threat hunting and data loss prevention. Leverage artificial intelligence to reduce manual work. DLP Programme: Collaborate with other security teams, legal, IT, and key stakeholders to document and drive a DLP program to protect Fortive data. Change Management: Adhere to change management processes in managing security platforms. Ensure proper lifecycle management of threat hunting artifacts. Collaboration: Work with cross-functional teams in both proactive and reactive security scenarios. Collect and analyze feedback to continuously refine tools, platforms, and support processes. Skills Required: 5+ years of experience in cybersecurity, with a focus on DLP and threat detection. Hands-on experience with CrowdStrike Platform; NG SIEM an advantage. Strong knowledge of IT security principles and compliance standards. Familiarity with at least one DLP solution. Demonstrated ability to balance strategic vision with hands-on implementation. Exceptional communication and problem-solving skills. A driven and self-starting individual who can work independently and take initiative. Experience working across multiple countries and time zones is an advantage. Education: Bachelor's degree in Cyber Security, Information Technology or related field.

Posted 1 month ago

Apply

0.0 - 1.0 years

0 - 2 Lacs

Mumbai, Thane, Mumbai (All Areas)

Work from Office

Good Communication Skills EXP:- 6 Months to 1 Years Budget:- 19K CTC Should Have Experience on SLA, DLP, SCCM, Ticketing tool, APIPA, DHCP, DNS

Posted 1 month ago

Apply

7.0 - 12.0 years

10 - 20 Lacs

Mumbai

Work from Office

Managing GRC, IT/IS audits, Data Privacy SEBI/RBI Cyber security framework, Data privacy, GDPR Data privacy, DPDPA, ISO NCIIPC guidelines, NIST framework Information Technology Infrastructure, Information Security Compliance/regulatory requirements Required Candidate profile Experience in Information Technology Infrastructure, Information Security. Experience in managing GRC, IT/IS audits, Data Privacy Exposure on SEBI/RBI Cyber security framework, Data privacy, GDPR

Posted 1 month ago

Apply

0.0 - 3.0 years

1 - 3 Lacs

Hyderabad, Chennai, Bengaluru

Work from Office

Endpoint Security Specialist Job Title : Endpoint Security Specialist Location : Chennai, Hyderabad, Bangalore Experience : 0-3 Role Summary: Protects endpoint devices (laptops, servers, mobile) from cyber threats. Key Responsibilities: Design and implement endpoint protection strategies. Monitor and manage antivirus, EDR, and DLP tools. Respond to endpoint-related incidents. Maintain awareness of emerging threats Skills Required: Knowledge of Windows/Linux OS security. Experience with endpoint protection platforms (CrowdStrike, Sentinel One). Familiarity with encryption and certificate management. Qualifications: Bachelors in IT or Cybersecurity. Certifications: CISSP, CEH, or GIAC.

Posted 1 month ago

Apply

3.0 - 6.0 years

10 - 20 Lacs

Bengaluru

Work from Office

At Holiday Inn Club Vacations, we believe in strengthening families. And we look for people who exhibit the courage, caring and creativity to help us become the most loved brand in family travel. Were committed to growing our people, memberships, resorts and guest love. Thats why we need individuals who are passionate in life and bring those qualities to work every day. Do you instill confidence, trust and respect in those around you? Do you encourage success and build relationships? If so, we’re looking for you. POSITION DESCRIPTION: Holiday Inn Club Vacations seeking a Cybersecurity Engineer plays a critical role in designing, implementing, and maintaining security solutions to protect the organization’s digital assets, infrastructure, and guest data. As part of the Emerging Technology and Cybersecurity team, this role focuses on assessing new technologies for secure adoption, engineering forward-looking cybersecurity capabilities, and ensuring that security is embedded into innovation initiatives across the business. This role supports a secure, resilient technology ecosystem for a fast-paced, timeshare organization. This position is ideal for individuals passionate about cybersecurity, and ready to contribute to protecting the digital infrastructure of a timeshare organization that serves thousands of vacation owners and guests. KEY RESPONSIBILITIES Design, implement, and manage security solutions (e.g., firewalls, endpoint protection, identity management, cloud security tools). Evaluate emerging technologies and support secure integration into enterprise environments (e.g., AI, IoT, automation platforms). Provide expertise for risk assessments, security architecture reviews, and threat modeling for new systems, services and applications. Collaborate with IT, development, and business teams to ensure security-by-design principles are followed. Automate security operations through scripting and integration of tools (e.g., SOAR, CI/CD pipelines). Assist in the development of security standards, policies, and best practices. Support vulnerability and patch management processes, including scanning, prioritization, and remediation coordination. Investigate and respond to complex security incidents, working closely with SOC and incident response teams. Stay current with the cybersecurity landscape and recommend relevant tools or strategies to strengthen security posture. Contribute to strategic cybersecurity initiatives and compliance efforts, including PCI-DSS, GDPR, and NIST CSF, where applicable. Participate in red/blue team exercises, tabletop simulations, and continuous SOC capability improvement. Other duties as required QUALIFICATIONS: Education & Experience: Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, or a related field; or equivalent professional experience. 3–6 years of experience in cybersecurity engineering, systems security, or related discipline. Strong knowledge of security technologies including firewalls, SIEM, EDR, MFA, DLP, CASB, and cloud security controls. Experience with securing cloud platforms (AWS, Azure, GCP) and hybrid environments. Familiarity with DevSecOps principles, container security (e.g., Docker, Kubernetes), and automation tools (e.g., Terraform, Ansible). Hands-on experience with scripting (Python, PowerShell, or Bash) for automation and tool integration. Certifications (preferred but not required): Microsoft SC-100/200, Certified Information Security Manager (CISM) GIAC (GSEC, GCIA, GCSA) CISSP or equivalent KEY COMPENTENCIES Strong problem-solving and analytical skills. Proactive and innovative mindset with the ability to assess and integrate new technologies securely. Excellent communication skills for working with both technical and non-technical stakeholders. Ability to prioritize and manage multiple projects in a dynamic, fast-paced environment. High attention to detail and documentation standards. Strong understanding of regulatory requirements and industry standards (e.g., NIST, ISO 27001, CIS).

Posted 1 month ago

Apply

4.0 - 7.0 years

5 - 9 Lacs

Noida, Mumbai, Bengaluru

Work from Office

Location: Bangalore, Mumbai, Gurgaon, Noida, Key Responsibilities: Design, configure, and fine-tune Data Loss Prevention (DLP) policies and rules. Manage DLP incidents from detection through investigation and resolution. Conduct continuous monitoring and analysis of DLP alerts and system performance. Collaborate with clients to understand their data protection needs and implement effective DLP solutions. Provide expertise in DLP technologies and best practices. Develop and maintain documentation related to DLP configurations and procedures. Required Skills & Qualifications: Bachelor's or Master's degree in Computer Science, Information Systems, or a relevant field. Overall Experience: 6-8 years in Information Security, with 4-7 years specifically in Data Security, Privacy, and Information Security roles. DLP Experience: Hands-on experience (2-3 years) in managing privacy and data protection programs or providing consulting services in these areas. Technical Proficiency: Proven hands-on experience with leading DLP tools and technologies such as Symantec DLP, Forcepoint DLP, Microsoft Information Protection, and Microsoft Purview. Policy Management: Expertise in DLP policy configuration, incident monitoring, investigation, and resolution. Regulatory Knowledge: Strong understanding of relevant legal and regulatory requirements, including IT Act 2000, GDPR, BS10012, India's Data Protection Act, DADP Act, and other country-specific data protection acts (especially across Middle East Countries). Communication: Excellent written and verbal communication skills, strong interpersonal and collaborative abilities, and the capacity to articulate privacy, security, and risk concepts to both technical and non-technical audiences. Analytical & Project Management Skills: Exhibit excellent analytical skills, the ability to manage multiple projects under strict timelines, and thrive in a demanding, dynamic environment. Demonstrated project management skills, including scheduling and resource management. Discretion: Ability to handle sensitive information with utmost discretion and professionalism. Certifications: Required: Certified Information Systems Security Professional (CISSP), Certified Information Privacy Professional (CIPP). Good to have: Certified Data Privacy Solutions Engineer (CDPSE), Certified Information Security Manager (CISM), Certified Ethical Hacker (CEH).

Posted 1 month ago

Apply

5.0 - 9.0 years

2 - 7 Lacs

Pune, Bengaluru, Delhi / NCR

Hybrid

Role & responsibilities Overall responsible for successful preparation, implementation, rolling out of AIP data classification and protection, O365 DLP, MCAS for SAAS and Azure Key Vault exercise for all customer regions Create and maintain AIP data classification matrix for all customer units. Prepare and conduct AIP data classification workshop for users including senior management. Implement and roll out data classification tool for manual and auto classification on structured data. Prepare end users and support the roll out of manual and auto classification for structured data. Fine tune data classification tool and integrate with DLP solution. Prepare and roll out the digital rights management solution. Work on improving the maturity levels of the manual and auto classification and Rights Protection Implementing O365 DLP for OneDrive, SharePoint, teams and Emails. Creating SOP for incident management and SOC integration. Knowledge of Azure Key Vault for Key management and key management lifecycle. Generating and maintaining Key for application, servers, websites and Endpoints Implementing MCAS for Audit and control over sectioned and unsanctioned apps Integrating MCAS and with other security tools for incident correlations Implemented File, user and location based MCAS policies to a gain visibility on data flowing in Cloud apps and SAAS application Implementing control for Detect, Protect and Audit of sensitive data moving to SAAS and Cloud Hosted applications Location - PAN India DC

Posted 1 month ago

Apply

3.0 - 7.0 years

3 - 8 Lacs

Noida

Work from Office

Deep knowledge of the email stack Have 3+ years of email systems experience: SMTP, POP, DNS, SPF, DKIM, DMARC, RBL, CAN-SPAM Knowledge of email deliverability, IP reputation, blocklists Experience with deployment and in structure management tools Exp with cloud-first monitoring, logging, and alerting infrastructure that support 24/7 enterprise platforms. Like working on small, autonomous agile teams Knowledge of advanced email features Experience 3 - 7 Years Industry IT Software - Others Qualification Other Bachelor Degree Key Skills SMTP DNS POP IP Email Engineer Verp Email Support Executive Email Support

Posted 1 month ago

Apply

10.0 - 18.0 years

11 - 21 Lacs

Bengaluru

Work from Office

The Microsoft Office 365 Messaging Solution Architect will utilize the expert-level experience and knowledge of Office 365 architecture, administration, and best practice recommendations combined with a strong current and deep experience with Microsoft Exchange Server, Microsoft Office Communications Server, Microsoft Office SharePoint Server, Active Directory, and Forefront Identity Manager, to assist True Tandems customers with the design, development, and deployment of messaging and communication solutions. Key Functional Areas of Expertise Architects and consulting roles in the projects, Design and implementation, hands-on experience Technical specialization / External certifications Build the vital competency centers Excellent quality of delivery Build a portfolio of successful projects, references, and credentials Market research Technical Expertise 10 to 15 or more years of experience in Architecture and Designing solutions, Migrating on-prem Exchange to O365/Exchange Online. Eepertise on Migration tools like Bittitan, Quest etc. Experience working in a Transitional multi-supplier environment within a large-scale organization. Experience in leading significant technical solution design and development, leveraging existing tool suites, and proposing best-of-breed solutions. Must have strong hands-on experience working on Exchange Online Experience implementing M365 DLP, Cloud App Security, Defender, and Conditional Access To maintain Exchange Hybrid Co-Existence in a multi-Active Directory Forest/Exchange Org Topology To maintain Data Sovereignty compliance (GDPR) when Multi-Geo must have to be used Migrations from Lotus Notes & GroupWise, along with InterOrg (Exchange to Exchange) and GSuite/O365 Tenant to Tenant Migrations Migrations from SharePoint on-premises, Gsuite, and other CMS tools to SharePoint Online and OneDrive for Business Must have Architectural understanding of how Third Party Archive & Journaling Email Data (Enterprise Vault, Mimecast) on legal hold is migrated appropriately (to maintain Data Immutability) Must have Architectural Proficiency in integrating Microsoft and non-Microsoft Mobile Devices/Mobile Application Management & Unified Endpoint Management solutions with Exchange/Office 365 (Intune, Airwatch, Workspace One, etc.) as well as other third-party email-aware apps (Unified Communications/Messaging, Fax, Printer/Scanners) Must have Architectural Proficiency (Design, Build, Migrate) with Office 365 Email Protection Mechanisms: Microsoft and non-Microsoft Email Hygiene/Gateway Products (Proof-Point, Exchange Online Protection, Mimecast, etc.) SPF, DKIM, and DMARC (along with ARC) Office 365 Advanced Threat Protection, Must have an architectural understanding of Microsoft 365 protections CAS, DLP, ATP, AIP Data Loss Prevention, RMS/IRM, Azure Information Protection (Classification-Labelling & Sensitive Information Types), Office 365 Message Encryption & Transport Rules Legal/Litigation Holds, Retention, Deletion, and Data Immutability Understanding of Message Retention and Data Compliance Requirements A complete knowledge of Microsoft 365 and the Collaboration technology stack Proficiency in all technical aspects of M365 implementation and Azure Active Directory (AAD) services are required. Strong communication skills –express key ideas and obtain tangible feedback from cross-functional team members and stakeholders. Hand- on experience with implementation, deployment, migration, and support of core M365 services, including (but not limited to): Exchange Online – including mailbox migration, EOP, and Exchange Administration

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies