Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
1.0 - 6.0 years
4 - 8 Lacs
noida
Work from Office
Level: L1+L2+L3 Mailbox Rights management EOP-rule creationsAllow/Block domains Exchange health checkup Office E5 service management MS Teams Collaboration O365 Email Ediscovery DL Modifying.Adhering tthe E Mail Policy as defined SOP by the ClientMonitor the Replication of Directory Monitoring Exchange ServicesIncident and Request fulfilment Management Exchange online administration & troubleshooting Mailbox Rights management EOP-rule creationsAllow/Block domains Exchange health checkupOffice E5 service management MS Teams Collaboration O365 Email EdiscoveryImplementation of Mail Aging Policy E Mail Policy as defined by the ClientPublic Folder Maintenance (Defining Hierarchy) Monitoring Mail Queue and Mail Traffic.Monitor the Replication of Public Folders Monitor the Replication of Directory Monitoring Log Files Recycling of Exchange Services in case of any issuesQueue Clearing in case of any issues Exchange Database Replication Management Analysing Log Files in case of any issuesTroubleshooting on exchange mail flowExchange Patching and updates Necessary support for restoration or drillPreparation of MIR for Major Incidents Review of daily/weekly/monthly checklist Performing routine maintenance tasks such as mailbox cleanup, database maintenance, and server restarts as needed.Responding to user-reported issues related to email access, sending/receiving emails, and mailbox size limitations. Troubleshooting common email problems such as delivery delays, spam filtering issues, and email synchronization errors.Escalating more complex issues to higher-level support teams or Microsoft support if necessary Repeat Incident Alert Analysis Reinstallations raised due to incidentsIncident Request fulfilment Change management Managing Exchange Cluster/DAG Preparation of Root Cause Analysis Exchange Rollup and Service Packs Repeat Incident Alert Analysis Performance tuning suggest by OEM Update and maintenance of Availability, Capacity management. Continual Service Improvement Planning and executions Planning and execution of DR Drills based on availability of DR setup and recovery procedures (Applicable if the DR is in scope) Preparing, maintaining and Update of SOP and KBaseMaintaining and Update of Infra AS IS Infra Documents Integrating Exchange Online with other Office 365 services such as SharePoint Online, Microsoft Teams, and OneDrive for Business. Configuring mail flow connectors with external partners or third-party services.Collaborating with other IT teams to ensure seamless integration with other systems and servicesEmail Teams edsicovery and export data Tools and Technology Microsoft Office 365 (Outlook, SharePoint, Teams, Intune, OneDrive, Office ) SMTP Relay Email Security Certification Microsoft 365 Certified: Fundamentals
Posted 18 hours ago
1.0 - 6.0 years
4 - 8 Lacs
mumbai
Work from Office
Level: L1+L2+L3 Mailbox Rights management EOP-rule creationsAllow/Block domains Exchange health checkup Office E5 service management MS Teams Collaboration O365 Email Ediscovery DL Modifying.Adhering tthe E Mail Policy as defined SOP by the ClientMonitor the Replication of Directory Monitoring Exchange ServicesIncident and Request fulfilment Management Exchange online administration & troubleshooting Mailbox Rights management EOP-rule creationsAllow/Block domains Exchange health checkupOffice E5 service management MS Teams Collaboration O365 Email EdiscoveryImplementation of Mail Aging Policy E Mail Policy as defined by the ClientPublic Folder Maintenance (Defining Hierarchy) Monitoring Mail Queue and Mail Traffic.Monitor the Replication of Public Folders Monitor the Replication of Directory Monitoring Log Files Recycling of Exchange Services in case of any issuesQueue Clearing in case of any issues Exchange Database Replication Management Analysing Log Files in case of any issuesTroubleshooting on exchange mail flowExchange Patching and updates Necessary support for restoration or drillPreparation of MIR for Major Incidents Review of daily/weekly/monthly checklist Performing routine maintenance tasks such as mailbox cleanup, database maintenance, and server restarts as needed.Responding to user-reported issues related to email access, sending/receiving emails, and mailbox size limitations. Troubleshooting common email problems such as delivery delays, spam filtering issues, and email synchronization errors.Escalating more complex issues to higher-level support teams or Microsoft support if necessary Repeat Incident Alert Analysis Reinstallations raised due to incidentsIncident Request fulfilment Change management Managing Exchange Cluster/DAG Preparation of Root Cause Analysis Exchange Rollup and Service Packs Repeat Incident Alert Analysis Performance tuning suggest by OEM Update and maintenance of Availability, Capacity management. Continual Service Improvement Planning and executions Planning and execution of DR Drills based on availability of DR setup and recovery procedures (Applicable if the DR is in scope) Preparing, maintaining and Update of SOP and KBaseMaintaining and Update of Infra AS IS Infra Documents Integrating Exchange Online with other Office 365 services such as SharePoint Online, Microsoft Teams, and OneDrive for Business. Configuring mail flow connectors with external partners or third-party services.Collaborating with other IT teams to ensure seamless integration with other systems and servicesEmail Teams edsicovery and export data Tools and Technology Microsoft Office 365 (Outlook, SharePoint, Teams, Intune, OneDrive, Office ) SMTP Relay Email Security Certification Microsoft 365 Certified: Fundamentals
Posted 18 hours ago
1.0 - 6.0 years
4 - 8 Lacs
pune
Work from Office
Level: L1+L2+L3 Mailbox Rights management EOP-rule creationsAllow/Block domains Exchange health checkup Office E5 service management MS Teams Collaboration O365 Email Ediscovery DL Modifying.Adhering tthe E Mail Policy as defined SOP by the ClientMonitor the Replication of Directory Monitoring Exchange ServicesIncident and Request fulfilment Management Exchange online administration & troubleshooting Mailbox Rights management EOP-rule creationsAllow/Block domains Exchange health checkupOffice E5 service management MS Teams Collaboration O365 Email EdiscoveryImplementation of Mail Aging Policy E Mail Policy as defined by the ClientPublic Folder Maintenance (Defining Hierarchy) Monitoring Mail Queue and Mail Traffic.Monitor the Replication of Public Folders Monitor the Replication of Directory Monitoring Log Files Recycling of Exchange Services in case of any issuesQueue Clearing in case of any issues Exchange Database Replication Management Analysing Log Files in case of any issuesTroubleshooting on exchange mail flowExchange Patching and updates Necessary support for restoration or drillPreparation of MIR for Major Incidents Review of daily/weekly/monthly checklist Performing routine maintenance tasks such as mailbox cleanup, database maintenance, and server restarts as needed.Responding to user-reported issues related to email access, sending/receiving emails, and mailbox size limitations. Troubleshooting common email problems such as delivery delays, spam filtering issues, and email synchronization errors.Escalating more complex issues to higher-level support teams or Microsoft support if necessary Repeat Incident Alert Analysis Reinstallations raised due to incidentsIncident Request fulfilment Change management Managing Exchange Cluster/DAG Preparation of Root Cause Analysis Exchange Rollup and Service Packs Repeat Incident Alert Analysis Performance tuning suggest by OEM Update and maintenance of Availability, Capacity management. Continual Service Improvement Planning and executions Planning and execution of DR Drills based on availability of DR setup and recovery procedures (Applicable if the DR is in scope) Preparing, maintaining and Update of SOP and KBaseMaintaining and Update of Infra AS IS Infra Documents Integrating Exchange Online with other Office 365 services such as SharePoint Online, Microsoft Teams, and OneDrive for Business. Configuring mail flow connectors with external partners or third-party services.Collaborating with other IT teams to ensure seamless integration with other systems and servicesEmail Teams edsicovery and export data Tools and Technology Microsoft Office 365 (Outlook, SharePoint, Teams, Intune, OneDrive, Office ) SMTP Relay Email Security Certification Microsoft 365 Certified: Fundamentals
Posted 18 hours ago
1.0 - 6.0 years
4 - 8 Lacs
gurugram
Work from Office
Level: L1+L2+L3 Mailbox Rights management EOP-rule creationsAllow/Block domains Exchange health checkup Office E5 service management MS Teams Collaboration O365 Email Ediscovery DL Modifying.Adhering tthe E Mail Policy as defined SOP by the ClientMonitor the Replication of Directory Monitoring Exchange ServicesIncident and Request fulfilment Management Exchange online administration & troubleshooting Mailbox Rights management EOP-rule creationsAllow/Block domains Exchange health checkupOffice E5 service management MS Teams Collaboration O365 Email EdiscoveryImplementation of Mail Aging Policy E Mail Policy as defined by the ClientPublic Folder Maintenance (Defining Hierarchy) Monitoring Mail Queue and Mail Traffic.Monitor the Replication of Public Folders Monitor the Replication of Directory Monitoring Log Files Recycling of Exchange Services in case of any issuesQueue Clearing in case of any issues Exchange Database Replication Management Analysing Log Files in case of any issuesTroubleshooting on exchange mail flowExchange Patching and updates Necessary support for restoration or drillPreparation of MIR for Major Incidents Review of daily/weekly/monthly checklist Performing routine maintenance tasks such as mailbox cleanup, database maintenance, and server restarts as needed.Responding to user-reported issues related to email access, sending/receiving emails, and mailbox size limitations. Troubleshooting common email problems such as delivery delays, spam filtering issues, and email synchronization errors.Escalating more complex issues to higher-level support teams or Microsoft support if necessary Repeat Incident Alert Analysis Reinstallations raised due to incidentsIncident Request fulfilment Change management Managing Exchange Cluster/DAG Preparation of Root Cause Analysis Exchange Rollup and Service Packs Repeat Incident Alert Analysis Performance tuning suggest by OEM Update and maintenance of Availability, Capacity management. Continual Service Improvement Planning and executions Planning and execution of DR Drills based on availability of DR setup and recovery procedures (Applicable if the DR is in scope) Preparing, maintaining and Update of SOP and KBaseMaintaining and Update of Infra AS IS Infra Documents Integrating Exchange Online with other Office 365 services such as SharePoint Online, Microsoft Teams, and OneDrive for Business. Configuring mail flow connectors with external partners or third-party services.Collaborating with other IT teams to ensure seamless integration with other systems and servicesEmail Teams edsicovery and export data Tools and Technology Microsoft Office 365 (Outlook, SharePoint, Teams, Intune, OneDrive, Office ) SMTP Relay Email Security Certification Microsoft 365 Certified: Fundamentals
Posted 18 hours ago
1.0 - 6.0 years
4 - 8 Lacs
bengaluru
Work from Office
Level: L1+L2+L3 Mailbox Rights management EOP-rule creationsAllow/Block domains Exchange health checkup Office E5 service management MS Teams Collaboration O365 Email Ediscovery DL Modifying.Adhering tthe E Mail Policy as defined SOP by the ClientMonitor the Replication of Directory Monitoring Exchange ServicesIncident and Request fulfilment Management Exchange online administration & troubleshooting Mailbox Rights management EOP-rule creationsAllow/Block domains Exchange health checkupOffice E5 service management MS Teams Collaboration O365 Email EdiscoveryImplementation of Mail Aging Policy E Mail Policy as defined by the ClientPublic Folder Maintenance (Defining Hierarchy) Monitoring Mail Queue and Mail Traffic.Monitor the Replication of Public Folders Monitor the Replication of Directory Monitoring Log Files Recycling of Exchange Services in case of any issuesQueue Clearing in case of any issues Exchange Database Replication Management Analysing Log Files in case of any issuesTroubleshooting on exchange mail flowExchange Patching and updates Necessary support for restoration or drillPreparation of MIR for Major Incidents Review of daily/weekly/monthly checklist Performing routine maintenance tasks such as mailbox cleanup, database maintenance, and server restarts as needed.Responding to user-reported issues related to email access, sending/receiving emails, and mailbox size limitations. Troubleshooting common email problems such as delivery delays, spam filtering issues, and email synchronization errors.Escalating more complex issues to higher-level support teams or Microsoft support if necessary Repeat Incident Alert Analysis Reinstallations raised due to incidentsIncident Request fulfilment Change management Managing Exchange Cluster/DAG Preparation of Root Cause Analysis Exchange Rollup and Service Packs Repeat Incident Alert Analysis Performance tuning suggest by OEM Update and maintenance of Availability, Capacity management. Continual Service Improvement Planning and executions Planning and execution of DR Drills based on availability of DR setup and recovery procedures (Applicable if the DR is in scope) Preparing, maintaining and Update of SOP and KBaseMaintaining and Update of Infra AS IS Infra Documents Integrating Exchange Online with other Office 365 services such as SharePoint Online, Microsoft Teams, and OneDrive for Business. Configuring mail flow connectors with external partners or third-party services.Collaborating with other IT teams to ensure seamless integration with other systems and servicesEmail Teams edsicovery and export data Tools and Technology Microsoft Office 365 (Outlook, SharePoint, Teams, Intune, OneDrive, Office ) SMTP Relay Email Security Certification Microsoft 365 Certified: Fundamentals
Posted 18 hours ago
8.0 - 13.0 years
20 - 30 Lacs
hyderabad
Work from Office
Greetings from TechProjects!! Tech Projects India operates and manages the Global Capability Center (GCC) for C&S Wholesale Grocers, a leading grocery supply chain company in the U.S. A ( A 20 Billion Dollar +) . Our GCC drives innovation and operational excellence, supporting C&Ss business functions. Join us and be part of a dynamic team shaping the future of Retail and wholesale supply chain cutting edge technology operations. We provide Excellent benefits! Please find the job description for your reference: Work Details: Location: Orbit, 2nd Floor, Knowledge City, Raidurg, Hyderabad. Shift timings: 3:30pm IST- 12:00 am IST Notice Period: Immediate to 3 weeks Job Role – Google Workspace Administrator Experience: 8 – 10 Years Shift Timings: Standard shift from 3:30 PM IST to 12:30 AM IST . Location: Orbit, 2nd Floor, Knowledge City, Raidurg, Hyderabad. Cab Facility for Men: One-way cab service is provided for employees working until midnight or later. Cab Facility for Women : One-way cab service is provided for employees who work till 10.00 PM IST. Job Summary: We are seeking a skilled and experienced Google Workspace Administrator to manage, optimize, and secure our Google Workspace environment. The ideal candidate will have 2–3 years of experience in Google Workspace administration, troubleshooting, and support, along with a Google Workspace Administrator Certification as a mandatory requirement. Key Responsibilities: Administer and manage Google Workspace (formerly G Suite) applications, including Gmail, Drive, Docs, Sheets, Meet, Calendar, and Groups. Configure and maintain user accounts, roles, groups, and access permissions using Google Admin Console. Monitor system performance, security, and compliance with company policies. Implement and enforce security best practices, including 2-Step Verification, SSO, and DLP policies. Provide technical support for end-users and resolve Google Workspace-related issues efficiently. Manage and optimize Google Workspace licenses and subscriptions. Automate administrative tasks using Google Apps Script or APIs. Monitor Google Workspace logs and alerts to detect and resolve security vulnerabilities. Ensure seamless integration of third-party applications and services with Google Workspace. Document standard operating procedures, troubleshooting guides, and best practices. Stay updated with Google Workspace updates, new features, and industry best practices. Knowledge of Google Cloud Directory Sync [GCDS] and Global Access Management [GAM] Required Skills & Qualifications: Google Workspace Administrator Certification (Mandatory). 2–3 years of hands-on experience managing Google Workspace in a corporate environment. Proficiency in Google Admin Console, security settings, and policy management. Experience with Google Vault, Mobile Device Management (MDM), and security configurations. Basic scripting knowledge using Google Apps Script, Python, or PowerShell (Preferred). Strong troubleshooting skills and experience with DNS, MX records, and email security (SPF, DKIM, DMARC). Familiarity with cloud-based identity and access management (IAM). Strong communication and problem-solving skills with the ability to work independently. Preferred Qualifications: Experience with Google Cloud Platform (GCP) and Google Workspace APIs. Familiarity with ITSM tools like ServiceNow, Jira, or Fresh service. Knowledge of compliance standards such as ISO 27001, GDPR, and HIPAA. Experience working in a hybrid cloud environment. What We Offer Competitive salary & equity Career growth opportunities in a fast-paced environment Exposure to modern tech stacks and scalable product architecture.
Posted 18 hours ago
3.0 - 8.0 years
9 - 18 Lacs
hyderabad, pune, bengaluru
Hybrid
Role & responsibilities We are looking for Email Security Analyst to strengthen our defenses against evolving email threats and ensure rapid effective incident response Key Responsibilities Monitor and analyze email traffic to identify potential threats and ensure optimal filtering accuracy Investigate and respond to emailrelated security incidents coordinating with internal teams to ensure swift resolution Handle escalations from support teams and customers providing expert guidance and actionable insights Develop and refine detection mechanisms using existing tools to address gaps in threat coverage Collaborate with crossfunctional teams to ensure consistent communication and alignment during incident investigations Maintain detailed documentation of incidents investigations and resolutions to support continuous improvement and knowledge sharing Qualifications Minimum 3 years of experience in email or webbased security incident investigation and response At least 2 years of experience working with large datasets and performing data analysis Proficiency in crafting detection rules using Regular Expressions familiarity with YARA is a plus Deep understanding of email protocols headers and analysis tools especially within O365 environments Experience in handling customer escalations and delivering clear investigative reports Strong grasp of the email threat landscape and emerging attack vectors Familiarity with Kusto Query Language KQL for threat hunting and data analysis Ability to interpret data and present findings in a clear insightful manner Strong communication skills both written and verbal with fluency in English Willingness to participate in a global oncall rotations 247 Shifts Skills Preferred candidate profile
Posted 23 hours ago
7.0 - 9.0 years
1 - 5 Lacs
bengaluru
Work from Office
We are currently seeking a Security Analyst-WAF operation and EMail security to join our team in Bangalore, Karntaka (IN-KA), India (IN). The Role - Principal Cybersecurity Edge Security OpsThe job involves performing functions related to Network and Perimeter specialized Security Engineers including Web Application Firewall, Email Security, , Network and cloud security Cyber Incident Response. Looking for an energetic, hard charging individual able to keep up in an exciting and fast-moving security operations team that is engaged in several high-profile security projects to enhance security posture. The candidate will be immersed in a quick changing environment in a very rapid changing threat landscape, working with numerous security professionals. The qualified candidate must be adaptable and able to work in a fast-paced environment where learning new skills and understanding new system architectures quickly is a key to success. The Team- The Principal Cybersecurity Analyst will be working on external defense team to ensure indications of compromise are promptly identified and stakeholders are informed with actionable and complete information. This role will assist and coordinate with incident response staff, threat intelligence, vulnerability management, and perimeter security teams during response activities and cyber investigations. This position works closely with our ISO for each Business Unit and directly with internal and external customers. The Expertise You HaveTechnical: Perimeter and cloud security Expert with an outstanding understanding of the latest practices and trends in edge security. Strong experience in Web application firewall and API Security. Good exposure to how to proactively combat OWASP top 10, Account take over , API and other bot external attacks . Evaluate, deploying and managing Akamai / AWS / Azure Web Application Firewall security configuration. Good knowledge of Email Security (EOP), Email Security Network IDS/IPS, WAF, DDoS Control and Cloud Security. Advance experience on Splunk or other SIEM (Security information and event management) Monitoring. Log Analysis Expertise - Web logs, NetFlow and Packet Analysis Analyzing web traffic patterns to improve protections. Reviewing policy enforcement change requests; interviewing submitters who have requested security configuration changes and require additional requirements gathering. Knowledge of Agile, DevSecOps, Open Source and a programming language is of substantial advantage Manage Cyber Incidents and other service incidents for WAF and other security technologies. Behavioral - Positive personality and can-do attitude; you also have good communication skills with an excellent command of the English language. Open-minded, empathic and a team-mate with a partnering approach and an enthusiastic and motivated personality, with demonstrated experience in solving complex challenges Intellectually curious and therefore remain abreast of new technologies and developments relating to technical products that might be used enterprise wide and software delivery methodologies Proficient in balancing business partner views and interests Team player with excellent interpersonal & communication skills (written and verbal) Senior technical and non-technical Stake holder management skills The Skills You Bring 7 to 9 years of security experience desired, preferably in a matrix-driven corporate environment. Mandatory is WAF Operations and E Mail Security is Secondary. Security experience with any WAF provider, API definitions, custom rules, writing bot management rules and analyzing traffic logs. Proven experience troubleshooting and simulating HTTP client requests (e.g., curl, postman, HAR file analysis). Strong understanding of core networking concepts (e.g. TCP/IP, DNS, HTTP, proxy, load-balancing, etc.). Functional experience with Splunk, SIEM, or other log aggregation & analysis technologies. Experience with cloud solutions such as AWS or other IaaS/PaaS/SaaS environments. Ability to interact with both technical and non-technical staff, including management and executives, with experience articulating technical material in business terms. Functional understanding of network controls and policies to stop cyber threats. Familiarity with external facing security controls that can stop external attacks that may occur: such as WAF tuning, Bot management, API protection, network policy governance, troubleshooting, and incident response. Familiarity with criminal activities and the attacks that may occur in each layer of the OSI model. Ability to make information security risk determinations based on intelligence analysis. Understanding cyber threats, malicious cyber threat actor motivations, and capabilities relevant to regions of interest. Shift timings Weekend Shift Weekdays : Between 8AM to 11PM Minimum Experience on Key Skills- 6-9 Years General Expectation1) Must have Good Communication 2) Must be ready to work in 10:30 AM to 8:30 PM Shift3) Flexible to work in Client Location GV, Manyata or EGL, Bangalore4) Must be ready to work from office in a Hybrid work environment. Full Remote work is not an option5)
Posted 23 hours ago
7.0 - 11.0 years
0 Lacs
maharashtra
On-site
Role Overview: Join our dynamic and growing team in Internal Audit and get an opportunity to work with multiple lines of business. As a Cybersecurity and Technology Controls (CTC) Audit Vice President in the Internal Audit team, you will be responsible for assisting with ongoing risk assessment, control identification, audit execution, and continuous monitoring activities across the firmwide cybersecurity functions. This position is ideal for individuals with knowledge of various cybersecurity functions and audit skills required to effectively lead global cybersecurity audits. You will report locally to the Audit Director/Manager in India and functionally to the Audit Director onshore, based in Mumbai, India. Key Responsibilities: - Lead, execute global cybersecurity audit engagements, including risk assessments, audit planning, audit testing, control evaluation, audit report drafting, and follow-up on issue closure. - Accountable for meeting deliverable deadlines, adhering to department and professional standards, and utilizing consistent methodology. - Communicate audit findings to management, identify improvement opportunities in key controls, and establish relationships with senior cybersecurity team stakeholders. - Work closely with global Audit colleagues to identify emerging control issues and report them timely to Audit management and business stakeholders. - Recognize the confidential nature of Internal Audit communications and exercise discipline in protecting the confidentiality and security of information. - Partner with stakeholders, business management, control groups, external auditors, and regulators, maintaining independence and establishing strong working relationships. - Finalize audit findings, provide an overall opinion on the control environment, develop recommendations to strengthen internal controls, and implement an effective program of continuous auditing. - Manage teams effectively, perform timely reviews of work, provide feedback, stay updated with industry/regulatory changes, and participate in appropriate control forums. Qualifications Required: - Minimum 7 years of relevant cybersecurity experience in internal/external auditing. - Experience with core cybersecurity operations and one or more cyber security tools/process areas. - Bachelor's degree or relevant financial services experience required. - Demonstrated knowledge of technology processes, application and infrastructure controls, and ability to multitask and execute audit activities with minimal supervision. - Strong analytical skills, proficiency in risk analysis and report preparation, ability to lead audits, manage team members, build partnerships, and excellent verbal and written communication skills. - Enthusiastic, self-motivated, effective under pressure, willing to take personal responsibility/accountability. Additional Details: Professional certification (e.g. CISA, CISM, CISSP, CEH, GIAC) or willingness to pursue is preferred.,
Posted 3 days ago
8.0 - 13.0 years
35 - 40 Lacs
mumbai
Work from Office
DEPARTMENT Information Security REPORTING POSITION CISO KEY RESPONSIBILITIES Security Engineering: Experience in review and /or implementation of technology components like networks, Infrastructure, security solutions like DLP, AD, end point security tools, Email Security, mobile device Security, proxy, firewall etc. Review effectiveness of IT architecture, Data and User Security Controls, Cloud Security Assessment, Cryptography Controls, and other System Security Practices. Conduct POCs for new Security Solutions, implementation of new Security Practices / Processes / Controls across organization, work closely with security partners and MSS vendors on day to day basis, and communicate updates Should have good knowledge of various platforms / technologies and security controls (e.g. Firewall, proxy, load balancer, database, DLP, DRM, domain controllers, System Hardening, System Security Practices, Access Controls, Secure SDLC, Application Security etc.) Conduct Review of all projects (e.g. new applications, system integration, secure architecture, confidential data requests, risk assessment etc.) Security Operations Center (SOC) and Threat Intel : The role will include complete governance and oversight on SOC processes, overseeing testing Should understand of data protection techniques like encryption, vaulting, security in transit and at rest. Analysing Security Advisories, identifying actionable with stakeholders & tracking closure. Track vulnerabilities in the environment for remediation within timelines and ensure timely management reporting of all information security risks. Involvement in SOC governance, to make sure all reported incident, advisories are actioned as per recommendations, review various reports, alerts generated by SOC Regulatory Compliance : Should have good knowledge of Indian IT laws, global security frameworks & regulatory requirements from IRDAI, RBI, SEBI etc. Engage in Information security strategy and governance, risk and compliance, cyber resilience, information security transformation and co-sourcing, application and network security engagements. Ensure Team is always audit / compliance ready, and support the internal / external audits. REQUIRED QUALIFICATION AND SKILLS Educational Qualifications: Graduate, Post Graduate Work Experience: 7+ Years of relevant experience in IT and Information Security Certifications: CISA, CISSP, CEH, ISO27001, BCMS, any security specific certificate will be added advantage .
Posted 3 days ago
3.0 - 7.0 years
3 - 8 Lacs
noida
Work from Office
Deep knowledge of the email stack Have 3+ years of email systems experience: SMTP, POP, DNS, SPF, DKIM, DMARC, RBL, CAN-SPAM Knowledge of email deliverability, IP reputation, blocklists.
Posted 4 days ago
4.0 - 8.0 years
5 - 15 Lacs
chennai
Work from Office
Key Responsibilities: Monitor and analyze email traffic for threats such as phishing, spoofing, malware, and Business Email Compromise (BEC). Oversee the deployment, configuration, and management of email security tools to protect against phishing, spam, malware, and other email-borne threats. Collaborate with the security operations team to analyze email security incidents and implement preventive measures. Implement and manage email security protocols including SPF, DKIM, and DMARC. Configure and maintain email security solutions (e.g., Checkpoint, Forcepoint, O365). Investigate and respond to email-related security incidents and alerts. Perform forensic analysis on suspicious emails and attachments. Maintain and update email filtering rules and policies. Collaborate with SOC and IT teams to ensure email security posture is aligned with overall cybersecurity strategy. Work with cross-functional teams to integrate email security solutions with other security and IT systems. Generate regular reports on email threat trends and incidents. Conduct awareness training for employees on identifying and reporting suspicious emails. Stay updated on emerging email-based threats and recommend proactive measures. Provide technical guidance and support to other team members and stakeholders regarding email security best practices. Required Skills: Strong understanding of email security protocols and technologies, such as SPF, DKIM, DMARC, and email encryption. Hands-on experience with email security platforms and tools (e.g., Checkpoint, Forcepoint, O365). Knowledge of phishing techniques, malware delivery methods, and social engineering. Familiarity with SIEM tools and incident response workflows. Ability to analyze email headers and perform threat hunting. Good communication and documentation skills. Preferred Qualifications: Bachelors degree in computer science, Information Security, or related field. Certifications such as CEH, CompTIA Security+, CISSP, or equivalent. Experience in enterprise environments with high email traffic.
Posted 4 days ago
1.0 - 3.0 years
3 - 4 Lacs
hyderabad
Work from Office
SIEM (Splunk/QRadar/Sentinel) & log analysis Incident response, vulnerability mgmt (Nessus/Rapid7) DLP, email security, ServiceNow/Jira Windows/Linux, basic scripting, AWS/cloud & network basics Required Candidate profile Candidates with 1–3 years SOC experience Good communication & analytical skills
Posted 4 days ago
5.0 - 9.0 years
0 Lacs
pune, maharashtra
On-site
As a Security Engineer at Datwyler, your role involves working closely with third-party suppliers and local teams to constantly search for cyber security gaps and improvements. You will be responsible for representing the security area in all projects, making decisions on possible security solutions, and designing them. Incident, problem, and change request handling will be part of your daily tasks, along with learning and improving the value of Datwyler's security tools. Key Responsibilities: - Collaborate with third-party suppliers and local teams - Continuously identify cyber security gaps and suggest improvements - Lead the security area in projects and make decisions on security solutions - Handle incidents, problems, and change requests - Learn and enhance the value of Datwyler's security tools - Conduct Proof of Concepts (PoC) for various Cyber Security tools - Prepare documentation and user manuals for team members and employees - Evaluate security risks for new applications to be implemented - Participate in penetration tests Qualifications Required: - Minimum of 5 years of hands-on experience in large-scale networks as a security engineer - Security area related certifications such as CISSP, CISM, CEH, or CompTIA Security - Proficiency with security tools and technologies (firewalls, IDS/IPS, VPNs, encryption technologies, cloud security) - Strong knowledge of network protocols, operating systems, and security frameworks - Experience with vulnerability scanning, penetration testing, and risk management - Excellent analytical and problem-solving skills - Strong communication skills to interact with various teams and explain technical security matters to non-technical stakeholders - Strong knowledge in email security At Datwyler, you will experience a diverse and global working environment that offers a broad spectrum of job profiles and career opportunities. The company values ambitious individuals who approach their tasks with dedication and enthusiasm, providing the right environment for personal growth and development. Mutual consideration, respect, trust, and loyalty are at the core of Datwyler's values, ensuring that employees play a crucial role in shaping the company's success.,
Posted 5 days ago
4.0 - 8.0 years
10 - 15 Lacs
bengaluru
Work from Office
SOC Analyst works within the 24/7 Cyber Fusion Center (CFC). The role is responsible for monitoring, triaging, analyzing and escalating incidents and events in the technology environment. This Senior SOC Analyst will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS/IPS, Firewalls, network traffic logs, cloud platforms, and SOAR solutions to analyze events that occur within the environments for the purposes of detecting and mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise SOC Analyst must have skills in email security, system event, network event, log analysis. Knowledge of common IT and security technology concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques is important. Experience conducting event analysis in AWS and Azure environments. Characterize and analyse alerts to understand potential and active threats. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the nature and characteristics of events that could be an observed attack Preferred technical and professional experience Document and escalate events/incidents that may cause adverse impact to the environment. Provide daily summary reports of events and activity relevant to cyber operations. Perform Cyber Operations trend analysis and reporting. Perform high-quality triage and thorough analysis for all alerts. Demonstrate effective communication skills both written and verbal. Actively engage in team chats, calls, and face to face settings. Constantly contribute to SOC runbooks/playbooks Recommend improvements to automations, alert fidelity, and security controls. Preferred ExperienceExperience / Knowledge in CyberArk, Azure SSO. Knowledge of enterprise web technologies, security, and cutting-edge infrastructures
Posted 5 days ago
8.0 - 13.0 years
35 - 40 Lacs
mumbai
Work from Office
DEPARTMENT Information Security REPORTING POSITION CISO KEY RESPONSIBILITIES Security Engineering: Experience in review and /or implementation of technology components like networks, Infrastructure, security solutions like DLP, AD, end point security tools, Email Security, mobile device Security, proxy, firewall etc. Review effectiveness of IT architecture, Data and User Security Controls, Cloud Security Assessment, Cryptography Controls, and other System Security Practices. Conduct POCs for new Security Solutions, implementation of new Security Practices / Processes / Controls across organization, work closely with security partners and MSS vendors on day to day basis, and communicate updates Should have good knowledge of various platforms / technologies and security controls (e.g. Firewall, proxy, load balancer, database, DLP, DRM, domain controllers, System Hardening, System Security Practices, Access Controls, Secure SDLC, Application Security etc.) Conduct Review of all projects (e.g. new applications, system integration, secure architecture, confidential data requests, risk assessment etc.) Security Operations Center (SOC) and Threat Intel : The role will include complete governance and oversight on SOC processes, overseeing testing Should understand of data protection techniques like encryption, vaulting, security in transit and at rest. Analysing Security Advisories, identifying actionable with stakeholders & tracking closure. Track vulnerabilities in the environment for remediation within timelines and ensure timely management reporting of all information security risks. Involvement in SOC governance, to make sure all reported incident, advisories are actioned as per recommendations, review various reports, alerts generated by SOC Regulatory Compliance : Should have good knowledge of Indian IT laws, global security frameworks & regulatory requirements from IRDAI, RBI, SEBI etc. Engage in Information security strategy and governance, risk and compliance, cyber resilience, information security transformation and co-sourcing, application and network security engagements. Ensure Team is always audit / compliance ready, and support the internal / external audits. REQUIRED QUALIFICATION AND SKILLS Educational Qualifications: Graduate, Post Graduate Work Experience: 7+ Years of relevant experience in IT and Information Security Certifications: CISA, CISSP, CEH, ISO27001, BCMS, any security specific certificate will be added advantage .
Posted 5 days ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Proofpoint Email Security . Experience: 5-8 Years . >
Posted 5 days ago
6.0 - 8.0 years
9 - 19 Lacs
bengaluru
Work from Office
Role & responsibilities Office 365 & EMS Services- Experience with O365 implementations ideally across multiple sites and geos Migration experience from Exchange, Google to Office 365 Understand attribute management as it relates to O365 identities such as user objects, O365 Groups, Exchange shared mailboxes, License Management etc Active Directory knowledge Deployment knowledge on Exchange server O365 features deployment knowledge - Good understanding of core and secondary O365 services such as Teams, OneDrive for Business, SharePoint,Planner, To-Do etc Good Communication skills. 2. Microsoft Defender Management Scope a. Microsoft Defender for Endpoint (MDE): Endpoint Protection : Ensuring that Microsoft Defender is deployed across all endpoints (servers, desktops, laptops, etc.) for real-time threat protection. Threat Detection and Response : Configuring policies for threat detection, managing alerts, and responding to incidents. Automated Investigation and Remediation : Setting up automatic responses for detected threats, such as isolating an infected endpoint or blocking a malicious process. Vulnerability Management : Identifying and addressing security vulnerabilities on endpoints, including applying patches and updates. Device Control and Configuration : Managing security configurations, M365/EMS: Understand attribute management as it relates to O365 identities such as user objects, O365 Groups Active Directory knowledge M365 features deployment knowledge Enterprise mobility + security deployment experience Good understanding of Azure and Active Directory in a multi forest/domain infrastructure, including authentication and authorization principles. User account management and troubleshooting Good Communication skills. Preferred candidate profile O365, Exchange, On prem, Active Directory, Defender , Security , Compliance Perks and benefits
Posted 6 days ago
4.0 - 5.0 years
7 - 12 Lacs
barnala
Work from Office
About Trident Group Trident Group is a global leader in textiles and paper with a strong commitment to innovation, sustainability, and operational excellence. As part of our continued digital growth and security initiatives, we are looking for a skilled Cybersecurity Specialist to join our IT Security team. Role Overview The Cybersecurity Specialist will be responsible for operating, monitoring, and maintaining core security tools, ensuring protection of enterprise IT and OT (Operational Technology) environments. The role involves managing day-to-day security operations, responding to incidents, and supporting compliance requirements. Key Responsibilities Operate and maintain security tools including: DLP (Data Loss Prevention) policy enforcement and monitoring IAM/PAM privileged access management and session monitoring EDR/XDR endpoint detection and response Proxy secure web gateway and traffic filtering Email Security phishing defence and advanced threat protection Firewall Audit – as per best security practices Monitor and respond to security alerts/events from Proxy, EDR, DLP, Firewall, and other tools. Perform Vulnerability Assessment and Penetration Testing (VAPT) using tools such as Nessus, OpenVAS, Burp Suite. Ensure compliance with ISO 27001, NIST, GDPR and other standards. Monitor and analyze OT environments (SCADA, PLCs, ICS) for anomalies and threats. Collaborate with SOC and IT teams for incident response and threat management. Develop basic scripts (Python, PowerShell) to automate repetitive security tasks. Maintain documentation, reports, and audit readiness for all security processes. Desired Skills & Qualifications Bachelor’s degree in Computer Science, Information Security, or related field. 4–5 years of hands-on experience in cybersecurity operations or SOC environments. Strong understanding of network security, firewalls, and endpoint protection . Experience with VAPT tools (Nessus, OpenVAS, Burp Suite). Familiarity with OT security monitoring (SCADA/ICS). Knowledge of scripting languages (Python, PowerShell) is an added advantage. Strong analytical, problem-solving, and incident response skills. Excellent communication and documentation abilities. Why Join Us Opportunity to work on cutting-edge security technologies . Exposure to enterprise IT and OT security environments . Be a part of a growing security-first culture in a global organization. Competitive compensation and career development opportunities.
Posted 6 days ago
8.0 - 13.0 years
13 - 17 Lacs
bengaluru
Work from Office
About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Manager You will oversee daily operations of a Security Operations Center (SOC), manage threat detection, response, and coordinate escalations across hybrid environments. The role involves deep hands-on engagement with SIEM, EDR, cloud security platforms, and advanced email security solutions like Proofpoint, IronPort, and Cofense. You will ensure rapid detection, containment, and remediation of security incidents while also mentoring junior analysts and improving operational processes. Roles & Responsibilities:-Must Have Skills: A Sentinel Specialist is primarily responsible for implementing and managing Microsoft Sentinela cloud-native SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) solution.-Deploy, configure, and manage Azure Sentinel for threat detection and incident response.- Integrate Sentinel with various data sources using native and custom connectors.-Create and fine-tune analytic rules, workbooks, and playbooks to automate threat detection and response.-Optimize Sentinel performance through query tuning and cost management.- Collaborate with IT and security teams to improve security posture and ensure compliance.- Stay updated with cybersecurity trends and integrate threat intelligence feeds.- Lead a team of SOC analysts, acting as escalation point for critical incidents.-Monitor alerts from SIEM tools such as Azure Sentinel, RSA NetWitness.-Operate and analyze endpoint threats using EDR tools like Microsoft Defender for Endpoint, CrowdStrike Falcon.- Utilize Microsoft Defender for Cloud to assess and enforce security posture across cloud infrastructure.-Collaborate with IT, DevOps, and engineering teams to implement secure configurations and cloud best practices.- Create detailed incident reports, dashboards, and threat landscape briefings.-Develop and maintain security playbooks, SOPs, and shift handover documentation.- Support proactive tuning of detection rules, policies, and integrations across security tools.-Lead and manage the security operations team (SOC).- Develop and enforce security policies, protocols, and procedures.- Monitor and respond to security incidents and breaches.-Prepare reports and metrics for senior leadership. Professional & Technical Skills: -Proficiency in Kusto Query Language (KQL).- Hands-on experience with SIEM/SOAR tools, especially Microsoft Sentinel.- Familiarity with cloud platforms (Azure preferred).- Scripting knowledge (PowerShell, Python, YAML, JSON).- Understanding of cybersecurity frameworks like MITRE ATT&CK or NIST.- Expertise with EDR platforms:Microsoft Defender for Endpoint, CrowdStrike Falcon.- Proficiency in managing email security and phishing defense platforms:Proofpoint TAP/ETP,Cisco IronPort (ESA,Cofense Triage, Vision, Reporter- Familiarity with threat intelligence platforms:MISP, Recorded Future.-Understanding of OS and network log formats, HTTP/SMTP traffic, and Windows/Linux security.- Basic scripting knowledge (Python, PowerShell, Bash) for automation and threat hunting.-Deep understanding of cybersecurity tools and practices.Certification Requirements (Must Have One or More):- Microsoft Certified:Security Operations Analyst Associate (SC-200)- Microsoft Certified:Azure Security Engineer Associate (AZ-500)- Certified SOC Analyst (CSA) EC-Council-CompTIA Security+, CySA+, or CASP+- GIAC Certifications:GCIH, GCIA, GCFA (optional)- CrowdStrike Certified Falcon Responder (CCFR) or equivalent (for EDR specialization) Additional Information:- The candidate should have minimum 7.5 years of experience in Security Information and Event Management (SIEM).- This position is based at our Bengaluru, Gurugram, Hyderabad, Mumbai, Noida. No other location Preferred- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 week ago
4.0 - 8.0 years
10 - 15 Lacs
hyderabad
Work from Office
Senior SOC Analyst works within the 24/7 Cyber Fusion Center (CFC). The role is responsible for monitoring, triaging, analyzing and escalating incidents and events in the technology environment. This Senior SOC Analyst will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS/IPS, Firewalls, network traffic logs, cloud platforms, and SOAR solutions to analyze events that occur within the environments for the purposes of detecting and mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Senior SOC Analyst must have skills in email security, system event, network event, log analysis. Knowledge of common IT and security technology concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques is important. Experience conducting event analysis in AWS and Azure environments. Characterize and analyse alerts to understand potential and active threats. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the nature and characteristics of events that could be an observed attack Preferred technical and professional experience Document and escalate events/incidents that may cause adverse impact to the environment. Provide daily summary reports of events and activity relevant to cyber operations. Perform Cyber Operations trend analysis and reporting. Perform high-quality triage and thorough analysis for all alerts. Demonstrate effective communication skills both written and verbal. Actively engage in team chats, calls, and face to face settings. Constantly contribute to SOC runbooks/playbooks Recommend improvements to automations, alert fidelity, and security controls. Preferred ExperienceExperience / Knowledge in CyberArk, Azure SSO. Knowledge of enterprise web technologies, security, and cutting-edge infrastructures
Posted 1 week ago
3.0 - 8.0 years
11 - 15 Lacs
gurugram
Work from Office
About The Role Project Role : Technology Platform Engineer Project Role Description : Creates production and non-production cloud environments using the proper software tools such as a platform for a project or product. Deploys the automation pipeline and automates environment creation and configuration. Must have skills : Email Security Good to have skills : Microsoft 365 Security & Compliance Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Technology Platform Engineer, you will be responsible for creating production and non-production cloud environments using the proper software tools. Your role involves deploying the automation pipeline and automating environment creation and configuration.Roles & Responsibilities:-Deploy and manage Proofpoint Email Security solutions to protect against phishing, malware, and other email threats.-Assist in configuring security policies tailored to individual user needs.-Configure recipient verification processes to ensure the authenticity of email communications.-Manage whitelisting and blacklisting of domains, IP addresses, and email addresses to strengthen security.-Develop and modify security rules based on service requests to address specific threats.-Analyze and refine quarantine policies to enhance threat detection and email filtering.-Diagnose and resolve inbound/outbound email delays and routing issues for seamless communication.-Categorize emails for whitelisting and blacklisting to maintain a secure email environment.-Continuously monitor and analyze email traffic to detect and mitigate potential threats.-Collaborate with Registration, DNS, and M365 teams to integrate new or acquired domains into the existing setup.-Configure external email banners and manage exceptions for vendors/partners.-Expertise in creating and modifying Regular Expressions based on security requirements.-Understand URL rewriting scenarios and manage exceptions as needed.-Hands-on experience in diagnosing and resolving URL isolation issues.-Define and implement email security policies to ensure compliance and protect sensitive data.-Conduct training sessions to educate employees on email security best practices and risk mitigation.-Experience in managing security awareness training platforms and initiate related training and take initiative to train users via email or assigning new training on ongoing threats.-Work closely with relevant teams to integrate email security measures with broader security strategies.-Generate reports on security incidents, trends, and the effectiveness of implemented measures.-Stay updated on emerging email security threats and recommend improvements to strengthen the security posture.-Deep understanding of SPF, DKIM, DMARC, and hands-on expertise with EFD to enhance domain security against phishing and malware threats.- Hands on Experience in TAP, TRAP, CTR, PhishAlarm, Email DLP- Experience in Proofpoint IMD for the protection from Phish, Malware, Spam etc.Professional & Technical Skills: - Must To Have Skills: Proficiency in Email Security.- Good To Have Skills: Experience with Microsoft 365 Security & Compliance.- Strong understanding of cloud security principles.- Knowledge of email security protocols and encryption methods.- Experience in configuring and managing email security solutions.- Ability to analyze and respond to email security incidents. Additional Information:- The candidate should have a minimum of 3 years of experience in Email Security.- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 week ago
8.0 - 13.0 years
35 - 40 Lacs
mumbai
Work from Office
DEPARTMENT Information Security REPORTING POSITION CISO KEY RESPONSIBILITIES Security Engineering: Experience in review and /or implementation of technology components like networks, Infrastructure, security solutions like DLP, AD, end point security tools, Email Security, mobile device Security, proxy, firewall etc. Review effectiveness of IT architecture, Data and User Security Controls, Cloud Security Assessment, Cryptography Controls, and other System Security Practices. Conduct POCs for new Security Solutions, implementation of new Security Practices / Processes / Controls across organization, work closely with security partners and MSS vendors on day to day basis, and communicate updates Should have good knowledge of various platforms / technologies and security controls (e.g. Firewall, proxy, load balancer, database, DLP, DRM, domain controllers, System Hardening, System Security Practices, Access Controls, Secure SDLC, Application Security etc.) Conduct Review of all projects (e.g. new applications, system integration, secure architecture, confidential data requests, risk assessment etc.) Security Operations Center (SOC) and Threat Intel : The role will include complete governance and oversight on SOC processes, overseeing testing Should understand of data protection techniques like encryption, vaulting, security in transit and at rest. Analysing Security Advisories, identifying actionable with stakeholders & tracking closure. Track vulnerabilities in the environment for remediation within timelines and ensure timely management reporting of all information security risks. Involvement in SOC governance, to make sure all reported incident, advisories are actioned as per recommendations, review various reports, alerts generated by SOC Regulatory Compliance : Should have good knowledge of Indian IT laws, global security frameworks & regulatory requirements from IRDAI, RBI, SEBI etc. Engage in Information security strategy and governance, risk and compliance, cyber resilience, information security transformation and co-sourcing, application and network security engagements. Ensure Team is always audit / compliance ready, and support the internal / external audits. REQUIRED QUALIFICATION AND SKILLS Educational Qualifications: Graduate, Post Graduate Work Experience: 7+ Years of relevant experience in IT and Information Security Certifications: CISA, CISSP, CEH, ISO27001, BCMS, any security specific certificate will be added advantage .
Posted 1 week ago
2.0 - 6.0 years
0 Lacs
haryana
On-site
You should have 2-5 years of experience in IT security. Your main responsibilities will include configuring, maintaining, and optimizing Email Security and EDR platforms based on security best practices and business requirements. It is essential that you possess a strong understanding of DNS-based email authentication records such as SPF, DKIM, and DMARC. Your role will involve conducting threat hunting activities to identify and respond to suspicious behavior or advanced persistent threats across endpoints and email traffic. You will also be responsible for troubleshooting security incidents, resolving user issues, and escalating to backend or vendor support when necessary. Additionally, you will be required to support the integration of Email Security and EDR solutions with other IT systems and business processes, as well as preparing and delivering regular reports. Collaboration with cross-functional teams to conduct end-user training and awareness programs on email hygiene, phishing prevention, and safe endpoint practices is also a key aspect of this role. Furthermore, you will need to provide support during audits or compliance reviews related to endpoint or email security. In the event of unplanned security events, you should respond promptly and coordinate with relevant stakeholders for containment and recovery.,
Posted 1 week ago
4.0 - 8.0 years
15 - 20 Lacs
gurugram
Work from Office
Email Security Gateways DLP, DNS & Email Authentication Protocols Cloud & Collaboration SecurityUnderstanding of Zero Trust, cloud security stacks (Zscaler, Cloudflare, Palo Alto Prisma,Strong troubleshooting of SMTP, TLS, DNS
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |