Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
2 - 7 years
4 - 9 Lacs
Maharashtra
Work from Office
Description About The Role As a cloud solution design engineer you will be expected to develop options and recommendations for information technology designs and solutions to meet business requirements This will help to identify and resolve business problems within Barclays cloud environments Primary Responsibilities Review interpret and respond to detailed user stories business requirements specifications to ensure alignment between customer expectations and current or future Digital capabilities and the strategic plan Provide input to the strategic direction of technology investments to assist in the development of the enterprise architecture and maximise the return on technology investment Define and design technology solutions to assist the business in meeting their business objectives including technology solutions and changes to service process andor operating models Develop and implement technology solutions to ensure solutions are implemented as expected and to agreed timeframes Design and delivery projects from inception through functional analysis of user stories requirements the approval process for business case development project execution and operational handover to align technological solutions and transform the processes and systems to meet emerging business requirements Technical Skills Competencies Solution Design experience involving cloudon prem and multiple systems in particular system recovery patterns Prepares for the delivering of the application or system by evaluating and selecting the methodologies and tools Analyses available assets frameworks reference architectures etc to bridge the gap between the asis architecture and the tobe architecture Any knowledge or experience in Tanium Microsoft Defender for Endpoint MDE and Zscaler would be added benefit Knowledge of AzureM365 Identity and Access Management IAM Logging and Monitoring and system integration Security focused design that adhere to industry and highly regulated financial environments security standards Ability to effectively collaborate with business customers engineering teams security consultants and other project stakeholders Desirable Previous experience in the financial sector Bachelors degree or higher in a related discipline Desirable CISSP Certified Information Systems Security Professional ISO27001 Barclays banking knowledge Desirable experience in VolexityCloud Forensics Named Job Posting? (if Yes - needs to be approved by SCSC) Additional Details Global Grade C Level To Be Defined Named Job Posting? (if Yes - needs to be approved by SCSC) No Remote work possibility No Global Role Family To be defined Local Role Name To be defined Local Skills identity and access management;Microsoft 365;CISSP;ISO27001 Languages RequiredENGLISH Role Rarity To Be Defined
Posted 2 months ago
2 - 7 years
4 - 9 Lacs
Maharashtra
Work from Office
Description 1.Manage and maintain the Claroty platform. 2.Performing the Compute Service Requirements in respect of the Clatory platform 3.Perform policy configuration and tuning as directed by the Customer 4.Configure Threat Detection rule and tune alerts as per Customer requirements. 5.Firmware updates and software patching Patch cycle monthly with additional patching as required, where security/vulnerability patches to be analysed and, all patching as approved by the Customer for deployment by the Service Provider during planned downtime 6.Create and maintain all relevant design and platform management documents 7.Report any critical anomaly to Customer SOC team if identified and provide necessary support during security incident analysis and investigation. 8.Provide support for Network Devices and Operational Technology component integration with Claroty platform. 9.Security alert monitoring and investigation Akash Saksena CV Recieved. Named Job Posting? (if Yes - needs to be approved by SCSC) Additional Details Global Grade C Level To Be Defined Named Job Posting? (if Yes - needs to be approved by SCSC) No Remote work possibility No Global Role Family To be defined Local Role Name To be defined Local Skills security;intrusion detection Languages RequiredENGLISH Role Rarity To Be Defined
Posted 2 months ago
2 - 7 years
4 - 9 Lacs
Karnataka
Work from Office
Description SCCM AdministrationManage, configure, and maintain the SCCM environment, including hardware/software inventory, deployment, and monitoring. Named Job Posting? (if Yes - needs to be approved by SCSC) Additional Details Global Grade C Level To Be Defined Named Job Posting? (if Yes - needs to be approved by SCSC) No Remote work possibility Yes Global Role Family To be defined Local Role Name To be defined Local Skills System Installation;Microsoft Endpoint Configuration Manager Languages RequiredENGLISH Role Rarity To Be Defined
Posted 2 months ago
5 - 7 years
13 - 15 Lacs
Mumbai Suburbs, Mumbai, Mumbai (All Areas)
Work from Office
The Security Analyst serves as the core technical expert of all assurance activities related to the information security posture, compliance mitigation, integrity and confidentiality of customer, business partner, employee and business information in compliance with the organization's information security policies. Responsibilities: Technical documentation about the security breaches and the processes. Configuration reviews for implemented solutions like firewalls, WAF, PAM/PIM, DLP, SIEM. Data encryption programs to safeguard organization’s vital data. Red teaming, VA-PT, source code reviews, Mobile app reviews. Work directly with the ISG team and coordination with stakeholders. Risk assessment and risk management processes. Understand the processes and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services. Review and Propose changes to existing policies and procedures to ensure operating efficiency and regulatory compliance. Coordinate, measure and report on the technical aspects of security posture. Manage outsourced vendors that provide information security functions for compliance with contracted service-level agreements. Manage and coordinate operational components of incident management, including detection, response, documentation and reporting. Maintain a knowledgebase comprising a technical reference library, security advisories and alerts, information on security trends and practices, and laws and regulations. Manage the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk. Mitigate the compliance requirements as per regulatory guidelines Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and follow policies and audit requirements. Design, coordinate and oversee security testing procedures to verify the security of systems, networks and applications, and manage the remediation of identified risks. Requirements: Diploma /Degree in a technology-related field required. Professional security analyst certification. Minimum of five to 7 years of hands on experience in VA-PT, configuration reviews and data protection. Knowledge of common information security management frameworks, such as ISO/IEC 27001, and NIST. Excellent written and verbal communication skills and high level of personal integrity. Experience with Cloud computing/Elastic computing across virtualized environments. Interested candidates can share their resume at shamli.kamble@hdfcsales.co.in
Posted 2 months ago
5 - 10 years
12 - 17 Lacs
Pune, Wakad
Work from Office
Key Responsibilities Security Operations Center Governance Governance Framework: Develop, implement, and maintain the governance framework for the SOC, ensuring alignment with industry best practices and regulatory requirements. Policy Development: Create, review, and update security policies, standards, and procedures to ensure they are effective and up-to-date. Risk Management: Identify, assess, and mitigate security risks related to SOC operations. Develop risk management strategies and monitor the effectiveness of risk mitigation measures. Incident Response Oversight: Oversee the incident response process, ensuring that incidents are managed and resolved in accordance with established protocols. Training and Awareness: Develop and deliver training programs to enhance the security awareness and skills of SOC staff. Ensure that all team members are knowledgeable about governance and compliance requirements. Key Responsibilities Data Security Governance and Vulnerability Management Strategy: Develop, implement, and maintain the data security strategy and framework, ensuring alignment with industry best practices and regulatory requirements. Policy Development: Create, review, and update data protection policies, standards, and procedures to ensure they are effective and current. Risk Assessment: Conduct regular risk assessments to identify and mitigate potential data leakage risks. Develop risk management strategies and monitor their effectiveness. Incident Response: Oversee the data breach and incident response process, ensuring that incidents are managed and resolved according to established protocols. Monitoring and Analysis: Implement and manage DLP tools and technologies to monitor data flows and detect potential data leakage. Analyze DLP alerts and incidents to identify trends and areas for improvement. Training and Awareness: Develop and deliver training programs to enhance the data protection awareness and skills of employees. Ensure that all team members are knowledgeable about DLP policies and procedures. General Responsibilities Compliance Management: Ensure compliance with relevant security standards and regulations across SOC, DLP, and VAPT. Conduct regular audits and assessments to verify compliance. Risk Management: Identify, assess, and mitigate security risks related to SOC, DLP, and VAPT operations. Reporting and Metrics: Develop and maintain key performance indicators (KPIs) and metrics to monitor the effectiveness of the governance programs. Prepare and present reports to senior management. Collaboration: Work closely with other departments, such as IT, Legal, and Compliance, to ensure a cohesive approach to security governance. Continuous Improvement: Promote a culture of continuous improvement within SOC, DLP, and VAPT programs. Identify areas for enhancement and implement best practices. Roles and Responsibilities 2
Posted 2 months ago
4 - 6 years
12 - 15 Lacs
Greater Noida
Work from Office
Presales Support: Engage with sales teams and clients to understand project requirements, pain points, and technical needs. Provide solution demonstrations during client meetings, identifying key business drivers, and assisting in product/service selection. Collaborate with stakeholders to create clear, compelling, and customer-focused value propositions that align with client objectives. Proposal Writing: Lead the creation and management of responses to RFPs (Requests for Proposal), RFIs (Requests for Information), and other client inquiries. Write, edit, and produce well-structured, customized proposals and presentations that clearly articulate the value of our solutions. Ensure proposals meet client requirements, technical specifications, and legal standards while adhering to deadlines. Strong end-to-end knowledge in the design, engineering, and operation of a comprehensive DLP solution set. Information Security processes, practices, and solutions Data marking and classification schemes Enterprise DLP solutions Network and SaaS DLP solutions Experience using DLP tools to secure data within an enterprise 6+ years of experience with DLP in a global environment.
Posted 2 months ago
3 - 5 years
4 - 6 Lacs
Hyderabad
Work from Office
Role and Responsibilities: Knowledge of security products from leading OEMs such as Firewall, 2FA, DLP, SIEM, Backup etc. Understanding of cloud security solutions. Product OEM and Partner Relationship Management Knowledge and understanding of the IT industry especially System Integrations Strong knowledge and understanding of the cyber security industry and security solutions landscape Strong knowledge and understanding of the security industry and ability to eliminate sales obstacles through creative and adaptive approaches. Knowledge of Routing, Switching with network security devices/systems such as firewalls, IDS, and IPS. Hands-on experience configuring security devices is preferred Should also have security product hands-on experience Good understanding of cloud security solutions and Security architecture and design experience Desired Candidates Profile: 3 years of Cyber Security or Computer Networking with B-tech Or 5 Years of Cyber Security or Computer Networking if not B-tech
Posted 3 months ago
6 - 10 years
8 - 12 Lacs
Pune
Work from Office
We are seeking a highly motivated and experienced professional to build and lead our Insider Threat & Risk Management team within the Information Security group. This role is critical in identifying, assessing, and mitigating insider risks to protect our firms critical data, intellectual property, and operational integrity. The Lead will develop and execute an insider threat program, leveraging behavioral analytics, security tools, and cross-functional collaboration to proactively detect and respond to threats. What You'll Do: Program Development & Leadership: Design and implement a comprehensive insider threat and risk management program aligned with business and security objectives. Threat Detection & Response: Utilize data analytics, behavioral indicators, and security tools (e.g., UEBA, DLP, SIEM) to monitor and investigate potential insider threats. Risk Assessment & Mitigation: Conduct insider risk assessments, define detection methodologies, and recommend mitigation strategies. Collaboration & Stakeholder Engagement: Work closely with Legal, HR, IT, Security Operations, and Compliance teams to develop policies, response frameworks, and training initiatives. Incident Handling & Investigations: Lead investigations into potential insider threats, ensuring timely response and remediation while adhering to privacy and legal considerations. Security Awareness & Training: Drive awareness programs to educate employees and leaders about insider risks and best practices. Regulatory & Compliance Alignment: Ensure the program aligns with industry standards (e.g., NIST, ISO 27001, SOC2) and regulatory requirements. Continuous Improvement: Regularly assess and refine the program to adapt to evolving threats and business needs. What You'll Bring: Bachelors degree in information security, Cybersecurity, or related field. 6+ years of experience in information security, with a focus on information protection, DLP and data protection. Strong understanding of information security frameworks, regulations, and standards (e.g., ISO 27001, NIST, GDPR). Familiarity with network security, endpoint protection, and cloud security principles. Ability to balance proactive prevention with reactive incident response. High ethical standards and discretion when handling sensitive information. Demonstrated ability to build and lead teams, with excellent communication and interpersonal skills. Experience with security technologies such as data classification, DLP, encryption, SIEM, and access controls. Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or equivalent. Excellent analytical and problem-solving skills, with the ability to assess risks and recommend effective solutions. Strong communication and interpersonal skills to collaborate with various teams and stakeholders. Proven track record of successfully implementing and managing information protection programs.
Posted 3 months ago
3 - 8 years
3 - 7 Lacs
Hyderabad
Work from Office
Hello Candidate, Greetings from Hungry Bird IT Consulting Services Pvt. Ltd.! We are hiring a Cyber Security Engineer for our client. Location: Hyderabad Industry: IT - Hardware / Networking / IT Security No Of Working Days : 6 days working Timings : 08:00 AM to 05:00 PM Experience: 3+ years in Cyber Security or Computer Networking (if B.Tech), 5+ years in Cyber Security or Computer Networking (if not B.Tech) Key Responsibilities (KRAs) Knowledge of security products from leading OEMs such as Firewall, 2FA, DLP, SIEM, Backup etc. Understanding of cloud security solutions Product OEM and Partner Relationship Management Knowledge and understanding of the IT industry especially System Integrations Strong knowledge and understanding of the cyber security industry and security solutions landscape Strong knowledge and understanding of the security industry and ability to eliminate sales obstacles through creative and adaptive approaches. Knowledge of Routing, Switching with network security devices/systems such as firewalls, IDS, and IPS. Hands-on experience configuring security devices is preferred Should also have security product hands-on experience Good understanding of cloud security solutions and Security architecture and design experience Key Skills & Abilities: Netskope , FortiGate firewalls Strong knowledge of cybersecurity solutions & industry trends Experience with system integration in IT security . Application Process: (Interested candidates can share their CV at aradhana@hungrybird.in or call +91 9959417171.) Please furnish the below-mentioned details that would help us expedite the process. PLEASE MENTION THE RELEVANT POSITION IN THE SUBJECT LINE OF THE EMAIL. Example: KRISHNA, HR MANAGER, 7 YEARS, 20 DAYS NOTICE Name: Position applying for: Total experience: Notice period: Current Salary: Expected Salary: Thanks and Regards Aradhana +91 9959417171
Posted 3 months ago
2 - 7 years
4 - 9 Lacs
Bengaluru
Work from Office
Project Role : Infrastructure Consulting Practitioner Project Role Description : Support clients to design, build and run an agile, scalable IT infrastructure that is standardized and optimized to deliver operational efficiencies, improve employee and workplace performance and meet dynamic business demands. Apply infrastructure improvements across the workplace, network, data center and operations as well as provide resources to manage and run the infrastructure on a managed or capacity services basis. Must have skills : Microsoft Endpoint Configuration Manager Good to have skills : Microsoft Intune Minimum 2 year(s) of experience is required Educational Qualification : Graduate Summary :As an Infrastructure Consulting Practitioner, you will support clients to design, build and run an agile, scalable IT infrastructure that is standardized and optimized to deliver operational efficiencies, improve employee and workplace performance and meet dynamic business demands. You will apply infrastructure improvements across the workplace, network, data center and operations as well as provide resources to manage and run the infrastructure on a managed or capacity services basis. Your typical day will involve collaborating with clients to understand their infrastructure needs, designing and implementing solutions, and ensuring the smooth operation of the infrastructure. Roles & Responsibilities: Expected to perform independently and become an SME. Required active participation/contribution in team discussions. Contribute in providing solutions to work related problems. Collaborate with clients to understand their infrastructure needs and requirements. Design and implement IT infrastructure solutions based on client requirements. Ensure the smooth operation of the infrastructure and troubleshoot any issues that arise. Provide technical guidance and support to clients and internal teams. Stay up-to-date with the latest industry trends and technologies. Continuously improve and optimize the IT infrastructure to enhance performance and efficiency. Professional & Technical Skills: Must To Have Skills:Proficiency in Microsoft Endpoint Configuration Manager. Good To Have Skills:Experience with Microsoft Intune. Strong understanding of IT infrastructure design and implementation. Knowledge of network architecture and protocols. Experience with cloud-based infrastructure solutions. Familiarity with security best practices for IT infrastructure. Excellent problem-solving and troubleshooting skills. Strong communication and collaboration abilities. Additional Information: The candidate should have a minimum of 2 years of experience in Microsoft Endpoint Configuration Manager. This position is based at our Bengaluru office. A Graduate degree is required. Qualifications Graduate
Posted 3 months ago
3 - 8 years
5 - 10 Lacs
Jaipur
Work from Office
Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Microsoft Endpoint Configuration Manager Good to have skills : Workplace Technology Solutions Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Tech Support Practitioner, you will act as the ongoing interface between the client and the Microsoft Endpoint Configuration Manager system. You will be dedicated to quality, using exceptional communication skills to keep our world-class systems running. With your deep product knowledge, you will accurately define client issues and design resolutions. Your typical day will involve providing ongoing support to clients, troubleshooting system or application issues, and ensuring smooth operations. Roles & Responsibilities: Expected to perform independently and become an SME. Required active participation/contribution in team discussions. Contribute in providing solutions to work-related problems. Provide ongoing support to clients, addressing their queries and issues. Troubleshoot system or application issues and provide timely resolutions. Ensure smooth operations of the Microsoft Endpoint Configuration Manager system. Collaborate with the team to identify and implement improvements to enhance system performance. Stay updated with the latest industry trends and technologies to provide effective support. Assist in training and mentoring junior team members to enhance their skills. Professional & Technical Skills: Must To Have Skills:Proficiency in Microsoft Endpoint Configuration Manager. Good To Have Skills:Experience with Workplace Technology Solutions. Strong understanding of system or application support processes and best practices. Knowledge of ITIL framework and incident management processes. Experience in troubleshooting and resolving system or application issues. Excellent communication and interpersonal skills to effectively interact with clients. Ability to analyze complex problems and provide innovative solutions. Attention to detail and ability to prioritize tasks effectively. Additional Information: The candidate should have a minimum of 3 years of experience in Microsoft Endpoint Configuration Manager. This position is based at our Bengaluru office. A 15 years full-time education is required. Qualifications 15 years full time education
Posted 3 months ago
10 - 12 years
12 - 17 Lacs
Bengaluru
Work from Office
Key Responsibilities: Data Protection Program Management Develop and implement a comprehensive data protection strategy, covering DLP, data classification, encryption, and other controls. Oversee the deployment, configuration, and maintenance of DLP tools and technologies. Establish and maintain policies, standards, and procedures to protect sensitive data. Provide regular reporting on DLP metrics and trends to leadership. Data Flow Management Collaborate with business and technical teams to map and document data flows, ensuring accuracy and completeness. Identify sensitive data repositories and flows, assessing risks associated with their storage, processing, and transmission. Incident Management and Risk Mitigation Lead investigations into data protection incidents, including data breaches and unauthorized access events. Establish and maintain an incident response plan for data protection-related events. Work with IT and business units to implement encryption, masking, and other data security measures. Program Management Lead security program initiatives, ensuring projects are delivered on time, within scope, and within budget. Collaborate with cross-functional teams to integrate security into business processes and technology initiatives. Establish and track key performance indicators (KPIs) to measure the effectiveness of security programs. Provide regular updates to the CISO and executive leadership on program status, challenges, and achievements. Qualifications: Bachelors degree in Computer Science or Information Security or related field Minimum of 8 years of experience in information security, with a focus on Data Protection, DLP/CASB/MDM implementation & Management, etc. Expertise in DLP tools. Knowledge of data encryption, tokenization, and data classification technologies Strong understanding of data flow diagramming and risk analysis techniques. Proven leadership and team management skills. Excellent verbal and written communication skills with attention to detail Strong project management skills Effectively manage sensitive and confidential information Preferred Skills: Experience in the e-commerce industry. Familiarity with security solutions such as Microsoft Defender & Purview, Netskope Strong analytical and problem-solving abilities. What We Offer: Competitive salary and benefits package. Opportunity to work with a dynamic and innovative team. Professional development and career growth opportunities. A collaborative and inclusive work environment. Skills Required - 8+ years of experience in the field of information security. Strong technical expertise in DLP, encryption, and data classification methodologies
Posted 3 months ago
10 - 18 years
20 - 27 Lacs
Bengaluru
Work from Office
Job Purpose: The Security Architect will be responsible for designing, implementing, and maintaining the overall security posture of the NBFC's IT infrastructure, applications, and data. This role involves developing and enforcing security policies, standards, and procedures to protect the organization from cyber threats, ensuring compliance with regulatory requirements, and safeguarding customer data. The Security Architect will work closely with IT, risk management, and business teams to align security strategies with business objectives. Key Responsibilities: Information Security Strategy Develop and implement an organization-wide information security strategy and vision. Align information security initiatives with business goals and objectives. Stay abreast of emerging threats and technologies to adapt the security strategy accordingly. Meeting and Board Presentation Participate in senior management meetings. Present the security strategy and vision to the board. Present risk and mitigation plans to the risk committee. Risk Management Identify, assess, and prioritize information security risks. Develop and implement risk mitigation strategies. Establish risk management frameworks and policies. Security Policies and Procedures Develop, implement, and enforce information security policies and procedures. Ensure compliance with relevant laws, regulations, and industry standards. Promote security awareness and education throughout the organization. Incident Response and Management Develop and maintain an incident response plan. Lead and coordinate responses to security incidents. Conduct post-incident reviews and implement improvements. Security Architecture Design and implement a robust information security architecture. Evaluate and select security technologies and tools. Ensure the integration of security measures into the organization's IT infrastructure. Security Awareness and Training Develop and implement security awareness programs for employees. Provide training to staff on security policies and best practices. Vendor and Third-Party Risk Management Assess and manage the security risks associated with external vendors and third-party relationships. Ensure that third-party contracts include appropriate security requirements. Compliance Monitor and ensure compliance with relevant data protection and privacy laws. Coordinate with legal and compliance teams to address regulatory requirements. Ensure compliance with relevant regulatory requirements (e.g., RBI guidelines, DPDPA, Cert-In, etc.). Security Audits and Assessments Conduct regular security audits and assessments. Prepare and maintain documentation for audits and regulatory inspections. Ensure the effectiveness of security controls and measures. Security Governance Establish and chair a security governance committee. Report regularly to executive leadership and the board on the state of information security. Budget and Resource Management Develop and manage the information security budget. Allocate resources effectively to support security initiatives. Collaboration and Communication Collaborate with other senior executives to integrate security into overall business strategies. Communicate effectively with stakeholders about the importance of information security. Provide guidance and training to employees on security best practices and awareness.
Posted 3 months ago
3 - 5 years
5 - 7 Lacs
Bengaluru
Work from Office
About the team: The Security Standards team is a part of the central Information security function which is primarily responsible for security standards, secure configuration reviews, architecture reviews, validating efficacy and efficiency of the existing security controls, threat modeling, assessment of the various security controls / technologies based on the gaps identified, security metrics, analytics, automation etc. This team owns the IT Security, Security controls and reviews them on a regular basis to ensure IT/Security controls are working as designed, and all features/capabilities of IT and Security products are being used to the maximum. The InfoSec Security standards team is responsible for defining new and reviewing existing hardening standards for Flipkart and Group. This function is also responsible for reviewing and approving technical security exceptions against the defined security standards. About the role: Flipkart is seeking a skilled, technocrat, motivated, strong security mindset and collaborative Information Security Engineer in the Security Standards team. You will be a strong communicator and influencer, demonstrating curiosity to learn and understand the business. What youll do: Specializes in Security Standards Development, meticulously crafting security standards and protocols to fortify digital infrastructures. Conducts comprehensive Security Standards Assessments, scrutinizing systems for gaps and vulnerabilities Develop standards in accordance with industry recognised standards like CIS (Center for Internet Security), standards implementation and interpretation across FK Group. Security review of the architecture for the new projects and existing infrastructure setup. Expert in Security Configuration Reviews, ensuring optimal secure configurations and settings to mitigate risks. Ensure efficacy of security controls deployed. Work with the technical operations team to understand security controls / tech deployed and come up with recommendations to address gaps and also take full advantage of the deployed technologies. Conduct threat modeling based on well known standards / frameworks such as STRIDE, PASTA etc. Identifying and defining the requirements of the overall security of the information processing systems. Identify security gaps, exposures and develop mitigation plans Build and execute on organizations roadmaps Automation & Scripting as required. Defining and maintaining security procedures, standards,guidelines and procedures as required. Executes proactive measures to safeguard against emerging threats and collaborates cross-functionally to maintain cutting-edge security protocols. What youll need: Bachelors degree(B.E/B.Tech or M.S/M.Tech) in Information Technology or other related fields. At least 3-5 years of working experience in domains related to Information security and with a very strong security mindset. Implementation experience in Security technologies (at least 2 years) such as Next Gen Firewall / IDS/ IPS / NAC / Email Security/CASB / EDR / WAF / AV / DLP / ATP / PIM / PAM / DAM / SIEM etc. In-depth understanding of networking concepts, protocols and in-depth knowledge of infrastructure, identity and endpoint security technology such as AD, Azure AD, Next Gen Firewall, IDS, IPD, AV, EDR, CASB, WAF, NAC, Wi-fi security, DLP, ATP, SIEM, Proxy etc. Proficiency in CIS (Center for Internet Security) standards implementation and interpretation. Very good understanding of Operating systems (Windows, MAC, Linux) & VDI etc. Knowledge and understanding of security standards, security configuration reviews, secure architecture and cloud security. Good understanding of security frameworks, standards such as ISO 27001, NIST, CIS etc. Experience in security architecture reviews and driving cross-functional programs. Strong skills in security principles such as least privilege access, defence in depth, preventative vs detective controls, network security, cloud security, application security, endpoint security, data protection, and incident response. Solid understanding of operational and organizational structures Possess of information security certifications such as CEH / ISO 27001 / TOGAF etc. Excellent problem solving, interpersonal,communication and presentation skills. Able to work independently and efficiently, as well as with others, to meet deadlines in a fast-paced environment. Skills Required: Endpoint Security, Identity Security, Email Security, Infrastructure Security, Network Security, Cloud Security, Security Standards, Secure Configuration, Security Architecture, Cyber Security, Security Standards, SecureConfigurationReviews, IT Security Education/Qualification: B.E/B.Tech/M.S/M.Tech Desirable Skills: Endpoint Security, Identity Security, Email Security, Infrastructure Security, Network Security, Cloud Security, Security Standards, Secure Configuration, Security Architecture, Cyber Security, Security Standards, SecureConfigurationReviews, IT Security.
Posted 3 months ago
3 - 8 years
14 - 24 Lacs
Pune, Bengaluru, Hyderabad
Hybrid
Role- Data Protection Location: Bangalore, Hyderabad,Mumbai , Pune, kolkata, chennai and Gurgaon Exp- 3-9 yrs Qualifications and Experience Required: B.E. / B. Tech / MBA Demonstrated experience in designing and implementing technology and process solutions to reduce the potential risk of data compromise Understanding of the entire ecosystem of data protection including well-rounded understanding of the information security domains and their inter-relations across that ecosystem Minimum 5 years of relevant experience required on Data Protection technologies Strong domain expertise, implementation and/or integration skills in two to four or more (depending on years of experience) of following areas: Data classification and inventory programs including the use of data discovery tools Data Loss Prevention Database activity monitoring Data access governance Cloud Access Security Broker Securing credential repositories and authentication services Systems administration experience with various operating systems such as Windows Server, Unix, and Linux DBA experience with database technologies such as Oracle and Microsoft SQL Understanding of key industry and regulatory requirements such as PCI, HIPAA, NIST Cyber Security Framework, NERC, or FFIEC requirements Demonstrated ability to identify and address internal and external client needs, including: Demonstrated problem solving and critical thinking skills Working collaboratively with clients to design and implement process and technology solutions Able to build solid, trust - based relationships with stakeholders Excellent verbal and written communication Willingness to travel Preferred: • CISSP, or equivalent certification desired • Technical skills including scripting - Python/JAVA/ASP/C#, Coding frameworks • Data protection product certifications • Previous experience with cyber incident response
Posted 3 months ago
10 - 20 years
5 - 8 Lacs
Gandhinagar, Ahmedabad
Work from Office
Responsibilities and Duties Act as L2 escalation point for unresolved cases and come up with a technical way ahead for challenging and unsolved IT SD Support cases Work on other newly assigned cases from queue as per queue management. Acts as technical mentor on floor to offer quick technical assistance to engineers. Trains new hires with IT SD technical training program. Train, coach, and mentor L1/L2 Technical Support Engineers on technical aspects. Acts as problem manager to come out with resolution for IT SD escalations. Demonstrable ability to think around issues and look at the wider picture in order to provide solutions through a variety of problem-solving techniques Acts as technical SME on floor for ticket resolution. Create internal and end users KB Articles. Conduct technical awareness and troubleshooting trainings for existing staff. Create SOP on recurring issues to capture troubleshooting steps. Vendor management for product related deployment, upgrade, and escalation management. Ensure ticket documentation, categorization and classification are precise. Ensure compliance and process adherence in all transaction and service delivery. Partner with cross-functional teams to assist with troubleshooting Major Incidents impacting IT services as needed. Work in 24X7 rotational shift to provide round the clock IT Support to customers as per scheduled shift roster. Identify opportunities to improve First Contact Resolution of Incidents by Service Desk, by partnering with wider IT functions, proactive documentation/communication. Take ownership and deliver on tasks assigned related various IT projects. Knowledge and understanding of best practice frameworks (such as ITIL, ISO20k). Desired skills & competencies Bachelor's degree in computer science, Information Technology, or related field. Expert in Microsoft products / solutions like desktop and server O.S., AD/Domain controller, WSUS, Bit locker, Azure AD, O365. Sound knowledge of Endpoint security, DLP Products, WDS, SCCM. Sound knowledge of windows OS, MS Severs, endpoints hardware and related troubleshooting At least 5 years + years of total IT experience with minimum 2 years of experience with IT Helpdesk / service desk in resolving technical escalation at level 2 and above profile. Microsoft/O365/Azure Certification. Networking, security certification is an added advantage. Drive, self-motivation, and ability to work under own initiative. Proactive and creative, Attention to detail, Excellent research skills. Excellent English communication skill (both Written & Verbal).
Posted 3 months ago
2 - 6 years
3 - 6 Lacs
Mumbai
Work from Office
Job DescriptionDescription: JOB DESCRIPTION of Endpoint Security Support Executive Job Title (Designation): Assistant Manager II Endpoint Security Support Executive Department: Information Technology Reports to: Senior Manager Experience: 2 /3 Years of work experience Required Qualification: Diploma in Engineering/Any Graduation Degree Preferred Qualification: Diploma in Engineering/Any Graduation Degree Skill, Knowledge & Trainings: Excellent command / highly proficient in spoken and written English Should have Exceptional customer service skills. Troubleshooting skills for Windows Operating Systems (OS). Should have working knowledge of softwares/tools used for management of Antivirus, Inventory, Application control, Windows Patches & Builds & Browser security. Proficient knowledge of computer systems and its peripherals. Microsoft trainings on Server / Client OS Fundamentals & Security preferred. Core Competencies: Excellent in teamwork with a strong sense of responsibility, accountability, reliability, and commitment Self-motivated & Self starter Ability to quickly adapt to new technologies Ability to thrive on challenges/pressure Ability to manage task flow and complete assigned project on time Demonstrate solid time management, communication, decision making, human relations, organizational skills and ability to set and manage priorities in a results-oriented way Have an analytical nature in order to determine the underlying reason for a particular problem. Solve non-standard issues that may require analytical and conceptual thinking Functional Competencies: Security Products Related Support for the following. Antivirus / EndPoint Detection & Response (EDR), Extended Detection & response (XDR). Endpoint Patch Management. Application Whitelisting Solution. Data Loss Prevention (DLP) Management. Performing Health-check exercises to ensure Compliance enforcement & adherence of all systems beings managed. Logging call with OEMs / Service providers for various issues and vulnerability related closure. Additional Competencies Strong technical knowledge of Microsoft product line including Windows & Client Operating Systems & MS Office IT asset tracking knowledge and related documentation. Expertise in advance level troubleshooting of incidents impacting end users. Capacity management of Servers hosted in virtualized environments. Adhere to system security practices. Support multiple users in a timely and efficient manner, following timely escalation process/procedures. Research, resolve, respond to, and document appropriate user inquiries, as requested. Escalate or re-assign issues as needed to appropriate resources for resolution. Good knowledge of Local Area Network infrastructure. Knowledge on basic handling of Virtual hosted Servers. Effective Co-ordination with various support teams/departments /vendors. Proficiency in Email and Telephonic communication. Ability to multi-task and prioritize workload Ability to make independent decisions when required for problem resolution. Job Purpose: Maintenance of Compliance of End user Windows systems by effective management of Security products of Antivirus, EDR & XDR, Windows Security Patches, Application Whitelisting solution & Data Leakage Solution. Area of Operations Key Responsibility Onsite & Remote Technical support to users & Onsite consultants Using centralized ticketing system for receiving & closing support related calls. Ensure support tickets are responded to in a timely manner and resolved in accordance to predefined company standards. Running day to day Server & Application checklists as part of Server / application management. Submission of monthly / quarterly reports for applications / servers being managed. Maintenance & Submission of various documentation & reports for Audits. Maintaining the build environments for all products and platforms. Adhere to Asset Management procedures, ensuring assets are fully tracked & information is maintained throughout its lifecycle in a timely fashion. Plan, execute and finalize procurement for technology spending across the organization. Experience in obtaining quotes from vendors and negotiations. Management of End user centralized Application Softwares used for Browser management, Asset Inventory management, Antivirus management. Patch management. Management of Voice Recording Systems (VRS). Management of onsite AMC vendor team to ensure call resolution is within agreed Service Level greement (SLA). Setup and support for hosting meeting via softwares such as Cisco Webex / Zoom. Audio / video conference systems setup such as Polycom / Blue Jeans. Vendor management. Replacement / Upgrade of hardware / software in line with organizations Asset Obsolescence policy & procedure. Assessment of VA/PT (Vulnerability Assessment / Penetration Test) reports and related work for closure of vulnerabilities. Day to Day investigation work related to SOC (Security Operation Centre) alerts & reports. Planning & Executing BCP for various applications being managed. Performing Health-check exercises to ensure Compliance enforcement & adherence of all systems beings managed. Provide technical support to onsite and remote personnel to ensure prompt restoration of service on a variety of systems and applications. Installation, configuration, maintenance and troubleshooting of existing endpoint environments including imaging and complete system setups.
Posted 3 months ago
5 - 8 years
5 - 7 Lacs
Chennai
Work from Office
Exp with Zimbra, Office 365, IceWarp- administration, configuration, troubleshooting Exp in email migration projects, cross-platform migrations between Zimbra, Office 365,IceWarp. Exp in email security-Antispam, Antimalware ,Antivirus Required Candidate profile 5-8 years of exp in administering and managing email platforms, with a focus on the financial services or NBFC Experience in implementing and managing Data Loss Prevention & email compliance policies
Posted 3 months ago
5 - 10 years
7 - 12 Lacs
Hyderabad
Work from Office
Project Role : Infra Tech Support Practitioner Project Role Description : Provide ongoing technical support and maintenance of production and development systems and software products (both remote and onsite) and for configured services running on various platforms (operating within a defined operating model and processes). Provide hardware/software support and implement technology at the operating system-level across all server and network areas, and for particular software solutions/vendors/brands. Work includes L1 and L2/ basic and intermediate level troubleshooting. Must have skills : Microsoft Intune Good to have skills : Microsoft Endpoint Configuration Manager, Microsoft 365 Security & Compliance Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Infra Tech Support Practitioner, you will be responsible for providing ongoing technical support and maintenance of production and development systems and software products, both remote and onsite. You will work on configuring services running on various platforms and implementing technology at the operating system-level across all server and network areas. Roles & Responsibilities: Expected to be an SME. Collaborate and manage the team to perform. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Provide solutions to problems for their immediate team and across multiple teams. Ensure smooth functioning of hardware/software support. Implement technology at the operating system-level. Troubleshoot at L1 and L2 levels. Professional & Technical Skills: Must To Have Skills:Proficiency in Microsoft Intune. Good To Have Skills:Experience with Microsoft Endpoint Configuration Manager. Strong understanding of system maintenance and support. Knowledge of software products and services. Experience in troubleshooting hardware and software issues. Additional Information: The candidate should have a minimum of 5 years of experience in Microsoft Intune. This position is based at our Hyderabad office. A 15 years full-time education is required. Qualifications 15 years full time education
Posted 3 months ago
2 - 7 years
4 - 9 Lacs
Gurgaon, Noida
Work from Office
Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Microsoft Windows Desktop Management Good to have skills : NA Minimum 2 year(s) of experience is required Educational Qualification : Graduation Summary :As an Application Tech Support Practitioner, you will be responsible for providing ongoing support to clients and ensuring the smooth functioning of systems and applications. Your typical day will involve accurately defining client issues, interpreting and designing resolutions, and utilizing exceptional communication skills to maintain world-class systems. Roles & Responsibilities: Provide ongoing support to clients, acting as the interface between the client and the system or application. Accurately define client issues and interpret and design resolutions based on deep product knowledge. Utilize exceptional communication skills to maintain world-class systems and ensure their smooth functioning. Collaborate with cross-functional teams to provide quality support and resolve client issues in a timely manner. Stay updated with the latest advancements in Microsoft Windows Desktop Management and related technologies to provide effective support. Professional & Technical Skills: Must To Have Skills:Proficiency in Microsoft Windows Desktop Management. Good To Have Skills:Knowledge of related technologies such as Active Directory, Group Policy, and SCCM. Strong understanding of client-server architecture and networking concepts. Experience in troubleshooting and resolving technical issues related to Microsoft Windows Desktop Management. Excellent communication and interpersonal skills to effectively interact with clients and cross-functional teams. Additional Information: The candidate should have a minimum of 2 years of experience in Microsoft Windows Desktop Management. The ideal candidate will possess a strong educational background in computer science or a related field, along with a proven track record of delivering quality support. This position is based at our Bengaluru office. Summary :As an Application/Cloud Support professional with primary skill in Microsoft Windows Desktop Management,MAC, you will be responsible for providing technical support to end-users and ensuring smooth functioning of applications. Your typical day will involve troubleshooting technical issues, resolving incidents, and providing timely support to users. Good knowledge of Mac OS and support with Microsoft intune/Jamf, who can develop, maintain corporate macOS images and software packages to Mac laptop and desktop clients. The person also need to administer Microsoft Intune and create packages for applications to deploy on systems across the globe. Roles & Responsibilities:-Provide technical support to end-users for applications and systems, resolving incidents and service requests within defined SLAs. Troubleshoot technical issues related to Microsoft Windows Desktop Management, including installation, configuration, and maintenance. Collaborate with cross-functional teams to identify and resolve technical issues, ensuring timely resolution of incidents. Act as the primary point of contact for application support, leading the effort to design, build, and configure applications. Primarily ownership of the EUC ticket queue, providing L1.5,2nd line technical support for IT incidents and problems. Working alongside vendors as appropriate to investigate solutions. Expertise in using remote desktop tools such as TeamViewer, Remote Desktop Connection, AnyDesk, etc Professional & Technical Skills: Must To Have Skills:Strong knowledge of Microsoft Windows Desktop Management. Good To Have Skills:Experience with Workplace Technology Solutions.Strong knowledge of operating systems such as Windows, macOS, and tools like Microsoft Endpoint Configuration Manager/Intune, Jamf Experience in providing technical support to end-users for applications and systems. Experience in troubleshooting technical issues related to Microsoft Windows Desktop Management/MAC. Understanding and managing and configuring the Intune connector and NDES servers Configuration and Management of Various types of Profiles such Wi-Fi, SCEP Device restriction Profile in Intune for Mac devices and good knowledge using terminal commands and Bash scripts. Strong collaboration and communication skills. Ability to work in a fast-paced environment and manage multiple priorities. Additional Information: The candidate should have a minimum of 2 years of experience in Microsoft Windows Desktop Management. This position is based at our Bengaluru office. Qualifications Graduation
Posted 3 months ago
3 - 8 years
5 - 10 Lacs
Coimbatore
Work from Office
Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : Microsoft Endpoint Configuration Manager Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Developer, you will design, build, and configure applications to meet business process and application requirements. You will be responsible for ensuring that the applications are developed and implemented effectively to support the organization's needs. This role requires a strong understanding of Microsoft Endpoint Configuration Manager and the ability to work collaboratively with cross-functional teams to deliver high-quality solutions. Roles & Responsibilities: Expected to perform independently and become an SME. Required active participation/contribution in team discussions. Contribute in providing solutions to work-related problems. Collaborate with business analysts and stakeholders to understand application requirements. Design, develop, and test applications using Microsoft Endpoint Configuration Manager. Configure and customize applications to meet specific business needs. Troubleshoot and resolve application issues and bugs. Provide technical support and guidance to end-users. Stay up-to-date with industry trends and best practices in application development. Professional & Technical Skills: Must To Have Skills:Proficiency in Microsoft Endpoint Configuration Manager. Good To Have Skills:Experience with application deployment and management. Strong understanding of software development principles and methodologies. Experience with scripting languages such as PowerShell. Knowledge of SQL and database management. Familiarity with ITIL processes and IT service management. Excellent problem-solving and analytical skills. Ability to work effectively in a team environment. Additional Information: The candidate should have a minimum of 3 years of experience in Microsoft Endpoint Configuration Manager. This position is based at our Gurugram office. A 15 years full-time education is required. Qualifications 15 years full time education
Posted 3 months ago
1 - 5 years
4 - 9 Lacs
Mumbai Suburbs
Work from Office
JD for DLP : Data Leakage Prevention Assistant Manager / Manager: Design and enforce Data Leakage Prevention (DLP) policies across email, endpoints, cloud, and network environments. Configure, monitor, and fine-tune Zscaler DLP to prevent unauthorized data transfers. Investigate, analyze, and respond to DLP alerts while ensuring timely remediation of policy violations. Conduct security awareness programs on data protection best practices. Continuously assess and improve DLP rules to reduce false positives and enhance effectiveness. Generate and present periodic reports on DLP incidents, violations, and risk trends to senior management Share KRI reports for inclusion in dashboards, KRI tracking, RCSA reports, and other governance activities Experience : Minimum 2 years of experience in configuring, managing & monitoring DLP solutions preferably Zscaler. Expertise in DLP rule creation, policy tuning & incident handling across email, endpoint, cloud & network environment. Proven ability to investigate & remediate data leakage incidents
Posted 3 months ago
5 - 10 years
6 - 10 Lacs
Bengaluru, Bangalore Rural
Work from Office
Required As part of the Data Security team, In the role of "Technology Architect" you will interface with key stakeholders and apply your technical proficiency. You will play an important role in creating the high-level design artifacts, possess strong technical problem-solving skills as well as experience in the different phases of the system life cycle, to support multiple projects. You will also deliver high quality code deliverables for a module, lead validation for all types of testing and support activities related to implementation, transition, and warranty. You will be part of a learning culture, where teamwork and collaboration are encouraged, excellence is rewarded, and diversity is respected and valued. Area of Responsibility: • Expertise in both mainstream encryption schemes and key exchange protocols as well as quantum-safe cryptography. • Strong familiarity with NIST post-quantum cryptography standardization & migration efforts. • Hands-on experience with implementing, administering and integration of HSM/PKI technologies such as Thales HSM and Microsoft PKI. • Hands-on experience with implementing, testing, and deploying advanced cryptographic schemes. • Familiarity with NIST Cryptographic Standards and Guidelines. • Proficiency in multiple programming languages, eg, PowerShell, Python, Java, C#, JavaScript, C/C++. • Ability to convey complex concepts in a clear & concise manner to a wide range of audience. • Functional knowledge in Cloud Security • Experience in leading data security assessments and data security consulting • Design and implementation experience in various data protection solutions including DLP, Data Classification and Data Encryption. • Ability to discuss technical concepts and interdependencies with customers. • Ability to work with the internal Project team and end customer to continue design and deployment activities. • Understanding of associated disciplines of Security Policy and Governance. • Understanding of client security and risk posture of the client. • Experience in converting business requirement into technical specifications, excellent designing.
Posted 3 months ago
12 - 20 years
35 - 60 Lacs
Bengaluru
Work from Office
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Kyndryl’s Security & Resiliency is one of our most critical practices, ensuring enterprises, regardless of their size and complexity, remain secure, available, reliable, and resilient. We take Cybersecurity seriously. We're not just invested; we're committed. We're not just protecting data; we're empowering. Kyndryl is committed to making the world safer, not only by investing in state-of-the-art services and technologies but also by empowering underserved communities with essential cyber skills. When you walk through our doors, you're not only joining a team but you're also becoming part of a legacy. Welcome to Kyndryl, where Cybersecurity isn't just a job – it’s a passion; a commitment to designing, running, and managing the most modern and reliable technology infrastructure that the world depends on every day. As a Cybersecurity Defense professional at Kyndryl, you will encompass cybersecurity, incident response, security operations, vulnerability management, and the world of cyber threat hunting and security intelligence analysis all to protect the very heartbeat of organizations – their infrastructure. In this role, you won't just monitor; you'll actively engage in the relentless hunt for cyber adversaries. In a world where every click and keystroke could be a potential gateway for attackers, your role will be nothing short of critical as you seek out advanced threats, attackers, and Indicators of Compromise (IOCs). Your expertise in endpoint detection and response (EDR) will be the shield that safeguards individual workstations, laptops, servers, and other devices from cybercrime. Your responsibilities go beyond vigilance. When it comes to network security, you'll utilize Network Detection and Response (NDR) to monitor the ever-flowing currents of network traffic. The incident management process will be used as you respond and manage to cybersecurity incidents. Cybersecurity Defense is all about information. You'll gather, analyze, and interpret data applying your own and external threat intelligence to uncover potential security threats and risks. These insights and your ability to analyze complex attack scenarios will be the foundation of our security strategy – helping Kyndryl stay one step ahead of security breaches. In Cybersecurity Defense at Kyndryl, you’re not just protecting the present – you’re shaping the future of digital security. Join us on this cybersecurity venture where your expertise and creativity will have a lasting impact in the world of digital defense. Your Future at Kyndryl When you join Kyndryl, you're not just joining a company – you're entering a space of opportunities. Our partnerships with industry alliances and vendors mean you'll have access to skilling and certification programs needed to excel in Security & Resiliency, while simultaneously supporting your personal growth. Whether you envision your career path as a technical leader within cybersecurity or transition into other technical, consulting, or go-to-market roles – we’re invested in your journey. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Expertise: Minimum of 10-12 years' experience as a Splunk Security Engineer Expertise in designing and implementing Splunk Enterprise Security (ES) solutions Experience in configuring and optimizing Splunk search queries, dashboards, and reports In-depth knowledge of security technologies, including SIEM, IDS/IPS, DLP, and endpoint security Strong understanding of network protocols, TCP/IP, and security-related protocols Excellent analytical and problem-solving skills Ability to work independently and in a team environment Strong communication and interpersonal skills Preferred Technical and Professional Expertise Using Splunk, design and implement solutions to address and meet logging requirements in the client environment with remote logging capabilities. Configuring Splunk: Set up Splunk forwarding, configure the deployment server, and manage the Splunk indexer cluster Monitoring and troubleshooting: Monitor the Splunk infrastructure, troubleshoot performance issues, and identify bad searches and dashboards Managing security: Provide role-based security, restrict access to sensitive data, and manage Splunk license master Managing users: Manage users and their roles, and onboard new users Managing data: Manage indexes, create Splunk indexes, and design retention and retirement policies Deploying Splunk: Deploy Splunk dashboards and reports, and execute new projects Strong critical thinking and analytical skills and ability to think “out of the box” required. Must be able to work independently or with a team, under minimum supervision. Preferred Technical and Professional Experience Thorough knowledge on defining data sources monitoring based on clients’ business Thorough knowledge on MITRE Frameworks (ATT&CK, D3FEND) Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted 3 months ago
2 - 7 years
4 - 9 Lacs
Hyderabad
Work from Office
Job Area: Information Technology Group, Information Technology Group > Cyber Security Engineering General Summary: This role will be responsible for supporting 24x7 operations thus requires working night / weekend shifts on a rotational basis to support the business requirements of the organizationPrimary responsibilities include monitoring and triaging all security events coming into SOC / CDC from multiple sources. Security events include but not limited to; social engineering attacks, malware, DDoS, data exfiltration, ransomware etc.Triage for first 20 minutes as per standard operating procedure, and post which engage Tier2 for further assistanceIdentifying and Analyzing of security event and incident data by leveraging Orchestration tool workflows and knowledge baseUpdating the Ticketing system thoroughly and timely Communicating with stake holders for making sound recommendations on mitigation and or prevention techniquesFollow up and resolution of issues/tickets timely per SLAs Follow-up on pending tickets and issues ensuring SLAsWorking closely with Tier2 and Tier3 teams Escalating security events in a timely mannerStaying current with new Use Cases and process changesActively participate in brown bag sessions 'The individual must also have a good awareness of current and developing security threats and technologiesStrong proficiency in security event investigations, also in written and spoken EnglishStrong interpersonal skills and a good team playerPrior professional services experience in 24x7 SOC or CDC operations is desiredBachelors degree or Masters Degree in Computer Sciences or in Cyber Security '3 - 5 years of experience working in a SIEM tool with strong background in security incident response and system operationsCEH, Security+, OSCP or other industry-relevant cyber-security certifications and ITIL V3.0 knowledge is a plus Minimum Qualifications: Bachelors degree in Engineering, Information Systems, Computer Science, or related field. OR High school diploma or equivalent and 2+ years of cybersecurity-relevant work experience. Physical Requirements: Frequently transports and installs equipment up to 40 lbs. Applicants :Qualcomm is an equal opportunity employer. If you are an individual with a disability and need an accommodation during the application/hiring process, rest assured that Qualcomm is committed to providing an accessible process. You may e-mail disability-accomodations@qualcomm.com or call Qualcomm's toll-free number found here. Upon request, Qualcomm will provide reasonable accommodations to support individuals with disabilities to be able participate in the hiring process. Qualcomm is also committed to making our workplace accessible for individuals with disabilities. (Keep in mind that this email address is used to provide reasonable accommodations for individuals with disabilities. We will not respond here to requests for updates on applications or resume inquiries). Qualcomm expects its employees to abide by all applicable policies and procedures, including but not limited to security and other requirements regarding protection of Company confidential information and other confidential and/or proprietary information, to the extent those requirements are permissible under applicable law. To all Staffing and Recruiting Agencies :Our Careers Site is only for individuals seeking a job at Qualcomm. Staffing and recruiting agencies and individuals being represented by an agency are not authorized to use this site or to submit profiles, applications or resumes, and any such submissions will be considered unsolicited. Qualcomm does not accept unsolicited resumes or applications from agencies. Please do not forward resumes to our jobs alias, Qualcomm employees or any other company location. Qualcomm is not responsible for any fees related to unsolicited resumes/applications. If you would like more information about this role, please contact Qualcomm Careers.
Posted 3 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2