Home
Jobs
Companies
Resume

218 Dlp Jobs - Page 9

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

4 - 8 years

7 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Job Summary We are seeking a skilled IT professional with hands-on experience in managing Google Workspace, securing email infrastructure, and handling endpoint/user device management. The ideal candidate will be responsible for ensuring smooth collaboration through Google Workspace, protecting email systems from threats, and maintaining secure and compliant end-user computing environments. Skill Set 4 - 8 years of experience in IT systems administration or similar role. Proven experience managing Google Workspace for a mid-to-large user base. Solid understanding of email security protocols (SPF, DKIM, DMARC). Experience with email security platforms and endpoint management tools. Strong troubleshooting skills and familiarity with ITIL-based service management. Excellent communication and documentation skills . Roles and Responsibilities Google Workspace Administration Manage user accounts, groups, and organizational units. Implement and maintain Google Workspace security and compliance settings (DLP, Vault, SSO, etc.). Automate routine administration tasks using GAM or Google Admin SDK. Email Security & Compliance Deploy and manage email security tools (e.g., Mimecast, Proofpoint, Google Advanced Protection). Monitor and respond to email-based threats such as phishing, spoofing, and malware. Define and enforce SPF, DKIM, DMARC policies. Collaborate with the InfoSec team for email compliance and retention policies. Endpoint/User Device Management Manage and monitor endpoints across operating systems (Windows, macOS, ChromeOS). Deploy and manage MDM/EMM solutions (e.g., Google Endpoint Management, Intune, Jamf). Enforce device compliance policies, encryption, and remote wipe capabilities. Provide Tier 2/3 support for device-related issues. Operational & Security Hygiene Maintain IT asset inventory and ensure timely patching and updates. Document system configurations, procedures, and support materials. Participate in incident response and root cause analysis for device and email-related incidents.

Posted 1 month ago

Apply

3 - 7 years

5 - 9 Lacs

Gurugram

Work from Office

Naukri logo

AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation. AtAHEAD, we prioritize creating a culture of belonging,where all perspectives and voices are represented, valued, respected, and heard. We create spaces to empower everyone to speak up, make change, and drive the culture at AHEAD. We are an equal opportunity employer,anddo not discriminatebased onan individual's race, national origin, color, gender, gender identity, gender expression, sexual orientation, religion, age, disability, maritalstatus,or any other protected characteristic under applicable law, whether actual or perceived. We embraceall candidatesthatwillcontribute to the diversification and enrichment of ideas andperspectives atAHEAD. Requirements: Proficient with Active Directory and related concepts Familiar with access control methods (RBAC/ABAC) Working knowledge of identity lifecycle management processes and challenges Hands-on experience with cybersecurity tools that function in the following spacesPAM / PIM / IAM, DLP, SOAR (XSIAM), Microsoft Security, AWS Security, Red Teaming / AppSec, Isolated Recovery Environments (IREs) Experience with identity federation and SSO solutions PAM experience or familiarity with specific vendor tools Able to speak to PAM best practices Understanding of the principle of least privilege, separation of duties Experience with REST API and app integration Experience configuring, guiding, or overseeing access review and certification, role management Past participation in identity steering committee Understanding of PIM, JIT, conditional access Familiarity with US compliance and regulatory frameworks that inform identity requirements Qualifications: 6+ years of working knowledge of one or more Identity-Based Security SolutionsOkta, Sailpoint, Delinea, BeyondTrust, CyberArk, etc. Any of the following preferred but not required Security+, CISSP, any vendor-specific certifications related to Identity products Willingness to travel to support client projects and shadowing opportunities (50+ % of the time) Why AHEAD: Through our daily work and internal groups like Moving Women AHEAD and RISE AHEAD, we value and benefit from diversity of people, ideas, experience, and everything in between. We fuel growth by stacking our office with top-notch technologies in a multi-million-dollar lab, by encouraging cross department training and development, sponsoring certifications and credentials for continued learning. USA Employment Benefits include - Medical, Dental, and Vision Insurance - 401(k) - Paid company holidays - Paid time off - Paid parental and caregiver leave - Plus more! See benefits https://www.aheadbenefits.com/ for additional details. The compensation range indicated in this posting reflects the On-Target Earnings (OTE) for this role, which includes a base salary and any applicable target bonus amount. This OTE range may vary based on the candidates relevant experience, qualifications, and geographic location.

Posted 1 month ago

Apply

8 - 12 years

20 - 35 Lacs

Chennai, Bengaluru, Mumbai (All Areas)

Work from Office

Naukri logo

Preferred candidate profile End Point Security Defender , Trend Micro - Server Identity and Access Management Sailpoint , Dilenea PAM , Microsoft PKI , Active directory Data Security Data Classification , DLP - MS pureview ,Imperva - Database activitiy monitoring , Data encryiption and clous app security

Posted 1 month ago

Apply

3 - 5 years

15 - 20 Lacs

Noida

Work from Office

Naukri logo

Title: Information Security Cyber Security Data Loss Prevention - About Us : Paytm Payments Services Limited houses the Paytm payment gateway business which enables thousands of online merchants to offer world class frictionless payment experience to their customers. We are present across large enterprises and startups including well known unicorns alike. We strive to take payments beyond an enabler and an instrument to drive revenue and user growth for our merchants. Online Payment Gateway is Paytms B2B Business regulated by RBI as it allows only authorized entities to conduct PA PG (Payment Aggregator Payment Gateway) business. This business is responsible for growing the penetration of Paytms PA PG business in the Indian merchants. About the Team: - The Information Security team at Paytm Payments Services limited plays a critical role in shaping the companys information security strategy, infrastructure, and capabilities. The team helps the organization to identify current cybersecurity risks, threats, and vulnerabilities. To effectively implement the cybersecurity GRC program, PPSL is planning to add dedicated resources for information security Tool/Technologies like Data loss prevention, Cloud Security and SOC (Security operations) etc. About the Role: - PPSL's Cyber Security team is looking for Data Protection Engineer who will be responsible for configuring and improving DLP policies on multiple tools, working towards increasing DLP Program coverage, crafting and maintaining DLP Program process documentation, defining new processes and controls to further mature the DLP Program, and addressing gaps that impact the DLP process. You must have prior experience implementing cross-organizational DLP solutions and willing to go beyond the routine. Expectations/ Requirements: - Serves as SME for Forcepoint DLP tools. Establish data discovery, classification, tagging and content inspection solutions to help mitigate the risk of data loss and minimize the risks of data breaches. Define new and enhance existing DLP policies in multiple tools and have good knowledge on Forcepoint, AIP and other DLP tools Tune DLP policies on a continuous basis to maintain a mature set of policies within the scope of the DLP Program. Execute discovery scans and drive incident remediation as per defined processes. Partner with teams as needed to enhance DLP monitoring / response processes on an ongoing basis. Provide support in defining and building upon metrics and reporting to enhance understanding of DLP Program development and maturity. Scheduled maintenance activities to keep the infrastructure components robust with latest patches and updated versions of software running in the infrastructure stack. Support the DLP team in further expanding upon the established DLP Program by defining additional processes / controls for continuous risk reduction purposes and to meet the program objectives. Participate and contribute in Risk Management and Internal Audit discussions, actively document process and technology evidence to support Risk partners. Daily ticket management (change/service request) Handling the DLP incident as per defined SLA DLP Solution Implementation: Deploying and configuring Forcepoint DLP solutions and tools to monitor and protect data across an organization's network, endpoints, and cloud environments. Policy Development: Developing DLP policies and rules that define how data should be handled and protected, including identifying sensitive data types and their allowable use. Data Discovery: Scanning and identifying sensitive data within an organization, classifying it, and creating an inventory of sensitive data assets. Incident Detection and Response: Monitoring data flows and traffic for policy violations and security incidents, and responding to incidents by taking necessary actions, such as blocking data transfers. User Education and Training: Providing training and guidance to employees on data protection policies and best practices to prevent data breaches. Compliance and Regulations: Ensuring that the organization complies with data protection regulations and industry-specific standards by implementing DLP controls. Risk Assessment: Identifying data security risks and vulnerabilities and developing strategies to mitigate them. Security Awareness: Staying up to date with the latest threats, vulnerabilities, and trends in data security and DLP technologies. Qualifications: - 3-5+ years of relevant work experience with a bachelors degree Superpowers/ Skills that will help you succeed in this role: - Relevant security certifications such as Forcepoint DLP, CEH, CISSP etc. are a major plus. Experience with Forcepoint DLP, implementing endpoint and network security solutions in an enterprise and strong experience with DLP platforms and controls. Have excellent communication and interpersonal skills. Should be a team player Excellent understanding of cyber security concepts. Why join us: - A collaborative output driven program that brings cohesiveness across businesses through technology Improve the average revenue per use by increasing the cross-sell opportunities A solid 360 feedback from your peer teams on your support of their goals Respect, that is earned, not demanded from your peers and manager Compensation: If you are the right fit, we believe in creating wealth for you With enviable 500 mn+ registered users, 21 mn+ merchants and depth of data in our ecosystem, we are in a unique position to democratize credit for deserving consumers & merchants and we are committed to it. Indias largest digital lending story is brewing here. Its your opportunity to be a part of the story!

Posted 1 month ago

Apply

12 - 17 years

14 - 19 Lacs

Gurugram

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Palo Alto Networks Prisma Access Secure Access Service Edge (SASE) Good to have skills : NA Minimum 12 year(s) of experience is required Educational Qualification : 15 years full time education "Primary Skill :Good experience in security architecture design in Cloud and on-prem.Team management, Delegating responsibilities, Capablity development, Motivating team."Design and implementation in NGFW (PA/Fortinet/Checkpoint/cisco),Web Security( Zscaler, Symantec), in on-prem and Cloud, End point protection, multi-factor authenticationFirewall rule migration using tool and Data center migrationGood Hand-on Experience in AWS, Azure, GCP," Design and implementation experience of network security technologies - Next Generation Firewall (NGFW), Web Application Firewall (WAF), Intrusion Prevention / Detection System (IPS/IDS) - Fortigate / PaloAlto, F5, Imperva, Design and implementation experience of Endpoint Security Solutions - Antivirus, AntiMalware, Endpoint Detection and Response (EDR), Device Control, Vulnerability Protection, Application Control - Trend Micro, Crowdstrike, Sentinel One Design and implementation experience of Cloud Proxy Servers (Zscaler/NetSkope/ForcePoint/PaloAlto Prisma/McAfee) Design and implementation experience of Data Protection Solutions (Endpoint DLP, Network DLP (Email & Web), CASB) Design and implementation experience of Firewall Rule-set Analyzer Tools like Skybox / Algosec / Firemon / Tufin. Design and implementation experince of NAC solution ( Cisco ISE, Aruba) Data center migration experince and firewall rule migration using various tools." Hand-on experience in Azure/AWS design , Installation & configuration of various NGFW such as Paloalto, FortiGate, Checkpoint, Cisco, Prisma Cloud. End point protection as Symantec, Mcafee, Trend micro, EDR solution. Good Hands on experience and troubleshooting experience in NGFW such as Paloalto, Prisma, fortigate, Checkpoint, Cisco. End point protection as Symantec, Mcafee, Trend micro, EDR solution. Design and hands on experience to skybox, firemon, Tufin Firewall rule review tool, Firewall on-boarding Checkpoint, Cisco, Palo alto Certification, Cloud certification Experince on Infra Security tools Assessment and security standards like (NIST, CIS, ISO HIPPA & PCI DSS ) NAC, Cisco ISE, CASB Solution Netscope, Web security technologies as Zscaler,SymantecWeb security technologies as Zscaler, Symantec. Good conceptual and working knowledge around Workflow, Approval process.* Manageing and leading the team.* Good Articulation and presentation skills B.E or MCA or M.Sc with Good Computer Science Background with good academic record of 65% and above Presentation skill Qualifications 15 years full time education

Posted 1 month ago

Apply

3 - 8 years

5 - 10 Lacs

Gurugram

Work from Office

Naukri logo

Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Endpoint Protection Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Job Summary :We are seeking a skilled Beyond Trust Endpoint Privilege Management (EPM) Specialist to join our IT security team. The ideal candidate will be responsible for implementing, managing, and optimizing Beyond Trust EPM solutions on Windows 10 and Windows 11 environments. This role focuses on enhancing security by managing and controlling administrative privileges on endpoints, reducing attack surfaces, and ensuring compliance with security policies.Key Responsibilities: Implementation and Configuration:oDeploy and configure Beyond Trust EPM solutions on Windows 10 and Windows 11 systems.oCustomize EPM policies to meet organizational security requirements and best practices.oIntegrate Beyond Trust EPM with existing IT infrastructure and security tools. Privilege Management:oDevelop and enforce policies for least privilege access on endpoints.oMonitor and manage user and application privileges to prevent unauthorized access.oCreate and maintain whitelists and blacklists for applications and processes. Security and Compliance:oEnsure endpoint security compliance with organizational policies and regulatory requirements.oConduct regular audits of privileged access and generate compliance reports.oCollaborate with security and compliance teams to address findings and improve security posture. Monitoring and Reporting:oSet up and maintain monitoring and alerting systems for privileged access activities.oAnalyze and respond to security incidents related to privileged access.oGenerate regular reports on EPM activities, incidents, and compliance status. User Training and Support:oProvide training and support to end-users and IT staff on EPM policies and procedures.oAssist in troubleshooting and resolving issues related to EPM solutions.oDevelop and update documentation and training materials. Continuous Improvement:oStay up to date with the latest security threats, trends, and technologies.oRecommend and implement improvements to EPM policies and configurations.oParticipate in security assessments and risk management activities. Qualifications: Education:oBachelor's degree in information technology, Computer Science, Cybersecurity, or related field. Relevant certifications and experience may be considered in lieu of a degree. Experience:oProven experience in implementing and managing Beyond Trust EPM solutions.oStrong knowledge of Windows 10 and Windows 11 operating systems.oExperience with endpoint security and privilege management. Skills and Competencies:oDeep understanding of least privilege access principles and practices.oProficiency in configuring and managing EPM policies and rules.oFamiliarity with Active Directory, Group Policy, and other endpoint management tools.oExcellent troubleshooting and problem-solving skills.oStrong communication and interpersonal skills.oAbility to work independently and as part of a team. Certifications:oRelevant certifications such as Beyond Trust Certified Engineer (BTCE), Certified Information Qualifications 15 years full time education

Posted 1 month ago

Apply

3 - 6 years

5 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

Job Title - Security Delivery Associate Management Level: L13 or L12 Associate Location: Bengaluru Must have skills: Data Loss Prevention Good to have skills Understanding of computer hardware / operating systems (Windows, Linux, OS X, iOS/Android, etc.), IT Security, is a plus Job Summary :Accenture's Cyber Incident Response Team (CIRT) monitors the cyber threat landscape, coordinates prevention, detection, and corrective activities, and manages vulnerabilities and incidents. Within this organization, is the Data Loss Prevention team. This team responds to cyber-security incidents identified through the Data Loss Prevention (DLP) tool. By following a set process, the team is responsible for analyzing, collecting relevant details, determining the type of security incident, and escalating accordingly. The team works closely with other functions within CIRT to handle incidents. The team is also responsible for coordinating with numerous other teams who are involved with conducting follow-up investigations to such incidents. Roles & Responsibilities: Review DLP alerts appropriately, escalate and close cases in accordance with the team's defined process. Liaise with different functions within CIRT to gather information including Investigations, Infrastructure, ASOC, and Cyber Threat Intelligence. Coordinate with various teams during the escalation process, including Technology Support teams, Legal teams, HR, and other teams as defined in the escalation process. Keep all tracking and recording tools current and update incidents in tracking database with appropriate details in a timely manner. Perform incident accuracy checks within Incident Tracking database and update details when necessary. Effectively work and collaborate with a global team. Adapt to continuous process improvements and change requests as needed. Have strong communication skills; attention to detail and accuracy of information is paramount. Professional & Technical Skills: Above average problem-solving skills Excellent oral and written English communication skills Ability to manipulate and present data using MS Office and Excel Strong sense of ethics & values, ability to handle confidential situations with discretion Must be able to work collaboratively across physical locations or geographies Ability to multi-task and prioritize assigned workload Additional Information: Security+ Certification Experience working in Information Security domain Willing to work overtime, rotating shifts, work during weekends and holidays, as necessary

Posted 1 month ago

Apply

3 - 5 years

12 - 17 Lacs

Gurugram

Work from Office

Naukri logo

Job Title - S&CGN - Tech Strategy & Advisory - Security- GRC - -Analyst Management Level: 11-Analyst Location: Gurugram, DDC1A Must-have skills: Information Security Good to have skills: Strong problem-solving skills, adaptability to changing business needs, and expertise in cross-functional collaboration. Job Summary : This role involves driving strategic initiatives, managing business transformations, and leveraging industry expertise to create value-driven solutions. Roles & Responsibilities: Manage business operations, drive performance optimization, and lead cross-functional teams to achieve organizational objectives. Principal Duties and Responsibilities We are focused on helping our valued clients to design and implement large scale transformational programs to manage cyber threats. We enable our clients to define their overall cyber strategy by designing global and pan-enterprise programs that focus on reducing threats, evaluate their priorities, strengths and weaknesses and roll out large scale changes to achieve goals. If dynamic and fast-paced environments, cross-capability exposure, freedom to work and the ability to have a real impact on a rapidly growing team appeals to you, then that is what we are looking for. You'll join an ambitious team of highly motivated security specialists who interface with CIOs, CTOs, CISOs and CFOs in addressing their complex requirements on a day-to-day basis. We are looking for a Data Security expert, with a great eye for risk reduction and continual improvement opportunities. Following are some of the responsibilities that you will handle: Advise clients in understanding the problems and challenges in data security and work collaboratively with them to enhance capabilities Gather requirements, develop use cases, evaluate vendor solutions, develop architecture & design, and test data protection and data security solutions Design people, process and technology solutions to reduce the potential of data compromise Qualifications Bachelor's Degree in Engineering MBA Degree from Tier 1 College 6+ years of experience in multiple domains with expertise in Data Security Excellent analytical skills; able to breakdown complex problems, multi-faceted problems with actionable steps Exposure to Cloud and On-prem security requirements Experience Exposure and knowledge in at least 3 of the following Data Security domains: Data Security Assessment: Develop the Data Security framework, perform the assessment and generate roadmap Data Discovery, Classification, Handling and Inventory: Design Data classification and inventory programs including the use of data discovery tools Define and maintain data classification and labeling policies based on business and regulatory requirements Collaborate with business units to understand data protection needs and ensure the appropriate protection and handling of sensitive data Develop data retention and disposition policies to ensure compliance with retention requirements and relevant regulations. Design Data Classification Schema Information Rights Management (IRM) Design the information rights management use cases Develop the information rights management schema Evaluate the tools available in the market for IRM Design the strategy to implement IRM Develop the user supporting documents to implement IRM Data Obfuscation Design and develop encryption strategy and use cases for the databases, applications, servers, etc. Design PKI, Certificate Management and Key management strategy Map industry best practices around encryption tools like Keyfactor/Hashi Data Loss Prevention Design and develop use cases for DLP across endpoints, network, cloud, etc. Design the DLP rulesets based on the identified use cases Provide a comparative analysis of the DLP solutions and fitment report Identify the ways of circumventing existing DLP controls Develop high-level and low-level design documents Database Activity Monitoring Design the Database Activity Monitoring use cases Evaluate the landscape to ensure coverage for type of databases like Oracle, MySQL, applications, etc. Evaluate the CSPs native solutions and opportunities of integrating with SIEM/PAM etc. Cloud Access Security Broker (CASB) Develop use cases for CASB Evaluate the native CSPs control and develop a comparative analysis Design the several implementation modes of CASB based on the use cases Evaluate integration of CASB with other upstream and downstream solutions Professional & Technical Skills: - Relevant experience in the required domain. - Strong analytical, problem-solving, and communication skills. - Ability to work in a fast-paced, dynamic environment. Additional Information: - Opportunity to work on innovative projects. - Career growth and leadership exposure. About Our Company | Accenture Qualifications Experience: 3-5Years Educational Qualification: Any Degree

Posted 1 month ago

Apply

5 - 10 years

7 - 12 Lacs

Gurugram

Work from Office

Naukri logo

Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Endpoint Protection Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Job Summary :We are seeking a skilled Beyond Trust Endpoint Privilege Management (EPM) Specialist to join our IT security team. The ideal candidate will be responsible for implementing, managing, and optimizing Beyond Trust EPM solutions on Windows 10 and Windows 11 environments. This role focuses on enhancing security by managing and controlling administrative privileges on endpoints, reducing attack surfaces, and ensuring compliance with security policies.Key Responsibilities: Implementation and Configuration:oDeploy and configure Beyond Trust EPM solutions on Windows 10 and Windows 11 systems.oCustomize EPM policies to meet organizational security requirements and best practices.oIntegrate Beyond Trust EPM with existing IT infrastructure and security tools. Privilege Management:oDevelop and enforce policies for least privilege access on endpoints.oMonitor and manage user and application privileges to prevent unauthorized access.oCreate and maintain whitelists and blacklists for applications and processes. Security and Compliance:oEnsure endpoint security compliance with organizational policies and regulatory requirements.oConduct regular audits of privileged access and generate compliance reports.oCollaborate with security and compliance teams to address findings and improve security posture. Monitoring and Reporting:oSet up and maintain monitoring and alerting systems for privileged access activities.oAnalyze and respond to security incidents related to privileged access.oGenerate regular reports on EPM activities, incidents, and compliance status. User Training and Support:oProvide training and support to end-users and IT staff on EPM policies and procedures.oAssist in troubleshooting and resolving issues related to EPM solutions.oDevelop and update documentation and training materials. Continuous Improvement:oStay up to date with the latest security threats, trends, and technologies.oRecommend and implement improvements to EPM policies and configurations.oParticipate in security assessments and risk management activities. Qualifications: Education:oBachelor's degree in information technology, Computer Science, Cybersecurity, or related field. Relevant certifications and experience may be considered in lieu of a degree. Experience:oProven experience in implementing and managing Beyond Trust EPM solutions.oStrong knowledge of Windows 10 and Windows 11 operating systems.oExperience with endpoint security and privilege management. Skills and Competencies:oDeep understanding of least privilege access principles and practices.oProficiency in configuring and managing EPM policies and rules.oFamiliarity with Active Directory, Group Policy, and other endpoint management tools.oExcellent troubleshooting and problem-solving skills.oStrong communication and interpersonal skills.oAbility to work independently and as part of a team. Certifications:oRelevant certifications such as Beyond Trust Certified Engineer (BTCE), Certified Information Qualifications 15 years full time education

Posted 1 month ago

Apply

3 - 8 years

5 - 10 Lacs

Nagpur

Work from Office

Naukri logo

Project Role : Application Support Engineer Project Role Description : Act as software detectives, provide a dynamic service identifying and solving issues within multiple components of critical business systems. Must have skills : Microsoft Endpoint Configuration Manager Good to have skills : Microsoft Azure IaaS Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Support Engineer, you will act as software detectives, providing a dynamic service identifying and solving issues within multiple components of critical business systems. Your day will involve troubleshooting and resolving software-related issues to ensure seamless operations. Roles & Responsibilities: Expected to perform independently and become an SME. Required active participation/contribution in team discussions. Contribute in providing solutions to work-related problems. Proactively identify and resolve software-related issues. Collaborate with cross-functional teams to troubleshoot and resolve system problems. Develop and maintain documentation for troubleshooting procedures. Participate in software testing and quality assurance processes. Provide training and support to end-users on software applications. Professional & Technical Skills: Must To Have Skills:Proficiency in Microsoft Endpoint Configuration Manager. Good To Have Skills:Experience with Microsoft Azure IaaS. Strong understanding of software troubleshooting methodologies. Knowledge of ITIL framework and incident management processes. Experience in scripting languages for automation tasks. Additional Information: The candidate should have a minimum of 3 years of experience in Microsoft Endpoint Configuration Manager. This position is based at our Nagpur office. A 15 years full-time education is required. Qualifications 15 years full time education

Posted 1 month ago

Apply

6 - 10 years

10 - 15 Lacs

Pune, Mumbai (All Areas)

Work from Office

Naukri logo

Hi, We are hiring for Leading ITES Company for Aggregate Report Writer Profile. Please Apply, We shall call back relevant profiles. Role & responsibilities: Minimum 2 - 3 years of medical writing work experience including 1 to 2 years of experience in periodic aggregate safety report writing (i.e. PBRER, PSUR, DSUR etc.) To perform all pre-DLP activities and planning for all assigned reports as per client instructions and timelines including the conducting of strategy meeting, kick-off meetings and other ad hoc report related meetings. Performs activities related to the preparation, writing and review of safety portions of Periodic Aggregate Safety Reports (PBRER, DSUR etc.). To perform compilation of all global and country specific periodic aggregate safety reports assigned by the supervisor. To perform peer review of the assigned periodic safety report and complete the corresponding QC checklists within the assigned timeline. To track and drive the progress of safety periodic reports as per the client defined timelines. To ensure compliance to SOPs (client e-manuals and training modules) and other process related documentation. To Apply WhatsApp 'Hi' @ 9151555419 and Follow the Steps Below: a) For Position in Mumbai Search : PV Aggregate Mumbai (Job Code # 54) b) For Position in Pune Search : PV Aggregate Pune (Job Code # 55)

Posted 1 month ago

Apply

8 - 13 years

35 - 40 Lacs

Mumbai

Work from Office

Naukri logo

DEPARTMENT Information Security REPORTING POSITION CISO KEY RESPONSIBILITIES Security Engineering: Experience in review and /or implementation of technology components like networks, Infrastructure, security solutions like DLP, AD, end point security tools, Email Security, mobile device Security, proxy, firewall etc. Review effectiveness of IT architecture, Data and User Security Controls, Cloud Security Assessment, Cryptography Controls, and other System Security Practices. Conduct POCs for new Security Solutions, implementation of new Security Practices / Processes / Controls across organization, work closely with security partners and MSS vendors on day to day basis, and communicate updates Should have good knowledge of various platforms / technologies and security controls (e.g. Firewall, proxy, load balancer, database, DLP, DRM, domain controllers, System Hardening, System Security Practices, Access Controls, Secure SDLC, Application Security etc.) Conduct Review of all projects (e.g. new applications, system integration, secure architecture, confidential data requests, risk assessment etc.) Security Operations Center (SOC) and Threat Intel : The role will include complete governance and oversight on SOC processes, overseeing testing Should understand of data protection techniques like encryption, vaulting, security in transit and at rest. Analysing Security Advisories, identifying actionable with stakeholders & tracking closure. Track vulnerabilities in the environment for remediation within timelines and ensure timely management reporting of all information security risks. Involvement in SOC governance, to make sure all reported incident, advisories are actioned as per recommendations, review various reports, alerts generated by SOC Regulatory Compliance : Should have good knowledge of Indian IT laws, global security frameworks & regulatory requirements from IRDAI, RBI, SEBI etc. Engage in Information security strategy and governance, risk and compliance, cyber resilience, information security transformation and co-sourcing, application and network security engagements. Ensure Team is always audit / compliance ready, and support the internal / external audits. REQUIRED QUALIFICATION AND SKILLS Educational Qualifications: Graduate, Post Graduate Work Experience: 7+ Years of relevant experience in IT and Information Security Certifications: CISA, CISSP, CEH, ISO27001, BCMS, any security specific certificate will be added advantage .

Posted 1 month ago

Apply

5 - 10 years

5 - 6 Lacs

Sanand, Ahmedabad, Changodar

Work from Office

Naukri logo

MBA - HR / MSW / SHRM / DLP with 5 to 7 years experience in HR Department in Manufacturing Industry. Have experience as HR Generalist in Engineering / Manufacturing Industry. Knowledge about Documentation, ERP, Government Grievance, Admin Work. Required Candidate profile Responsible for Recruitment Process, Attendance, Compliance, Salary & Wages Management, Monthly PMS, Contract Management, Culture Building, HR Budget, Staff transportation, Admin, Housekeeping, etc. Perks and benefits Negotiable - Depending Upon Candidate & Experience

Posted 1 month ago

Apply

2 - 4 years

1 - 4 Lacs

Hyderabad

Work from Office

Naukri logo

Responsibilities Develop and implement data loss prevention strategies, policies, and procedures to protect sensitive data from unauthorized access, disclosure, or loss. Collaborate with cross-functional teams to identify potential vulnerabilities, risks, and gaps in existing data protection measures, and provide recommendations for improvement. Design, configure, DLP solutions and tools to monitor, detect, and prevent data breaches or leaks across various platforms and endpoints. Conduct regular assessments and audits to evaluate the effectiveness of data loss prevention controls and ensure compliance with applicable regulations and industry standards. Collaborate with internal stakeholders to raise awareness and educate employees on data protection best practices, policies, and procedures. Stay updated on emerging threats, trends, and technologies in the field of data security and loss prevention and provide recommendations for proactive measures. Participate in the evaluation, selection, and implementation of new data protection technologies and tools. Prepare comprehensive reports and presentations for management, highlighting key findings, recommendations, and metrics related to data loss prevention initiatives. Prepare and maintain Standard Operating Procedures (SOPs) related to DLP, ensuring they are up to date and accessible to all relevant stakeholders. Develop and maintain the Responsibility Assignment Matrix (RACI) to clearly define roles and responsibilities for DLP initiatives, including incident response, policy enforcement, and employee training. Skills Strong understanding of data security concepts, regulatory requirements (e.g., GDPR, HIPAA), and industry best practices. Experience in designing and implementing data loss prevention strategies, policies and procedures in a corporate environment. Proficient in configuring and managing DLP technologies such as data classification data discovery, data loss monitoring, and incident response. Familiarity with network protocols, security technologies (e.g., firewalls, intrusion detection systems), and encryption methods. Knowledge of endpoint security solutions, including endpoint data loss prevention (DLP) agents and data encryption. Strong analytical and problem-solving skills, with the ability to investigate and resolve complex security incidents and issues. Excellent communication and interpersonal skills, with the ability to effectively collaborate with cross-functional teams and present findings to both technical and non-technical stakeholders. Self-motivated and proactive, with the ability to work independently and manage multiple projects simultaneously.

Posted 1 month ago

Apply

5 - 10 years

7 - 17 Lacs

Noida

Work from Office

Naukri logo

Lead Consultant (Cyber Security) Job Summary: The Lead consultant for Cyber Security (B2B SOC MSS) provides the advance level of support for Product Implementation & Services in the Security Operations. In this position, the consultant will be to lead the project (technical) consultants team for successful migration/ implementation of the Cyber Security Products (and Services). Mini. 5-10 years of experience implementation & operations. The resource should have implemented at least 4-5 projects in customer environment. Should be able to create HLD & LLD documents and should be able to draw architecture as per customer need Working Knowledge of SOC/ SIEM tools and operational understanding Must have lead team of Security Consultants/ Analysts Should have sound knowledge of products & should be able to carry out the POCs, Implementation and Operations support Should lead the delivery of multiple projects at customer locations Should have knowledge of following products (with Operations and Implementation) DLP/ Proxy Forcepoint, Symantec, Cisco, McAfee Email Security – Symantec, Forcepoint, Cisco NAC Solutions – Cisco ISE, Forcescout EDR/ XDR Solution – Trend Micro, Crowdstrike SOC SIEM Solution (Arcsight, Qradar, RSA or Seceon) ( Must have hands-on experience from any two of above) Product certification from any of the above products will be added advantage Must be able to execute strategic and tactical direction for solutions offerings Experience in supporting a multiple customer base systems and network environments Provides timely and adequate response to threats/alerts, including off-hour support. Develop functional specifications for integrating/ adopting requirements into enterprise target state architecture or specific application Collaborate with business groups to help them to identify, classify, and secure high value data Provide feedback via periodic reports based on rule parameters; Ability to write regular expressions Ability to self- direct and work independently when necessary, and clearly articulate technical concepts/ issues to both technical and non- technical peers and management The ability to assess security events to drive to a resolution. Demonstrate Understand Critical Data Types such as PII, NPI, PCI, HIPAA, etc Demonstrate Understanding of Mass Storage, USB, Removable Media, for example allow charge but do not allow data copy Excellent English communication skills mandatory Excellent documentation skills mandatory Understand reporting capabilities Required Technical Expertise Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host based firewalls, Anti-Malware, HIDS General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows NT Good to have industry certifications on SIEM Platform, CCNA, CEH, MCSE & Others Bachelor’s Degree in Computer Science or equivalent required 5-10 years’ experience in IT security Good communication skills Strong level of customer service required

Posted 1 month ago

Apply

7 - 12 years

15 - 22 Lacs

Pune

Work from Office

Naukri logo

For Soc L3-Position: 7Yrs+ hands on Exp. Ready to work for Rotational shifts.(24*7), Team management & Shift roaster Location: Pune Roles and Responsibilities Key Skills: 1.SIEM tool exp-preferably Arc sight. 2. Log Analysis 3.Incident Response 4.DLP experience 5.Investigation Knowledge 6.Rules creation 7.Alert management. 8.Use case Creation 9.Team management 10.Shift Roaster 11.Monthly reports Key Responsibilities To handle the daily monitoring of information security events. To function as an intrusion analyst by examining security events for context, appropriateness and criticality To act as an information security researcher to provide insight and understanding of new and existing information security threats Key Operational Activities Daily checklists and tasks Log analysis and review Vulnerability management activities Alert analysis Investigation of suspicious security event activity Maintain and enforce adherence to corporate standards, policies and procedures Please share your profile to anwar.shaik@locuz.com

Posted 1 month ago

Apply

6 - 10 years

10 - 15 Lacs

Pune, Mumbai (All Areas)

Work from Office

Naukri logo

Hi, We are hiring for Leading ITES Company for Aggregate Report Writer Profile. Please Apply, We shall call back relevant profiles. Role & responsibilities: Minimum 2 - 3 years of medical writing work experience including 1 to 2 years of experience in periodic aggregate safety report writing (i.e. PBRER, PSUR, DSUR etc.) To perform all pre-DLP activities and planning for all assigned reports as per client instructions and timelines including the conducting of strategy meeting, kick-off meetings and other ad hoc report related meetings. Performs activities related to the preparation, writing and review of safety portions of Periodic Aggregate Safety Reports (PBRER, DSUR etc.). To perform compilation of all global and country specific periodic aggregate safety reports assigned by the supervisor. To perform peer review of the assigned periodic safety report and complete the corresponding QC checklists within the assigned timeline. To track and drive the progress of safety periodic reports as per the client defined timelines. To ensure compliance to SOPs (client e-manuals and training modules) and other process related documentation. To Apply WhatsApp 'Hi' @ 9151555419 and Follow the Steps Below: a) For Position in Mumbai Search : PV Aggregate Mumbai (Job Code # 54) b) For Position in Pune Search : PV Aggregate Pune (Job Code # 55)

Posted 1 month ago

Apply

4 - 8 years

9 - 14 Lacs

Thane, Navi Mumbai, Mumbai (All Areas)

Work from Office

Naukri logo

Job Description - Security Engineer 48 years of experience in designing, planning, and implementing enterprise security solutions Proficient in cloud platforms: Azure, AWS, and GCP Skilled in network security tools: routing, switching, NGFW, WAF, ALB, etc. Experienced in native cloud security features and tools across all major platforms Strong knowledge in designing and deploying security architecture aligned with the risks across prevent, detect, respond, and predict domains Broad understanding of IT infrastructure, applications, databases, and networking Familiar with frameworks and best practices: ISO 27001, PCI-DSS, OWASP, SANS, etc. Well-versed in security technologies: NGFW, WAF, IDAM, DLP, VPN, MDM, 2FA, PIM, NAC, sandboxing, FIM, etc. Sound knowledge of emerging technologies in security: machine learning, analytics, blockchain, etc. Strong analytical thinking and excellent communication skills Deliverables Support planning, strategy, and implementation of new solutions with cross-functional teams Contribute to evaluation, design, and architecture of innovative security solutions Lead execution of evaluations and related tasks end-to-end Continuously enhance existing controls or propose alternatives for better security and efficiency Ensure project execution within defined timelines and scope Manage complete project lifecycle: initiation, planning, execution, monitoring, and closure Coordinate with implementation teams to ensure smooth rollout of solutions and controls Transition projects to operations with proper documentation and handover Provide post-implementation support and handle escalations effectively. Please share your updated cv on Avani.Vibhute@rigvedtech.com

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies