Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
8.0 - 13.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Operation Automation Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are seeking an experienced and innovative SOAR Architect to lead the design, development, and implementation of advanced Security Orchestration, Automation, and Response (SOAR) solutions. The ideal candidate will leverage their expertise in platforms like Splunk Phantom, Chronicle SOAR, and Cortex XSOAR to optimize and automate incident response workflows, enhance threat detection, and improve overall security operations efficiency. Roles & Responsibilities:- SOAR Strategy and Architecture:Develop strategies for automation, playbook standardization, and process optimization.- Playbook Development:Create, test, and deploy playbooks for automated threat detection, investigation, and response. Collaborate with SOC teams to identify repetitive tasks for automation and translate them into SOAR workflows.- Integration and Customization:Integrate SOAR platforms with existing security tools, including SIEM, threat intelligence platforms, and endpoint protection. Customize connectors and APIs to enable seamless communication between security tools.- Collaboration and Leadership:Work closely with SOC analysts, threat hunters, and other stakeholders to align automation efforts with organizational goals. Provide technical mentorship to analysts on SOAR platform utilization.- Performance Optimization:Continuously evaluate SOAR platform performance and implement improvements for scalability and reliability. Monitor automation workflows and troubleshoot issues to ensure consistent operations.- Compliance and Best Practices:Ensure that all SOAR implementations align with industry standards, compliance regulations, and organizational policies. Stay up to date with the latest advancements in SOAR technology and incident response practices. Professional & Technical Skills: - Proficiency in scripting and programming Python to develop custom playbooks and integrations.- Strong understanding of security operations, incident response, and threat intelligence workflows.- Proven track record of integrating SOAR with SIEM solutions (e.g., Splunk, Chronicle), EDR, and other security tools.- Ability to troubleshoot complex integration and automation issues effectively. Additional Information:- Certifications such as Splunk Phantom Certified Admin, XSOAR Certified Engineer, or equivalent.- Experience with cloud-native SOAR deployments and hybrid environments.- Familiarity with frameworks like MITRE ATT&CK, NIST CSF, or ISO 27001.- A 15 year full-time education is required- 3.5 years of hands-on experience with SOAR platforms like Splunk Phantom (On-Prem and Cloud), Chronicle SOAR, and Cortex XSOAR. Qualification 15 years full time education
Posted 4 days ago
5.0 - 8.0 years
10 - 14 Lacs
Bengaluru
Work from Office
Project Role : Application Lead Project Role Description : Lead the effort to design, build and configure applications, acting as the primary point of contact. Must have skills : Microsoft Endpoint Configuration Manager Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time educationJob Title:MECM/SCCM L2 Support Engineer.Experience:56 YearsManagement level:CL10Job Type:Full-TimeWork Mode:HybridJob Summary :The MECM (Microsoft Endpoint Configuration Manager) / SCCM (System Center Configuration Manager) L2 Support Engineer will be responsible for providing second-level support for endpoint management systems, including patch management, software distribution, and compliance reporting. The role involves working closely with L1 support, IT operations, and security teams to ensure a stable and secure end-user computing environment.Key Responsibilities:Provide L2 support for MECM/SCCM-related issues, including troubleshooting client and server-side problems.Monitor and manage software deployments, patch compliance, and system updates.Support monthly patching cycles (WSUS integration, SUP, ADR, maintenance windows).Assist with application packaging and deployment using SCCM.Perform client health checks and remediation for non-compliant systems.Monitor SCCM infrastructure and perform basic administration tasks.Manage collections, task sequences, and operating system deployment (OSD) processes.Generate and analyze reports (via SSRS or Power BI) for patching, compliance, and inventory.Work on incident, problem, and change management processes (ITIL-based).Collaborate with vendors and cross-functional teams to resolve complex issuesTechnical Skills Required:Strong experience in MECM/SCCM administration and support.Good knowledge of Windows Server and Windows OS (7, 10, 11).Application packaging tools (MSI, PowerShell, VBScript) knowledge is an advantage.Familiarity with Active Directory, Group Policy, and WSUS.Understanding of Patch Management Lifecycle and Security Baselines.Scripting knowledge (PowerShell preferred).Experience with remote tools (CM Remote Tools, RDP, etc.).Reporting experience with SCCM reports and/or Power BI.Windows server administration and patch management. Soft Skills: Strong analytical and troubleshooting skills.Excellent communication and documentation skills.Ability to work independently and within a team.Customer-focused with a proactive mindset.Certifications (Preferred but not mandatory):Microsoft Certified:Endpoint Administrator AssociateITIL Foundation CertificationCompTIA A+ / Network+ / Security+ (optional) Qualification 15 years full time education
Posted 4 days ago
4.0 - 9.0 years
25 - 40 Lacs
Bengaluru
Work from Office
5+y in STA,tcl, python scripting Timing analysis,validation,debug Tempus DMMMC flow for STA STA setup,convergence, reviews,signoff for scan,function Endpoints,check timing reports,timing methodologies,noise, crosstalk,OCV Lower nodes 22nm,16nm,5nm
Posted 1 week ago
4.0 - 8.0 years
10 - 15 Lacs
Gurugram
Work from Office
About the Role Mjolnir Security, a global cybersecurity firm headquartered in Canada, is expanding its operations in India and looking for a Cloud Security Engineer (Night Shift - India) to join our growing team at Gurugram, India for ON-SITE ONLY . This position is vital to our 24/7 support strategy and will focus on supporting our North American clients by managing, maintaining, and troubleshooting all aspects of their Microsoft 365 (O365) environments. Youll be part of a fast-paced security operations and IT support team, ensuring seamless functionality across cloud-based productivity and security tools. This is an exciting opportunity to grow your skills in modern workplace technology, cloud security, and endpoint management. Responsibilities Support and troubleshoot all components of Microsoft 365, including: •Intune (Endpoint Manager) •Microsoft Purview •SharePoint Online •OneDrive for Business •Outlook and Exchange Online •Teams and related collaboration tools Manage O365 updates, service health, and tenant configurations. Respond to client issues with urgency and professionalism, including hands-on troubleshooting and escalations. Provide Tier 1 and Tier 2 technical support for end users. Perform basic administration of endpoint security and compliance policies (e.g., Intune app protection, DLP settings). Assist clients in understanding and adopting Microsoft cloud services. Document issues, resolutions, and changes for internal and client-facing records. Requirements Proven experience supporting Microsoft 365 environments (minimum 4 years). Strong understanding of O365 administration portals, Exchange Online, SharePoint, and Intune. Ability to clearly communicate technical concepts in English (spoken and written). Familiarity with troubleshooting Windows endpoints, Azure AD, conditional access, MFA, and compliance settings. Willingness to work exclusively night shifts and out of our Gurugram office. Ability to independently manage and prioritize tasks in a fast-paced environment. Preferred Qualifications Microsoft Certifications (e.g., MS-100, MS-101, SC-300, MD-102) are a plus. Exposure to Microsoft Purview (Compliance, DLP, Insider Risk Management) preferred. Familiarity with cybersecurity principles and endpoint protection tools.
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
Hyderabad
Hybrid
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Illumio Micro Segmentation. Experience: 8-10 Years.
Posted 1 week ago
6.0 - 8.0 years
20 - 35 Lacs
Pune
Work from Office
Technical Skills: • Industry Certifications and an educational background from Information Technology • Strong experience of security tools and techniques including o Firewall, IDS/IPS o multi-factor authentication o Network authentication o Zero Trust Network Access o WAF & DDoS Protection • Strong Knowledge and understanding on o Public Cloud o Cisco ASA, VPN and Network device o Hybervisor and virtual machine o Active Directory o SIEM, Endpoint Detection & Response (EDR), Application Whitelisting, Data leakage and Malware Analysis • Practical knowledge with Windows, Linux, and TCP/IP networking • Solid scripting experience on any of the following Python/Perl/Bash/Power Shell could be an advantage • Hands-on experience on security incident response Any Additional Requirements Personal Attributes • Roles and Responsibilities Technical Skills: • Industry Certifications and an educational background from Information Technology • Strong experience of security tools and techniques including o Firewall, IDS/IPS o multi-factor authentication o Network authentication o Zero Trust Network Access o WAF & DDoS Protection • Strong Knowledge and understanding on o Public Cloud o Cisco ASA, VPN and Network device o Hybervisor and virtual machine o Active Directory o SIEM, Endpoint Detection & Response (EDR), Application Whitelisting, Data leakage and Malware Analysis • Practical knowledge with Windows, Linux, and TCP/IP networking • Solid scripting experience on any of the following Python/Perl/Bash/Power Shell could be an advantage • Hands-on experience on security incident response Any Additional Requirements Personal Attributes •
Posted 1 week ago
6.0 - 11.0 years
20 - 35 Lacs
Hyderabad, Bengaluru, Delhi / NCR
Hybrid
Shift timings- 2 PM -11 PM Primary skills Azure Security Defender, Sentinel,(identity, Endpoint, etc.) Secondary skills Azure Infrastructure, Office 365 collab workloads Required Skills & Experience: Technical Expertise: Strong understanding of Azure security offerings, including but not limited to: Microsoft Defender for Cloud / Endpoint / Identity Microsoft Sentinel (SIEM/SOAR) Microsoft Entra (Identity Governance, Conditional Access) Hands-on experience with cloud security assessments, PoC deployments, and client workshops. Familiarity with Zero Trust architecture and related best practices. Professional Experience: 5+ years in IT security roles, with 2+ years focused on Azure or cloud security. Proven track record of leading technical engagements independently. Soft Skills: Excellent communication and presentation skills. Ability to articulate technical concepts to both technical and business audiences. Self-starter who thrives in a fast-paced, client-facing environment. Preferred Qualifications: Microsoft certifications (e.g., SC-100, AZ-500, SC-200) Experience working with Microsoft partners or within funded engagement programs. Exposure to regulatory compliance frameworks (e.g., ISO, NIST, GDPR) Key Responsibilities: Client Engagements: Conduct security assessments and discovery workshops to understand client environments, security gaps, and cloud readiness. Deliver technical Proof of Concepts (PoCs) and hands-on demonstrations of Microsoft Azure security solutions. Host and facilitate technical workshops on Zero Trust, Microsoft Defender, Sentinel, Entra, and related technologies. Provide technology walkthroughs, highlight use cases, and share practical experience to illustrate business value. Solution Design & Implementation: Design and recommend secure architectures and configurations using Azure-native tools and services. Collaborate on solution development, documentation, and client readiness for security modernization. Internal & Cross-Functional Collaboration: Work closely with Sales, PreSales, and regional delivery teams to align on customer needs, technical strategy, and success metrics. Contribute to proposal development and client presentations from a technical security standpoint. Thought Leadership & Enablement: Stay updated on Azure security advancements and share knowledge internally and with clients. Support internal enablement sessions and mentor junior team members, where applicable.
Posted 1 week ago
4.0 - 6.0 years
14 - 20 Lacs
Gurugram, Manesar
Hybrid
Threat Protection Engineer | ACPL Must have Microsoft Threat Detection & Protection, Defender, and Cloud Security experience. Should be able to provide L3 support.its a 2 yrs bond with ACPL Company/Manesar location-Hybrid
Posted 1 week ago
15.0 - 20.0 years
13 - 17 Lacs
Pune
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Endpoint Extended Detection and Response Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are looking for a motivated and skilled Endpoint Security Engineer with 3 plus years of experience in managing and securing endpoints using Microsoft Defender for Endpoint, Symantec Endpoint Protection, and DLP solutions. The ideal candidate will play a critical role in enhancing the security posture of our endpoints across the enterprise. Roles & Responsibilities:- Configure, manage, and monitor Microsoft Defender for Endpoint and Symantec Endpoint Protection.- Implement, manage, and tune Data Loss Prevention (DLP) policies and rules across endpoints and email gateways.- Investigate, analyze, and respond to security alerts and endpoint incidents.- Coordinate with SOC and IT teams for triage and remediation of malware, ransomware, and other endpoint-based threats.- Conduct endpoint vulnerability assessments and patch validation in coordination with vulnerability management teams.- Maintain endpoint protection baselines and enforce policy compliance across user devices.- Generate reports on endpoint protection status, incident trends, and DLP violations.- Ensure continuous improvement of endpoint threat detection and response processes.- Participate in root cause analysis (RCA) of endpoint-related security events. Professional & Technical Skills: -Strong knowledge and hands-on experience with:-Microsoft Defender for Endpoint / Microsoft 365 Defender-Symantec Endpoint Protection (SEP)-DLP solutions (Microsoft Purview DLP, Symantec DLP, or equivalent)-Understanding of endpoint threat vectors, malware, and mitigation techniques.-Familiarity with SIEM tools and EDR workflows.-Basic scripting knowledge (PowerShell, Python, or batch scripting) for automation and investigation tasks.-Strong troubleshooting skills related to endpoint protection agents and policies. Additional Information:- The candidate should have minimum 2 years of experience in Endpoint Extended Detection and Response.- This position is based at our Pune office.- A 15 years full time education is required. Bachelors degree in Cybersecurity, Computer Science, Information Technology, or a related field Preferred certifications:Microsoft SC-200 (Microsoft Security Operations Analyst) ,Symantec Endpoint Protection certification (if available) and CompTIA Security plus. Qualification 15 years full time education
Posted 1 week ago
4.0 - 7.0 years
15 - 25 Lacs
Bengaluru
Work from Office
Role Summary: We are looking for a skilled professional with 3–5 years of experience in monitoring, analysis, and incident handling using Palo Alto Cortex XDR/XSIAM. The ideal candidate will be responsible for managing alerts, conducting investigations, and optimizing detection capabilities within the Cortex platform. Key Responsibilities: Monitoring & Analysis: Review and analyze alerts generated by Cortex XDR/XSIAM. Perform triage and determine the relevance and severity of events. Identify patterns, anomalies, and potential risks in data. Incident Handling: Investigate and respond to events and alerts. Conduct root cause analysis and document findings. Coordinate with internal teams for resolution and follow-up. Platform Optimization: Fine-tune detection rules and response playbooks. Ensure efficient data ingestion and alert accuracy. Collaborate with engineering teams to enhance platform performance. Proactive Analysis: Conduct exploratory analysis to identify potential issues. Leverage threat intelligence and contextual data to improve detection. Develop custom queries and dashboards for visibility and reporting. Documentation & Reporting: Maintain detailed logs and reports of investigations. Provide insights and recommendations to improve processes. Required Qualifications: 3–5 years of relevant experience in monitoring, analysis, or incident response. Hands-on experience with Palo Alto Cortex XDR/XSIAM. Strong understanding of endpoint, network, and cloud data. Familiarity with detection frameworks and analytical tools. Good scripting knowledge (e.g., Python, PowerShell) is a plus. Strong analytical and communication skills. Preferred Certifications: PCCSA or PCNSE (Palo Alto Networks) CompTIA Security+, CEH, or equivalent (optional)
Posted 1 week ago
3.0 - 8.0 years
10 - 18 Lacs
Bengaluru
Work from Office
Job Role Sr. Endpoint System Engineer Experience 5-8 Years Location Bangalore Mode Of work Office (5 Days) Shift Time UK-US Time Zone Required Skills & Qualifications: Experience with deploying, configuring, and supporting MDM solutions such as Air Watch, Or Workspace one or Microsoft Intune. Excellent communication skills: You can clearly and concisely explain technical concepts to both technical and non-technical audiences and • effective communication with interpersonal skills. 3-5 years of experience in the cybersecurity domain, with a focus on MDM (Mobile Device Management), RMM (Remote Monitoring and Management), or Patch Management tools. Strong understanding of security frameworks and protocols for device management, remote monitoring, and patching. Familiarity with RMM and Patch Management tools like Kaseya, ConnectWise, or Ninja RMM. Basic understanding of network security, endpoint protection, and IT infrastructure. Strong organizational skills: You can manage multiple tasks and prioritize effectively in a fast-paced environment. Your approach challenges with enthusiasm and a can-do spirit and the ability to work independently and collaboratively in a fast-paced environment. A team player mentality: You thrive in a collaborative environment and are willing to go the extra mile to support your colleagues. BE or B-Tech in (Any Branch) Desired Skills: (Good to have) Certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or any other relevant cybersecurity certifications. Experience in network security and endpoint management. Knowledge of cloud security concepts and technologies
Posted 1 week ago
4.0 - 9.0 years
5 - 12 Lacs
Gurugram, Delhi / NCR
Work from Office
Role & responsibilities IT Infrastructure: Provide Level 2 support for IT infrastructure (Windows/Linux servers, storage, virtualization, cloud). Monitor and manage network devices (routers, switches, firewalls, wireless controllers). Perform routine maintenance and troubleshooting of systems, servers, and network equipment. Assist with server patching, upgrades, and configuration changes. Support Office 365, Active Directory, DNS, DHCP, and VPN infrastructure. Collaborate with L1 support to resolve escalated issues. Manage backup and disaster recovery systems. Maintain inventory of hardware/software assets and license compliance. Cybersecurity: Monitor and respond to security alerts and incidents (EDR, SIEM, firewalls). Assist in implementing and maintaining security policies, standards, and procedures. Support vulnerability assessments and remediation activities. Administer security tools (antivirus, endpoint protection, firewalls, DLP, MFA). Conduct periodic access reviews and security audits. Support compliance efforts (ISO 27001, GDPR, etc.) and risk mitigation strategies.
Posted 1 week ago
4.0 - 9.0 years
5 - 12 Lacs
New Delhi, Gurugram
Work from Office
Department: IT Permanent Payroll: - XP India. Location: Gurgaon Reports To: IT Manager / IT Head Employment Type: Full-time Job Summary: - We are seeking a skilled and proactive L2 IT Engineer specializing in IT Infrastructure and Cybersecurity to join our dynamic IT team. The ideal candidate will be responsible for managing, maintaining, and securing the organization's IT infrastructure. This includes providing advanced support for networks, servers, endpoints, and cybersecurity solutions, as well as assisting in implementing best practices for IT security and compliance. Key Responsibilities: IT Infrastructure: Provide Level 2 support for IT infrastructure (Windows/Linux servers, storage, virtualization, cloud). Monitor and manage network devices (routers, switches, firewalls, wireless controllers). Perform routine maintenance and troubleshooting of systems, servers, and network equipment. Assist with server patching, upgrades, and configuration changes. Support Office 365, Active Directory, DNS, DHCP, and VPN infrastructure. Collaborate with L1 support to resolve escalated issues. Manage backup and disaster recovery systems. Maintain inventory of hardware/software assets and license compliance. Cybersecurity: Monitor and respond to security alerts and incidents (EDR, SIEM, firewalls). Assist in implementing and maintaining security policies, standards, and procedures. Support vulnerability assessments and remediation activities. Administer security tools (antivirus, endpoint protection, firewalls, DLP, MFA). Conduct periodic access reviews and security audits. Support compliance efforts (ISO 27001, GDPR, etc.) and risk mitigation strategies. Required Skills & Qualifications: Bachelors degree in Computer Science, Information Technology, or related field. 35 years of experience in IT support with a focus on infrastructure and cybersecurity. Strong knowledge of Windows Server, Active Directory, Group Policies, and Office 365. Experience with network troubleshooting and configuration (LAN/WAN, VLANs, VPN). Familiarity with virtualization (VMware/Hyper-V) and cloud platforms (Azure/AWS). Hands-on experience with cybersecurity tools such as EDR, firewalls, SIEM, DLP. Understanding of cybersecurity frameworks and standards (NIST, ISO 27001). Strong problem-solving and analytical skills. Excellent communication and documentation skills.
Posted 1 week ago
2.0 - 3.0 years
4 - 8 Lacs
Gurugram
Work from Office
Ensure that all SOC (Security Operations Center) tickets are handled and resolved within SLAs (Service Level Agreements). Perform detailed analysis of threats and security events, using sound analytical skills, knowledge, and experience, with a clear narrative to support conclusions. Maintain records of security events investigated, detailed notes of security incident resolution, and incident response activities, utilizing ticketing systems. Make situational incident response recommendations based on best practice security policies that address the clients business need. Research and stay up to date with current security vulnerabilities, attacks, threat actors, security advisories and the MITRE Attack Framework. Manage, maintain, and monitor security alerting systems from remote communications sites to ensure company compliance. Create and run search queries in SIEM tool to help with identifying and troubleshooting security issues. Utilize tools (e.g., Wireshark, Nmap, PCap, etc.) to identify and map devices on the network. Open, track and close trouble tickets. Answer incoming hot line calls and monitor various e-mail accounts and act according to SOC procedures and processes. Interface with client through email, phone calls, and meetings or Aspire field personnel to mitigate security incidents. Assist with the preparation of SOC reports, research papers, and blog posts. Investigate and provide technical analysis of various security incidents and possible compromise of systems. Works as Tier I/L1 support and will work directly with Tier II/L2 and TIER III/L3 and NOC Engineers for issue resolution. Provide direct communication to affected users and companies on security incidents and maintenance activities. Maintain customer technical information within defined documentation standards. Obtain/maintain technical/professional certifications applicable to position or as directed. Communicate with customers, peers, team, and managers regarding incident and change management. Provide emergency on-call support on a rotating schedule. Perform other duties as assigned. Technical Skills Strong troubleshooting and problem-solving skills. Excellent communication and interpersonal skills. Ability to work independently and as part of a team. Strong organizational and time management skills. Willingness to work after hours and provide on-call support. Nice-to-have skills Qualifications Bachelors degree in computer science, Information Technology, or a related field. Experience of 2 to 3 years relevant experience. 1+ year of professional work experience in cyber security field 1+ year of experience with Security Event / Alert Management, Incident Response, and Change Management Processes 1+ year of experience handling security events related to Malware Detection and Analysis, Indicators of Compromise (IOC), Email Phishing, Endpoint Detection and Response (EDR) Knowledge of Runbooks, Playbooks and following Standard Operating Procedures Possession of an Industry Certification (Security+, CySA+, Cisco Cyber-Ops Associate, NSE4, or similar) 1+ years of experience in Security Management. SIEM and Log Management (MS Sentinel , IBM QRadar ,Splunk, OSSIM, FortiSIEM, LogRhythm, etc.) Experience with Firewalls (Palo Alto Networks, Cisco Firepower Manager) Experience with Endpoint Security (Cisco Secure Endpoint, CrowdStrike Falcon, Carbon Black, Microsoft Advanced Threat Protection) Experience with Network Traffic Analytics (Cisco Stealthwatch Cloud, Darktrace) Experience with DNS Security (Cisco Umbrella, Forcepoint) 2+ years of experience with Ticket Management Tools (e.g., ConnectWise, ServiceNow)
Posted 1 week ago
4.0 - 9.0 years
9 - 11 Lacs
Chennai
Work from Office
Hi All, Movate ( Formerly known as CSSCorp ) is hiring for Senior Endpoint Security Engineer Role. Job Responsibilities: Provide Technical Support to customers and partners Provide technical services include writing scripts, troubleshooting and best practices to customers Manage support cases to ensure issues are recorded, tracked, resolved, and follow-ups are completed in a timely manner Provide fault isolation and root cause analysis for technical issues Publish Technical Support Bulletins and other technical documentation in the Knowledge Base Review of technical documentation for training materials, technical marketing collateral, manuals, troubleshooting guides, etc. Travel to customer sites in the event of a critical situation to expedite resolution as required Provide on-call support 24x7 on an as needed basis Provide configurations, troubleshooting and best practices to customers. Work with our Engineering team and influence the operability of the product. Participate in regular weekend on-call rotation and provide after-hours support on an as-needed basis. Able to effectively communicate to all levels and stakeholders - internally and externally on complex technical issues Desired Skills 3+ years of related experience. Provide configurations, troubleshooting and best practices to customers. Required experience with supporting EndPoint software products. Required strong experience with Windows OS, Linux OS and macOS based applications (Installation, troubleshooting, Debugging). Experience with Android OS based applications (Installation, troubleshooting, Debugging). Strong experience with MS environment (SCCM, GPO, AD, MSSQL, IIS). Experience with EndPoint security software is a plus (Antivirus, DLP, IPS, NAC). Knowledge of SIEM, vulnerability management tools and firewalls. Experience understanding malware, exploits, operating system structure and behavior. Experience with batch scripting and Python is a plus Strong ability to independently troubleshoot, reproduce issues and identify feasible workarounds in broad, complex, and unique environments with mixed applications and protocols required. Knowledge of Cloud infrastructure a plus Knowledge of VDI (VMWare Horizon, Citrix XenApp and XenDesktop) is a plus BS/MS or equivalent experience require
Posted 1 week ago
7.0 - 12.0 years
20 - 32 Lacs
Hyderabad
Work from Office
Key Responsibilities: Endpoint Security Solution Management: This includes deploying, configuring, and managing various endpoint security solutions, such as antivirus/anti-malware, endpoint detection and response (EDR), application control, and host-based intrusion detection/prevention systems. Tanium Platform Expertise: A deep understanding and hands-on experience with the Tanium platform is essential, including its capabilities for endpoint visibility, security management, and incident response. Troubleshooting and Incident Response: The role involves troubleshooting issues related to endpoint security solutions, investigating security incidents, and working towards their resolution. Configuration and Policy Management: This includes creating, maintaining, and updating endpoint configuration baselines, ensuring they align with organizational security policies and best practices. Collaboration and Communication: The role requires close collaboration with IT security teams, system administrators, and other stakeholders to ensure a coordinated approach to endpoint security. Compliance: Ensuring that endpoint security practices and configurations comply with relevant industry standards and regulatory requirements. Documentation: Maintaining comprehensive documentation of all endpoint security-related activities, configurations, and procedures. Threat Detection and Response: This involves developing, implementing, and maintaining detection mechanisms to identify and respond to potential threats on endpoints. Vulnerability Management: Utilizing tools like Tanium to assess the patch status of endpoints, identify vulnerabilities, and remediate them effectively. Required Skills: Endpoint Security Knowledge: A strong understanding of endpoint security principles, technologies, and best practices. Tanium Platform Proficiency: Hands-on experience with the Tanium platform, including its core functionalities and modules. Troubleshooting and Problem-Solving: The ability to effectively troubleshoot and resolve endpoint security-related issues. Scripting and Automation: Experience with scripting languages (e.g., PowerShell, Python) to automate tasks related to endpoint management and security. Operating System Knowledge: Familiarity with standard operating systems like Windows, Linux, and MacOS. Communication and Collaboration: Excellent communication and collaboration skills to work effectively with various teams and stakeholders. Cloud Security: Knowledge of cloud-based endpoint security solutions and their integration with on-premise systems. Security Certifications: Relevant security certifications (e.g., CompTIA Security+, CISSP) can be beneficial.
Posted 1 week ago
11.0 - 14.0 years
55 - 60 Lacs
Noida, Ahmedabad, Mumbai (All Areas)
Work from Office
Dear Candidate, We are looking for a skilled Cybersecurity Analyst to monitor, detect, and respond to security threats. If you have expertise in threat intelligence, SIEM tools, and incident response, wed love to hear from you! Key Responsibilities: Monitor network traffic and systems for potential security threats. Investigate and analyze security incidents to prevent breaches. Implement security controls and best practices for data protection. Manage security tools such as SIEM, IDS/IPS, and endpoint protection. Conduct vulnerability assessments and recommend mitigation strategies. Ensure compliance with security standards like ISO 27001, NIST, and GDPR. Required Skills & Qualifications: Strong knowledge of security frameworks and incident response. Experience with SIEM tools (Splunk, QRadar, ArcSight). Proficiency in scripting (Python, Bash, PowerShell) for security automation. Understanding of network protocols, firewalls, and VPN security. Knowledge of penetration testing and ethical hacking techniques. Soft Skills: Strong analytical and problem-solving skills. Excellent attention to detail and ability to work under pressure. Good communication and teamwork skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Delivery Manager Integra Technologies
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SailPoint Identity Mgmt and Governance. Experience: 8-10 Years.
Posted 2 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: F5 Load Balancers. Experience: 8-10 Years.
Posted 2 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Fortinet Firewall. Experience: 8-10 Years.
Posted 2 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Azure Cloud Workload Security. Experience: 8-10 Years.
Posted 2 weeks ago
4.0 - 8.0 years
15 - 17 Lacs
Pune
Hybrid
About Client Hiring for One of the Most Prestigious Multinational Corporations! Job Description Job Title: Endpoint security Engineer Required skills and qualifications : Endpoint MS defender Qualification : Any Graduate or Above Relevant Experience :4+ yrs Location : Pune CTC Range : 15 to 17 LPA (fixed) Notice period : immediate joiners /Currently serving Mode of Interview : Virtual Mode of Work : Hybrid If you are interested share the below: Name as per your pan card: Mobile No: Email ID: Current and perferred location: Current and Expected CTC: Total and Relevent Experience: Official notice period: (if serving/immediate - LWD) Gayatri G Staffing analyst - IT recruiter Black and White Business solutions PVT Ltd Bangalore, Karnataka, INDIA gayatri@blackwhite.in / www.blackwhite.in +91 8067432430
Posted 2 weeks ago
6.0 - 11.0 years
15 - 20 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats. Do Design and develop enterprise cyber security strategy and architecture Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses Identify risks associated with business processes, operations, information security programs and technology projects Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge Identify security design gaps in existing and proposed architectures and recommend changes or enhancements Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. Provide support during technical deployment, configuration, integration and administration of security technologies Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity Provide solution of RFPs received from clients and ensure overall design assurance Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture Depending on the clients need with particular standards and technology stacks create complete RFPs Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps Evaluate and recommend solutions to integrate with overall technology ecosystem Tracks industry and application trends and relates these to planning current and future IT needs Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers Provide training to employees on issues such as spam and unwanted or malicious emails Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Program Manager/Director Regular reporting & updates Infrastructure (CIS team) For infrastructure support External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively: Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming security technologies (e.g. Firewalls, IPS, DDoS, SIEM, WAF, Endpoint etc.) and understanding of compliance regulatory requirement like PCI DSS, HIPAA, etc.- Expert Systems Thinking - Understanding of the Wipro system (interrelatedness, interdependencies and boundaries) and perform problem solving in a complex environment - Expert Leveraging Technology - In-depth knowledge of and mastery over ecosystem technology that commands expert authority respect - Master Technical Knowledge - Certified Information Systems Security Professional (CISSP), Cloud Architect Certification from AWS and Azure, ToGAF or SABSA certification- Master Competency Levels Foundation Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. Competent Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. Expert Applies the competency in all situations and is serves as a guide to others as well. Master Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. Behavioral Competencies Effective Communication Managing Complexity Client centricity Technology Acumen Innovation Problem Solving approach Collaborative Working Execution Excellence
Posted 2 weeks ago
3.0 - 5.0 years
6 - 10 Lacs
Chennai
Work from Office
Role Purpose The purpose of the role is to resolve, maintain and manage clients software/ hardware/ network based on the service requests raised from the end-user as per the defined SLAs ensuring client satisfaction Candidate should have the experience of customer facing role: Primary Knowledge: - Hands-on experience in Creation of MSI, MSIX, Intunewin packages using Flexera Admin Studio/ Install-shield, Microsoft Tools like Win32 Content Prep & MSIX Packaging tool Experience in creating Connection groups and Runvirtual keys Basic to Intermediate know-how and experience towards Scripting VB script / PowerShell scripting Knowledge of Operating Systems Win 10, Win11 Experience with SCCM (Microsoft Endpoint Configuration Manager) Support the Service & Product Manager across several technical domains Contribute expertise to the management of existing and new IT products and services Define workarounds for known errors and initiate process improvements Strong understanding of performance analysis for Applications packaging process Experience in Testing and implementing Application Packages Establish and implement policies, procedures, and technologies. Familiarity with support processes, including Incident, Problem, Request, Event, and Change Management Mandatory Skills: Application Packaging - Windows. Experience: 3-5 Years.
Posted 2 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: IDAM Security Consulting. Experience: 8-10 Years.
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough