Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
4.0 - 8.0 years
6 - 10 Lacs
Hyderabad
Work from Office
Security Specialist Location: Hyderabad Position: 1 Experience: 4 to 8 years pre sales discussions and design security architecture based on customer requirement. Implement firewalls, anti-virus software, log management, authentication systems, content filtering, Professional IT certifications will be added advantage
Posted 2 weeks ago
5.0 - 10.0 years
9 - 16 Lacs
Thane
Work from Office
Required Candidate profile Overall 5 - 10 years experience in network security and managing Proxy/SASE solutions Proficiency with management Proxy Experience in working with Windows, Linux, Unix environments Hands-on experience in commissioning and Implementation of Proxy solutions and integrating with various management and authentication authorization tools (email, AD, IAM, SIEM) Experience in automating processes using scripting, configuration (SOAR) tools Experience in managing policies and exceptions Experience in packet capture, analysis, and troubleshooting tools Product knowledge of Netskope/MacAfee Proxy SSL, Routing Protocols, Dual Factor Authentication etc. Incident, problem, service request management, change management, configuration management &capacity management of Proxy Setup Proactively utilize network monitoring tools to isolate events before service degradation occurs Supporting incident monitoring and incident analysis/response initiatives Coordinate with users to ensure timely and satisfactory resolution for any trouble tickets, troubleshooting layers 1, 2, and 3 of the OSI Model. Troubleshooting network, transport, session, presentation and applications layers Conducting daily performance checks on devices, periodic audits and compliance Performing immediate troubleshooting as the situation dictates for any network outages as reported by users, sensors, and/or operational personnel Implement, and maintain network security policy, standards, and procedures. Deploying and maintaining access and security policies for Proxy solutions. Maintaining service levels as well as oversight of the day-to-day configuration, administration and monitoring of the network security infrastructure in a 24/7. Co-ordination with OEMs for TAC support, RMA, replacement & and reconfiguration of Proxy Creating technical documentation, as-built network diagrams, inventory control documentation, and security documentation. Co-ordinate helpdesk team, other IT support teams, and application support teams to jointly troubleshoot and fix the high priority/severity incidents. Investigate, isolate, and resolve Proxy incidents with RCA. Designing and implementing Proxy solutions for DC/DR/Cloud and Branch office environments. Create SOP/Run book and update knowledgebase in ITSM tools. Work to automate and integrate the tools with REST API/SDK with security dashboard, and Infosec tools (AD, IDAM, PAM, SIEM, SOAR, etc.) Closure of compliance and audit points as per the agreed timelines. Patch updates, and upgradation as per the Bank's compliance and audit requirements Should be able to Lead and mentor L1 & L2 engineers team. Must be comfortable in reading packet captures and analysis (Wireshark/Pcap). Excellent verbal and written communication skills Demonstrated success in managing, analyzing, and solving complex issues Ownership of their technology. Ensure Ticket closure in SLA and follow up for escalated tickets SLA reporting for respective technology.
Posted 3 weeks ago
10.0 - 15.0 years
25 - 35 Lacs
Noida
Work from Office
Cloud Security Lead/Architect(L3) Experience architecting security in cloud platforms like AWS, Azure. Experience creating High Level Designing (HLD) - Low-level Designing (LLD), reviewing the technical requirement document (TRD) for cloud security. Define data security policies through AIP,DLP,Etc Thereat hunting experiences with XRD,EDR,SIEM tools. Experience integrating cloud components with SIEM Planning, implementing, designing and reviewing security policies and other compliances. Experience leading SecOps teams. Guide the team on appropriate prioritization of qualified incidents, Notification through standard communication channel and opening of corresponding incident tickets on Ticketing platform Provide subject matter expertise on information security architecture and systems engineering to other IT and business teams Leading IR, Escalations towards closure. Responsible for automating security controls, data and processes to provide improved metrics and operational support Mandatory certifications on Azure,AWS platforms,CCSP,etc. Secondary skillset in Google cloud is Preferred.
Posted 3 weeks ago
5.0 - 10.0 years
0 - 3 Lacs
Navi Mumbai
Work from Office
We are looking for a candidate who could join our Information Technology Team. Technical Skill Set: 1. Should have a knowledge and understanding of TCP/ UDP. 2. Clean and rigid understanding on what is an AV and whats an EDR solution 3. Understanding of EDR functionalities. This knowledge is required to explore features of a solution and understand technical now how. 4. Understanding on EDR logs and log co-relation. 5. Should be able to understand and retrieve information from packet captures. 6. Should have a sane knowledge of SIEM solution. 7. Knowledge on Log parsing would be an added advantage. 8. Knowledge on Advisories, IOCs, IOAs, Adversories. What are these and how are these to be processed and why? 9. Understanding on actions to be done on receiving an advisory. 10. Should keep his/her knowledge updated and should be on the top of current Cyber exploit cases going on, so that actions can be taken proactively to safeguard the environment. Techno-Management Skill set: 1. Should be able to prioritize tasks while processing advisories, incidents, problems and events. 2. How an incident should be tackled, should have a first-hand expertise on deriving a solution and take incident to closure. 3. Prepare dashboard and reports depicting an at-a-glance view of incidents, events, advisories and remedial actions. 4. Work with the 3rd party solution provider for integration purpose. 5. Prepare documentation related to process and Knowledge base for future easy-reference. 6. Be a bridge between the technical and the management team and make sure updates are regularly submitted to higher management and review to the technical team. 7. Vendor management skills. 8. Any earlier experience in crisis situation handling would be an added advantage.
Posted 3 weeks ago
4.0 - 7.0 years
4 - 12 Lacs
Ahmedabad
Work from Office
Looking for a Senior Developer with expertise in email deliverability, DNS (SPF, DKIM, DMARC), and ESPs (SendGrid, SES). Work with clients to optimize email systems and improve inbox placement. Remote/Hybrid.
Posted 3 weeks ago
8.0 - 13.0 years
3 - 7 Lacs
Pune, Bengaluru
Work from Office
Job Title:DLP Lead Experience8-14 Years Location:Bangalore /Pune : Technical Skills: Experience in configuring s and creating workflows on Email DLP - Proofpoint Prior experience with CASB Netskope or similar solution Knowledge of security principles including cloud , standards and techniques Understanding of cloud principles ,cloud applications and key cloud service providers Prior experience with Data loss prevention tools, SIEM, network devices and other infrastructure Reviews violations of data security procedures to eliminate violations Strong experience on Mimecast email Security solution for threat Protection, Spoofing, Encryption, Archive, URL Defense Strong understanding of email delivery architecture, email gateway and DNS technologies Strong understanding of networking, SMTP, DNS Experience of compliance requirements for database security (e.g. SOX, HIPAA, PCI etc.) Strong verbal and written communications skills; must be able to effectively communicate technical details and thoughts in non-technical/general terminology to various levels of the organization. Work well in team environments with internal and external resources as well as work independently on tasks Strong organizational, and time management skills Process Skills: Overall management of Email DLP solution - Proofpoint Analyze blocked emails Manage CASB operations ,maintain implemented Netskope CASB solution,respond and resolve incidentsinvestigate and conduct analysis Work on email release/drop as per requests Tune/Amend email DLP policies Perform Daily DLP System Health check and publish health report Update/Add - roles modification, response rules, complex and new policies modifications Email DLP – Microsoft E4 licenses CASB –Netskope Behavioral Skills: Effective interpersonal, team building and communication skills Ability to collaborate; be able to communicate clearly and concisely both to laypeople and peers, be able to follow instructions, make a team stronger for your presence and not weaker. Ability to see the bigger picture and differing perspectives; to compromise, to balance competing priorities, and to prioritize the user. Desire for continuous improvement, of the worthy sort; always be learning and seeking improvement, avoid change aversion and excessive conservatism, equally avoid harmful perfectionism, 'not-invented-here' syndrome and damaging pursuit of the bleeding edge for its own sake. Learn things quickly, while working outside the area of expertise. Analyze a problem and realize exactly what all will be affected by even the smallest of change you make in your design Ability to communicate complex technology to no tech audience in simple and precise manner. Ownership skills. Qualification: Must have 4 Year degree (Computer Science, Information Systems or equivalent) 4+ years overall IT experience.
Posted 3 weeks ago
4.0 - 8.0 years
10 - 15 Lacs
Bengaluru
Work from Office
Senior SOC Analyst works within the 24/7 Cyber Fusion Center (CFC). The role is responsible for monitoring, triaging, analyzing and escalating incidents and events in the technology environment. This Senior SOC Analyst will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS/IPS, Firewalls, network traffic logs, cloud platforms, and SOAR solutions to analyze events that occur within the environments for the purposes of detecting and mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Senior SOC Analyst must have skills in email security, system event, network event, log analysis. Knowledge of common IT and security technology concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques is important. Experience conducting event analysis in AWS and Azure environments. Characterize and analyse alerts to understand potential and active threats. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the nature and characteristics of events that could be an observed attack Preferred technical and professional experience Document and escalate events/incidents that may cause adverse impact to the environment. Provide daily summary reports of events and activity relevant to cyber operations. Perform Cyber Operations trend analysis and reporting. Perform high-quality triage and thorough analysis for all alerts. Demonstrate effective communication skills both written and verbal. Actively engage in team chats, calls, and face to face settings. Constantly contribute to SOC runbooks/playbooks Recommend improvements to automations, alert fidelity, and security controls. Preferred ExperienceExperience / Knowledge in CyberArk, Azure SSO. Knowledge of enterprise web technologies, security, and cutting-edge infrastructures
Posted 3 weeks ago
3.0 - 7.0 years
2 - 6 Lacs
Bengaluru
Work from Office
Drive projects and initiatives to improve and expand existing DLP platform capabilities. Implement and manage DLP solutions, including data labeling technologies. Work directly with stakeholders to define requirements and develop security solutions. Ensure the security of endpoint devices, including data protection and behavior analysis. Deploy and manage endpoint DLP solutions, such as those offered by Proofpoint. Manage email security policies and configurations, including DLP for email. Detect and prevent data loss through email channels, such as by identifying sensitive content and usebehavior. Gain deep knowledge of the Proofpoint platform, including its various modules (e.g., Endpoint DLP, Email DLP) Be proficient in using the Proofpoint console to manage alerts, investigate incidents, and analyze user behavior. Primary Skills DLP Endpoint Security Email Security Secondary Skills Data Labeling Behavior Analysis Incident Response
Posted 3 weeks ago
5.0 - 9.0 years
0 Lacs
Nagpur
Work from Office
Lead Engineer - Email gateway Reports to Senior Manager/Architect location) University degree in the field of computer science or IT. This role involves acting as primary point of contact for operational tickets resolution, enhancing, email security measures and providing document support. Experience/Qualifications * The ideal candidate will have a strong background in email security and vendor collaboration. * Must possess patching experience as well as upgrade and update and implementation of email gateways * Mandatory skills are Email authentication spf, dkim. dmarc also should be aware of spam, phishing, spoofing * Should possess basic networking and dns records knowledge Act as a primary point of contact for resolving operational tickets related to Trend micro email gateway which specifically includes ddei and imsva Daily monitoring reports for services, resource optimization, patching and Responsibilities upgrade activity. Rca preparation for mail flow issues Provide full email analysis for spam, spoofing,phishing, malware etc. Manage and maintaining server resources for email gateway
Posted 3 weeks ago
5 - 8 years
5 - 9 Lacs
Pune
Work from Office
About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: Cisco IronPort Email Security Appliances. Experience5-8 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
5 - 10 years
4 - 9 Lacs
Nagpur
Work from Office
Job Title: Lead Engineer Email Gateway Experience: 5 to 6 Years Location: Nagpur Education: Bachelor of Engineering (BE) Bachelor of Technology (BTech) Master of Technology (M.Tech) Industry Type: IT Services & Consulting / Cybersecurity Employment Type: Full Time, Permanent Role Category: IT Infrastructure Services / Security Job Description: We are hiring a Lead Engineer Email Gateway to manage and secure enterprise email infrastructure. The role involves hands-on operational support, enhancement of email security measures, and collaboration with vendors to ensure robust and secure email services. Key Responsibilities: Act as the primary contact for operational ticket resolution for email security issues Manage and maintain Trend Micro Email Gateway (DDEI and IMSVA) Daily monitoring of mail services, patch management, and server performance Perform email threat analysis : phishing, spoofing, spam, malware Conduct patching, upgrades, and implementation of email gateways Monitor SPF, DKIM, DMARC configurations for email authentication Troubleshoot mail delivery issues and prepare Root Cause Analysis (RCA) Ensure proper documentation and support during audits Work with vendors to resolve escalations and system improvements Basic networking and DNS records knowledge is a must Required Skills: Strong knowledge of email authentication protocols : SPF, DKIM, DMARC Experience in patching, upgrading, and implementing secure email gateways Knowledge of spam, phishing, and spoofing mitigation Hands-on experience with Trend Micro Email Security Solutions Familiarity with DNS records , networking basics RCA preparation and ticket management Desired Candidate Profile: 5+ years of experience in email infrastructure or email security roles Strong communication and troubleshooting skills Team player with ability to handle pressure and time-sensitive tasks Experience working in enterprise environments and with vendor support Interested cadidates fill the details below and share on Anurag.Yadav@softenger.com Updated Resume : Total Experience : Relevant Experience : Current CTC : Expected CTC : Notice Period : Are you willing to relocate to Nagpur location:
Posted 1 month ago
15 - 20 years
25 - 27 Lacs
Bengaluru
Work from Office
Check Point Software Technologies Ltd is looking for Customer Success Manager, Email Security to join our dynamic team and embark on a rewarding career journey We are looking for a customer success manager who can provide ongoing support to our clients and network with them The candidate should be able to contribute to building relationships, implementing new programs that will increase your business revenue potentials ResponsibilitiesEstablish clear client retention goalsPromote the value of the productPromote value through customer experienceReview customer complaints and concerns and seek to improve the customer experienceRequirementsA successful CSM should have strong communication and relationship-building skills They should also be analytical and data-driven, with the ability to use data to identify trends and opportunities for improvement They should be customer-focused and results-oriented
Posted 1 month ago
2 - 7 years
0 - 1 Lacs
Noida
Work from Office
Role & responsibilities Mini. 2 years of experience implementation & operations. The resource should have implemented at least 4-5 projects in customer environment. Should be able to create HLD & LLD documents and should be able to draw architecture as per customer need Working Knowledge of SOC/ SIEM tools and operational understanding Must have lead team of Security Cons ultants/ Analysts Should have sound knowledge of products & should be able to carry out the POCs, Implementation and Operations support Should lead the delivery of multiple projects at customer locations Should have knowledge of following products (with Operations and Implementation) DLP/ Proxy Forcepoint, Symantec, Cisco, McAfee , Zscaler Email Security – Symantec, Forcepoint, Cisco NAC Solutions – Cisco ISE, Forcescout EDR/ XDR Solution – Trend Micro, Crowdstrike SOC SIEM Solution (Arcsight, Qradar, RSA or Seceon) ( Must have hands-on experience from any two of above) Excellent English communication skills mandatory Excellent documentation skills mandatory Understand reporting capabilities Preferred candidate profile Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host based firewalls, Anti-Malware, HIDS General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows NT Good to have industry certifications on SIEM Platform, CCNA, CEH, MCSE & Others Bachelor’s Degree in Computer Science or equivalent required 5-10 years’ experience in IT security Good communication skills Strong level of customer service required
Posted 1 month ago
4 - 8 years
7 - 9 Lacs
Bengaluru
Work from Office
Job Summary We are seeking a skilled IT professional with hands-on experience in managing Google Workspace, securing email infrastructure, and handling endpoint/user device management. The ideal candidate will be responsible for ensuring smooth collaboration through Google Workspace, protecting email systems from threats, and maintaining secure and compliant end-user computing environments. Skill Set 4 - 8 years of experience in IT systems administration or similar role. Proven experience managing Google Workspace for a mid-to-large user base. Solid understanding of email security protocols (SPF, DKIM, DMARC). Experience with email security platforms and endpoint management tools. Strong troubleshooting skills and familiarity with ITIL-based service management. Excellent communication and documentation skills . Roles and Responsibilities Google Workspace Administration Manage user accounts, groups, and organizational units. Implement and maintain Google Workspace security and compliance settings (DLP, Vault, SSO, etc.). Automate routine administration tasks using GAM or Google Admin SDK. Email Security & Compliance Deploy and manage email security tools (e.g., Mimecast, Proofpoint, Google Advanced Protection). Monitor and respond to email-based threats such as phishing, spoofing, and malware. Define and enforce SPF, DKIM, DMARC policies. Collaborate with the InfoSec team for email compliance and retention policies. Endpoint/User Device Management Manage and monitor endpoints across operating systems (Windows, macOS, ChromeOS). Deploy and manage MDM/EMM solutions (e.g., Google Endpoint Management, Intune, Jamf). Enforce device compliance policies, encryption, and remote wipe capabilities. Provide Tier 2/3 support for device-related issues. Operational & Security Hygiene Maintain IT asset inventory and ensure timely patching and updates. Document system configurations, procedures, and support materials. Participate in incident response and root cause analysis for device and email-related incidents.
Posted 1 month ago
3 - 6 years
5 - 8 Lacs
Bengaluru
Work from Office
Job Title - Security Delivery Associate Management Level: L13 or L12 Associate Location: Bengaluru Must have skills: Data Loss Prevention Good to have skills Understanding of computer hardware / operating systems (Windows, Linux, OS X, iOS/Android, etc.), IT Security, is a plus Job Summary :Accenture's Cyber Incident Response Team (CIRT) monitors the cyber threat landscape, coordinates prevention, detection, and corrective activities, and manages vulnerabilities and incidents. Within this organization, is the Data Loss Prevention team. This team responds to cyber-security incidents identified through the Data Loss Prevention (DLP) tool. By following a set process, the team is responsible for analyzing, collecting relevant details, determining the type of security incident, and escalating accordingly. The team works closely with other functions within CIRT to handle incidents. The team is also responsible for coordinating with numerous other teams who are involved with conducting follow-up investigations to such incidents. Roles & Responsibilities: Review DLP alerts appropriately, escalate and close cases in accordance with the team's defined process. Liaise with different functions within CIRT to gather information including Investigations, Infrastructure, ASOC, and Cyber Threat Intelligence. Coordinate with various teams during the escalation process, including Technology Support teams, Legal teams, HR, and other teams as defined in the escalation process. Keep all tracking and recording tools current and update incidents in tracking database with appropriate details in a timely manner. Perform incident accuracy checks within Incident Tracking database and update details when necessary. Effectively work and collaborate with a global team. Adapt to continuous process improvements and change requests as needed. Have strong communication skills; attention to detail and accuracy of information is paramount. Professional & Technical Skills: Above average problem-solving skills Excellent oral and written English communication skills Ability to manipulate and present data using MS Office and Excel Strong sense of ethics & values, ability to handle confidential situations with discretion Must be able to work collaboratively across physical locations or geographies Ability to multi-task and prioritize assigned workload Additional Information: Security+ Certification Experience working in Information Security domain Willing to work overtime, rotating shifts, work during weekends and holidays, as necessary
Posted 1 month ago
2 - 5 years
7 - 9 Lacs
Gurgaon/Gurugram
Work from Office
We are looking for the candidates from Delhi/NCR for the position of IT Security Engineer for US client in Gurgaon location Candidates from West and South location need not to apply Job description Job Title: SOC Analyst Tier 2 Looking for Immediate Joiners or who can Join within 15-20 Days. Location: Gurgaon Shift : Rotational Shift / US Shift Budget: As per market standards + Shift Allowances Contract Tenure: 2 years contract on the payroll of Mynd solution. Share your CV at "Pratibha@myndsol.com" Please share your CV With the Subject line as SOC Analyst Work Experience 2 to 5 years of experience in Security Operations, SOC or Cybersecurity and Graduate in IT/CS from recognized University Key Skills - Candidate should be ready for rotational shift -.Candidate must have Excellent communication Skill - Candidate must have the knowledge of penetration testing, Knowledge of TCP/IP protocols, network applications. Good knowledge of security tools and monitoring devices - CCNA would be preferred - Equivalent Certifications (Network+, Security+, CySA+, GSEC, GMON) Job Requirement Keysight is looking for a Cybersecurity Analyst to join its growing organization and be part of its in-house Security Operations Centre (SOC). This is a position requiring a good technical background in Information Security practice, good knowledge of IT Security threats and solid communication and organizational skills. The successful candidate is very motivated and willing to take on challenges, able to multi-task to succeed and has the ability work with the team to tackle incoming alerts. The Information Risk & Security team sets strategic direction for security within the organization and aligns with stakeholders throughout the company. JOB DESCRIPTION Handling, and escalation of, alerts which require technical triage and analysis. This may include web attacks, malware infections, and phishing campaigns, which have been identified by the Information Risk & Security teams technology stack. Functional Responsibilities Experience Monitoring SIEM solutions and a variety of other security devices found in a SOC environment (e.g. Behavioral Analytics tools, IDS/IPS, log management tools, and security analytics platforms. Creating and maintaining documentation for security event processing. Acknowledge and handle the incoming security alerts. Use the internal ticketing system and dashboards to update the tickets/alerts accordingly and escalating them to the appropriate teams if necessary. Assist the Incident Response team on alerts escalated to them by the SOC team. Develop/Update and follow Standard Operating Procedures (SOPs) and Playbooks to handle standard and out-of-band alerts. Report to the Incident Response Team quickly and efficiently regarding urgent matters. Ensure ticket queues are always within satisfactory limits and all tickets are updated. Provide On-Call Support for emergency or high severity issues. Liaise with partner teams and end-users for security related tickets and activities. Excellent analytical and problem-solving skills required. Experience working with SIEMs and evaluating SIEM alerts. Experience leveraging core security and infrastructure technologies during investigations (e.g. firewall logs, network security tools, malware detonation devices, proxies, IPS/IDS) Key Competencies Ability to think with a security mindset. The successful candidate has a good IT background with good level knowledge of multiple relevant security practice areas (anti-malware solutions, patch and vulnerability management, network security; monitoring; endpoint, etc.) • Knowledge of TCP/IP Protocols, network analysis, and network/security applications. • Good knowledge of various security tools and monitoring devices; e.g. able to read and understand IDS/IPS/Firewall/Proxy logs and determine the current state of play. Experience in correlating malware infections with attack vectors to determine the extent of security and data compromise. Ability to work in a time-sensitive environment; must be detail oriented and able to multitask to meet deadlines and company objectives. Experience in large, geographically diverse enterprise networks. Ability to build lasting relationships with partner teams and stakeholders. Documentation; experience in writing reports and documenting tickets efficiently and accurately. Visit : http://www.keysight.com/ Feel free to reach me for any clarifications
Posted 1 month ago
8 - 13 years
35 - 40 Lacs
Mumbai
Work from Office
DEPARTMENT Information Security REPORTING POSITION CISO KEY RESPONSIBILITIES Security Engineering: Experience in review and /or implementation of technology components like networks, Infrastructure, security solutions like DLP, AD, end point security tools, Email Security, mobile device Security, proxy, firewall etc. Review effectiveness of IT architecture, Data and User Security Controls, Cloud Security Assessment, Cryptography Controls, and other System Security Practices. Conduct POCs for new Security Solutions, implementation of new Security Practices / Processes / Controls across organization, work closely with security partners and MSS vendors on day to day basis, and communicate updates Should have good knowledge of various platforms / technologies and security controls (e.g. Firewall, proxy, load balancer, database, DLP, DRM, domain controllers, System Hardening, System Security Practices, Access Controls, Secure SDLC, Application Security etc.) Conduct Review of all projects (e.g. new applications, system integration, secure architecture, confidential data requests, risk assessment etc.) Security Operations Center (SOC) and Threat Intel : The role will include complete governance and oversight on SOC processes, overseeing testing Should understand of data protection techniques like encryption, vaulting, security in transit and at rest. Analysing Security Advisories, identifying actionable with stakeholders & tracking closure. Track vulnerabilities in the environment for remediation within timelines and ensure timely management reporting of all information security risks. Involvement in SOC governance, to make sure all reported incident, advisories are actioned as per recommendations, review various reports, alerts generated by SOC Regulatory Compliance : Should have good knowledge of Indian IT laws, global security frameworks & regulatory requirements from IRDAI, RBI, SEBI etc. Engage in Information security strategy and governance, risk and compliance, cyber resilience, information security transformation and co-sourcing, application and network security engagements. Ensure Team is always audit / compliance ready, and support the internal / external audits. REQUIRED QUALIFICATION AND SKILLS Educational Qualifications: Graduate, Post Graduate Work Experience: 7+ Years of relevant experience in IT and Information Security Certifications: CISA, CISSP, CEH, ISO27001, BCMS, any security specific certificate will be added advantage .
Posted 1 month ago
2 - 7 years
4 - 9 Lacs
Noida
Work from Office
Key Responsibilities: Domain Configuration & Authentication: Set up DNS records (SPF, DKIM, DMARC) for each sending domain. Ensure proper domain alignment to prevent spam issues. Bulk Email Platform Setup: Configure tools like Mailchimp, SendGrid, Amazon SES, or custom SMTP servers . Integrate APIs if automated sending is required. IP Reputation Management: Monitor IP warming if using a dedicated IP. Manage blacklisting issues and maintain good sender scores. Email Deliverability Monitoring: Use tools like Postmark, Mailgun, or GlockApps to track bounce rates, open rates, and spam flags. Compliance & Security: Ensure GDPR, CAN-SPAM, or other legal compliance . Set up proper TLS encryption for outgoing emails. Troubleshooting Support: Handle email bouncebacks , SMTP errors , and authentication issues . Assist non-technical teams in formatting and sending email campaigns.
Posted 1 month ago
4 - 9 years
5 - 15 Lacs
Hyderabad, Pune
Work from Office
Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response : Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation : Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis : Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography : Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security : Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting : Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance : Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs) : Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools : Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms : Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions : Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools : Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools
Posted 1 month ago
4 - 6 years
4 - 8 Lacs
Mumbai
Work from Office
About The Role 4-6 Years experience on creating Design documents, Implementation/ Change Management Plans or Optimization of reports (beyond day-to-day routine operations) is a must. Expertise in Implement &/or design (design is must for CE3) of one of the following - Priority is Firewall and Cisco ISE and good if candidates have hands on exp on Identity solutions, Email Security, Web Security/Proxy, Cloud Security. 3rd Party Firewall is a Plus
Posted 2 months ago
2 - 6 years
7 - 11 Lacs
Ahmedabad
Work from Office
Cyber Security Analyst 1. Planning, implementing, managing, monitoring, and upgrading security measures for the protection of the organizations data, systems, and networks 2. Ensuring that the organizations data and infrastructure are protected by enabling the appropriate security controls 3.monitor and respond to common cyber threats such as 'phishing' emails, 'pharming' activity, malware and ransomware 4.monitor identity and access management, including monitoring for abuse of permissions by authorised system users 5.liaise with stakeholders in relation to cyber security issues and provide future recommendations 6.record all findings, actions taken and lessons learned following an incident to strengthen future responses 7.generate incident reports for both technical and non-technical staff and stakeholders 8.identify potential weaknesses and implement measures, such as firewalls and encryption 9.investigate security alerts and provide incident response using incident handling methodologies and best practices 10.Determines security violations and inefficiencies by conducting periodic audits. 11.Upgrades system by implementing and maintaining security controls. 12.monitor for attacks, intrusions and unusual, unauthorised or illegal activity 13.test and evaluate security products and check suppliers certification, compliance and accreditation 14.design new security systems or upgrade existing ones 15.use advanced analytic tools to determine emerging threat patterns and vulnerabilities 16.keep up to date with the latest security and technology developments 17.Research/evaluate emerging cyber security threats and vulnerabilities and ways to manage them 18.Plan for disaster recovery and create contingency plans in the event of any security breaches 19.engage in 'ethical hacking', for example, simulating security breaches 20.Contributes to team effort by accomplishing related results as needed. 21. Troubleshooting security and network problems 22. Responding to all system and/or network security breaches 23. Participating in the change management process 24. Testing and identifying network and system vulnerabilities 25. Daily administrative tasks, reporting, and communication with the relevant departments in the organization. Mandatory Technical Expertise: 1.Vulnerability Management tool Tenable / Nessus, WAS, Qualys, CrowdStrike, Burpsuite, Web Security Scanner 2.XDR Platform Trend Micro and MS Defender 3.Azure and Azure AD and Security tools, Defender EDR, Defender for Office, Defender for Cloud/Server/DB 4.SIEM Trend Micro or FortiGate or IBM QRadar, Log Rhythm, MS Azure Sentinel (Azure Event Hub, Azure Log Analytics Workspace) 5.Experience with Web filtering tool specifically with Fortinet, and NAC / Cisco ISE (a). Implement new web filtering solution using Fortinet (b). Test, verify and implement policies, create groups, grand access to groups. 6. Experience with WAF Imperva, FortiWeb, F5 7. Experience with DMARC RUA/RUF 6.Experience with Firewall and Firewall rules, IP addressing, subnets, ports and VPN. (a). Configure and implement firewall rules (b). Audit firewall rules and network segmentation. (c). Verify and Submit firewall rule requests (d). Working Knowledge on OT firewall (f). Practical knowledge on Azure Firewall, VNET, NSG, VPC , CIPM configuration 7.Significant Experience with SIEM to (a) Configure and implement rules, data sets, APIs, third party cloud API integration to facilitate ingestion of logs sources like o365, Azure AD, AWS (b) Integrate log data sets with SIEM (c) Configure IOC, and alerts (d) Conduct searches raw logs, Investigate alerts, assets, domains, users, IPs, files, Threat Intelligence and Threat Advisories (TI / TA) (e) Configure and monitor events using rules and run rules against historical data (f)Working experience with Python, Kali-Linux, YARA-L language 8.Experience with AD, GPOs, Security groups, Windows Servers, Desktop OS. 9.Experience in the field of Information Systems Security required. Analyst must have working knowledge of relevant ISO 27001/FISMA/NIST information security regulations and guidelines. 10.Working knowledge of IT Security Best Practices regarding networks and networking including protocol analysis, anomaly detection, and troubleshooting 11.Experience reviewing logs, scripting tasks, or creating structured queries/regex searches 12.GxP, 21CFR and GMP Process knowledge is a plus 13.Advanced understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements. 14.Hands-on experience analyzing high volumes of logs, network data (e.g. Netflow, FPC), and other attack artifacts in support of incident investigations 15.Experience with vulnerability scanning solutions 16.Proficiency with at least 4 or 5 of the following: Anti-Virus, XDR, SIEM, NIPS, HIPS, WAF, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics, Encryption and RSA Security 17.In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g.Trend Micro, Microsoft Sentinel, ArcSight, QRadar, LogLogic, Splunk) 18.Experience developing and deploying signatures (e.g. YARA, Snort, Suricata, HIPS) 19.Understanding of mobile technology and OS (i.e. Android, iOS, Windows), VMware technology, and Unix and basic Unix commands Education, Experience, and Licensing Requirements: Bachelors Engineering degree in computer science, Information Systems Security Analyst: 5-7 years of prior relevant experience Senior Security Analyst: 8-10 years of prior relevant experience Advanced certifications such as CEH, CHFI, ECIH, CISM, SANS GIAC/GCIA/GCIH, CISSP or CASP and/or SIEM-specific training and certification ITIL Foundation or Intermediate Process Certified in CAPM or PMP or Prince2
Posted 2 months ago
6 - 11 years
6 - 9 Lacs
Bengaluru
Work from Office
Job ID/Reference Code INFSYS-NAUKRI-210655 Work Experience 6-11 Job Title Network Security- Firewall Responsibilities A day in the life of an Infoscion As part of the Infosys consulting team, your primary role would be to get to the heart of customer issues, diagnose problem areas, design innovative solutions and facilitate deployment resulting in client delight. You will develop a proposal by owning parts of the proposal document and by giving inputs in solution design based on areas of expertise. You will plan the activities of configuration, configure the product as per the design, conduct conference room pilots and will assist in resolving any queries related to requirements and solution design You will conduct solution/product demonstrations, POC/Proof of Technology workshops and prepare effort estimates which suit the customer budgetary requirements and are in line with organization’s financial guidelines Actively lead small projects and contribute to unit-level and organizational initiatives with an objective of providing high quality value adding solutions to customers. If you think you fit right in to help our clients navigate their next in their digital transformation journey, this is the place for you! Technical and Professional Requirements: Primary skills:Infrastructure Security->Email Security,Network Security,Network Security->Firewalls->Checkpoint,Network Security->Firewalls->Juniper-Firewalls,Network Security->Firewalls->Palo Alto,Network Security->Firewalls->Web Application Firewall(WAF),Network Security->Load Balancer->F5,Network Security->Proxy->Blue Coat,OT Security,OT Security->OT Security,Technology->Infrastructure Security->Virtual Private Network, Firewall,Technology->Network-Firewall_and_Media->Cisco-Firewall_and_Media,Technology->Network-Firewall_and_Media->Juniper-Firewall,Technology->Network-Firewall_and_Media->Palo Alto Preferred Skills: OT Security Network Security Infrastructure Security->Email Security OT Security->OT Security Network Security->Firewalls->Checkpoint Network Security->Firewalls->Web Application Firewall(WAF) Network Security->Proxy->Blue Coat Network Security->Firewalls->Juniper-Firewalls Network Security->Load Balancer->F5 Network Security->Firewalls->Palo Alto Technology->Infrastructure Security->Virtual Private Network Firewall->Fortigate NFGW Technology->Network-Firewall_and_Media->Cisco-Firewall_and_Media Technology->Network-Firewall_and_Media->Juniper-Firewall Technology->Network-Firewall_and_Media->Palo Alto Additional Responsibilities: Ability to develop value-creating strategies and models that enable clients to innovate, drive growth and increase their business profitability Good knowledge on software configuration management systems Awareness of latest technologies and Industry trends Logical thinking and problem solving skills along with an ability to collaborate Understanding of the financial processes for various types of projects and the various pricing models available Ability to assess the current processes, identify improvement areas and suggest the technology solutions One or two industry domain knowledge Client Interfacing skills Project and Team management Educational Requirements Intergrated course BCA+MCA,Master Of Engineering,Master Of Technology,MCA,MSc,Bachelor of Engineering,Bachelor Of Technology,BCA,BSc Service Line Cyber Security * Location of posting is subject to business requirements
Posted 2 months ago
4 - 6 years
2 - 5 Lacs
Gurgaon
Work from Office
About The Role Minimum Qualifications You have achieved a bachelor's degree, or have accrued relevant past work experience, in a technical field (CS/CE/EE preferred) and have 2+ years of customer facing experience in network/IT support. Have a real passion for supporting network security products. Experienced at solving sophisticated networking issues and have a superb grasp of fundamental networking. Strong verbal and written communication skills, and you are skilled in answering customers technical inquiries. Desire to expand your skills, move into new areas. Diligent and analytical. Comfortable problem solving via both phone and email. Hold a CCNA (R&S or Security) certification or have equivalent work experience. Desired Skills Familiarity solving and understanding LAN/WAN environments, Active Directory, DNS, multiple OS platforms, cloud-based security products Experience in high level Wireshark analysis Web Proxy support experience Familiarity with Firewall, ISE or VPN Familiarity with Zendesk, JIRA Ability to prioritize and work responsibly with or without direct supervision About The Role - Grade Specific Focus on Industrial Operations Engineering. Develops competency in own area of expertise. Shares expertise and provides guidance and support to others. Interprets clients needs. Completes own role independently or with minimum supervision. Identifies problems and relevant issues in straight forward situations and generates solutions. Contributes in teamwork and interacts with customers. Skills (competencies)
Posted 2 months ago
5 - 8 years
12 - 20 Lacs
Chennai
Work from Office
Maintain security architecture frameworks for enterprise systems/networks/cloud environments Design secure solutions as per NIST/ISO 27001 Implement secure cloud solutions for AWS/Azure environments & Zero Trust security models Required Candidate profile 5+ yrs exp Expert in NIST, MITRE ATT&CK CISSP/CISM/CCSP/AWS/Azure Speciality Research emerging technologies-PSM/MDM/MFA/DLP/CSPM/Disk Encryption Develop PoCs for new security tools
Posted 2 months ago
8 - 13 years
8 - 12 Lacs
Gurgaon
Work from Office
Role & responsibilities Minimum 7 years required. Should have experience in designing security solutions. Should have experience in designing Enterprise security needs. Should have experience in Cyber Security. Should have experience in Endpoint security. Should have work with internal IT and security teams to integrate, configure, and optimize OEM security solutions. Should have conduct POC testing. Should have Experience of Firewalls IDS/IPS, VPNs, NAC, SDWAN and other networking technologies. Should have use any of the platform SIEM & SOAR. Should have the knowledge of Data Loss Prevention (DLP) solutions, Email security, Endpoint Encryption. Should have experience in responding to government RFPs, RFIs, and tenders for cybersecurity and IT solutions. Preferred candidate profile Perks and benefits
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2