Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
15.0 - 20.0 years
17 - 22 Lacs
Hyderabad
Work from Office
Skills Skill Vendor Management ITIL IT Service Management Project Management Data Center IT Operations Solution Architecture IT Strategy Business Development IT Management Education Qualification No data available CERTIFICATION No data available Job Summary 15+ years’ total experience, including 5+ years in a production 24/7 high-availability multi-site enterprise ERP environment, including application hosting, voice and data networks, security and information protection. Demonstrating a deep technical and strategic understanding of the IT Services and Operations delivered by Sterling. Develop and implement comprehensive IT infrastructure strategies to support business goals and operations. Oversee all IT infrastructure activities, including network management, system administration, and IT security. Experience in leading overall infrastructure for a complex organization and network, including multicounty setup, VLAN setup for regulatory requirements, managing data protection, etc. Managing the day-to-day operational tasks within the IT Infrastructure team. Overseeing the annual IT budget and ensuring cost-effectiveness. Monitoring daily operations, including server hardware, software, and operating systems. Coordinating technology installations, upgrades, and maintenance. Coordinating with the central procurement team for purchase follow-ups, invoice submissions, and vendor follow-ups to complete the tasks. Generating performance reports for operating systems and the Service Desk function. Ensuring all IT activities are performed within the parameters of defined KRA’s and KPI’s. Solving complex and diverse problems by continually re-evaluating new and/or conflicting factors. Managing internal and external communications and being the primary contact of escalation for business issues. Assisting with the management of relationships with external organizations and suppliers. Implement and maintain IT security measures as recommended by Security Teams Ensure compliance with relevant regulations and standards, such as HiTrust, HIPAA, and ISO/IEC 27001. Collaborate with other departments such as IT operations, software development, and customer support to align IT infrastructure efforts with business objectives. Work closely with senior executives to provide IT infrastructure insights and recommendations. Lead and mentor the IT infrastructure team, fostering a culture of high performance and technical excellence. Ensure the IT infrastructure team has the skills and resources necessary to support the company’s objectives. Ability to develop and implement strategic IT infrastructure plans aligned with business objectives. Experience in providing strategic recommendations to senior management. Strong leadership skills with the ability to inspire and lead a high-performing IT infrastructure team. Experience in managing cross-functional teams and working collaboratively with other senior executives. Communication and Interpersonal Skills: Excellent communication skills with the ability to effectively present technical information to various stakeholders including the board of directors, employees, and external partners. Strong interpersonal skills with the ability to build and maintain relationships with internal and external stakeholders. Education Min 15 years of Experience in servers, endpoints, and other Infra applications. A bachelor’s degree in Information Technology, Computer Science, or a related field is typically required. Professional certifications such as Certified Information Systems Security Professional (CISSP) or Cisco Certified Internetwork Expert (CCIE) can enhance a candidate’s credentials. Exposure to ITIL concepts and adoption.
Posted 18 hours ago
6.0 - 8.0 years
8 - 10 Lacs
Bengaluru
Work from Office
We’re looking for an experienced, motivated hands-on engineer who brings ideas about large-scale design, security, Cloud, UI design and mobile technologies; As a software engineer, you’ll apply your deep expertise in designing, developing and delivering a world class UEM solution. You need to be versatile, display leadership qualities and open minded to take on new problems that our customers face. ESSENTIAL JOB FUNCTIONS: Analyzes and designs software modules, features or components of software programs and develops related specifications using C++, C#, MFC, and Powershell Develops, tests, documents and maintains complex software programs for assigned systems, applications and/or products. Gathers and evaluates software project requirements and apprises appropriate individual(s). Codes, tests and debugs new software or enhances existing software. Troubleshoots and resolves or recommends solutions to complex software problems. Provides senior level support and mentoring by evaluating product enhancements for feasibility studies and providing completion time estimates. Assists management with the planning, scheduling, and assigning of projects to software development personnel. Ensures product quality by participating in design reviews, code reviews, and other mechanisms. Interacts effectively with Quality Assurance team. Participates in developing test procedures for system quality and performance. Writes and maintains technical documentation for assigned software projects. Provides initial input on new or modified product/application system features or enhancements for user documentation. Reviews user documentation for technical accuracy and completeness. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 6-8+ years of relevant experience Strong C++, C# programming and object-oriented skills Extensive knowledge of Windows internals - Registry/Process Management, Memory & Resource Management and WinAPIs. Good understanding of .NET framework Strong debugging & troubleshooting skills Other LanguagesC , Java DatabasesMS SQL Server; Oracle Tools & IDEMicrosoft Visual Studio, Jenkins, Git Operating SystemsWindows 10+, Window Server Preferred technical and professional experience Operating SystemsUnix, Linux LanguageLUA Device Management and security concepts. Endpoint Configuration Management
Posted 20 hours ago
4.0 - 9.0 years
6 - 11 Lacs
Mumbai
Work from Office
The CyberArk Operation Support Team Lead is a pivotal role responsible for overseeing and managing the day-to-day operations of the CyberArk environment. This position involves leading a team of support professionals, ensuring the availability, performance, and security of CyberArk solutions, and collaborating with cross-functional teams to deliver efficient privileged access management. Key Responsibilities * Team LeadershipSupervise and mentor a team of CyberArk support professionals, fostering collaboration and skill development. * Operational ManagementOversee the operational aspects of CyberArk solutions, ensuring 24/7 availability, scalability, and optimal performance. * Incident ManagementLead the resolution of CyberArk-related incidents and problems, coordinating with technical teams and stakeholders to ensure timely and effective solutions. * Security EnhancementCollaborate with the security team to implement and enhance security controls, policies, and procedures for privileged access management. * Performance MonitoringMonitor system performance, conduct regular health checks, and proactively identify and address potential performance bottlenecks. * Patch and Upgrade ManagementPlan and execute system upgrades, patches, and enhancements, ensuring minimal disruption to ongoing operations. * DocumentationMaintain thorough documentation of configurations, processes, and procedures related to CyberArk operations. * Vendor ManagementCoordinate with CyberArk vendors for support, troubleshooting, and escalations to ensure timely issue resolution. * Continuous ImprovementDrive continuous improvement initiatives to enhance the effectiveness and efficiency of CyberArk operations. * ReportingGenerate regular reports on system performance, incident management, and operational metrics for management review. * Willing to work in 24/7 operations and project support activities Required education Bachelor's Degree Preferred education Associate's Degree/College Diploma Required technical and professional expertise Proven experience in CyberArk operations and support, with a minimum of 4+years of hands-on experience. * Professional certifications such as CyberArk Certified Trustee (CCT) or Certified Delivery Engineer (CDE). Strong knowledge of privileged access management concepts and CyberArk technologies. Experience in organizations control, monitor, and secure privileged access across their IT infrastructure. Good Exposure in endpoint Analytics capabilities to identify unusual or suspicious activities related to privileged access. Preferred technical and professional experience * Leadership skills with the ability to guide and mentor a team effectively. * Problem-solving aptitude with a proactive approach to resolving technical challenges. * Strong communication skills for effective collaboration with cross-functional teams. * Detail-oriented mindset with a commitment to maintaining high standards. * Adaptability to changing requirements and a willingness to stay updated on emerging technologies
Posted 20 hours ago
10.0 - 15.0 years
12 - 17 Lacs
Pune
Work from Office
Wipro Limited (NYSE:WIT, BSE:507685, NSE:WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role : Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 week ago
10.0 - 20.0 years
12 - 22 Lacs
Bengaluru
Work from Office
About The Role : Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led
Posted 1 week ago
5.0 - 10.0 years
12 - 17 Lacs
Hyderabad
Work from Office
About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
Bengaluru
Work from Office
Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role _x000D_ Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? _x000D_ Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? _x000D_ i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? _x000D_ 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? _x000D_ Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Cloud Security Posture Management_x000D_. Experience8-10 Years_x000D_. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 week ago
6.0 - 11.0 years
12 - 17 Lacs
Kolkata
Work from Office
Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Saviynt. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 week ago
6.0 - 11.0 years
12 - 17 Lacs
Bengaluru
Work from Office
Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 week ago
3.0 - 5.0 years
4 - 8 Lacs
Bengaluru
Work from Office
About The Role Primary Skill (Technical Skill) Application Packaging Secondary Skill Windows, MECM, Intune ? Experience Level 6 –8 Years (B3) 3 - 5 Years (B2) Location of Posting Chennai Rates Including Mark up - 80 K/M - 90K/M ? Candidate should have the experience of customer facing role Primary Knowledge- Hands-on experience in Creation of MSI, MSIX, Intunewin packages using Flexera Admin Studio/ Install-shield, Microsoft Tools like Win32 Content Prep & MSIX Packaging tool Experience in creating Connection groups and Runvirtual keys Basic to Intermediate know-how and experience towards Scripting – VB script / PowerShell scripting Knowledge of Operating Systems – Win 10, Win11 Experience with SCCM (Microsoft Endpoint Configuration Manager) ? Support the Service & Product Manager across several technical domains Contribute expertise to the management of existing and new IT products and services Define workarounds for known errors and initiate process improvements Strong understanding of performance analysis for Applications packaging process Experience in Testing and implementing Application Packages Establish and implement policies, procedures, and technologies. Familiarity with support processes, including Incident, Problem, Request, Event, and Change Management. ? Mandatory Skills: Application Packaging - Windows. Experience3-5 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
Hyderabad
Work from Office
About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: ForgeRock Identity Manager. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 week ago
10.0 - 20.0 years
12 - 22 Lacs
Bengaluru
Work from Office
About The Role : Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led
Posted 1 week ago
6.0 - 8.0 years
7 - 8 Lacs
Pune
Work from Office
Diverse Lynx is looking for Network Security Engineer to join our dynamic team and embark on a rewarding career journey Maintaining LAN, WLAN and architecture of the server as per the business policy Reporting the security analysis of findings Maintaining the regulatory systems about ISMS policy (Information System Management Systems) Developing the security authentication protocol Maintaining server and switches Maintaining & implementation of the SOP for Network security Knowledge of performing routing protocols (MPLS, HAIPE/IP, QOS and WAN) Monitoring of web security gateways, perimeter security, network access controls, endpoint security Experience with Ansible for automation and configuration management
Posted 1 week ago
5.0 - 10.0 years
7 - 11 Lacs
Bengaluru
Work from Office
The Group Security (GS) Cybersecurity Defense Center (CDC) team is looking for a Security Operations Center (SOC) Analyst, responsible for execution of incident response, investigative analysis of security incidents, reporting, continuous improvement, and post-incident activities. Will work closely with the CDC Engineering Team, internal Nokia teams, external Security Suppliers, and various technology vendors. Group Security (GS) is part of Strategy & Technology and Nokias central knowledge center for Nokias cybersecurity policies and standards, the cybersecurity architecture and roadmap, and the monitoring and alerting of security incidents. You have: 5+ years of experience in a Security Operations Center (SOC) or similar role 2+ years of experience working with one or more of following systemsMicrosoft Sentinel, Microsoft Defender for Endpoint (MDE), Microsoft Defender for Identity (MDI), SentinelOne or Rapid7 Deep knowledge of incident response methodologies and forensic analysis techniques Strong understanding of cloud security principles and experience with major cloud platforms (AWS, Azure, GCP) Expertise in leveraging automation tools for enhancing security operations It would be nice if you also had: Certifications such as CompTIA Cybersecurity Analyst (CySA+), GIAC Certified Incident Handler (GCIH), or Certified SOC Analyst (CSA) Mentoring experience with junior analysts Execute complex security investigations using log analysis and threat intelligence across all Nokia assets Collaborate with SOC Engineers to drive automation and implement AI-powered security solutions Apply cloud security best practices and zero-trust architecture principles in security operations Engage with senior stakeholders to communicate security risks and improve incident response efforts Lead advanced threat hunting initiatives leveraging expertise in security tools and techniques Contribute to the continuous development of SOC processes, technologies, and techniques for enhanced security Mentor and guide junior analysts to foster a culture of learning and professional growth Facilitate post-incident activities, ensuring comprehensive reporting and continuous improvement of security measures
Posted 1 week ago
15.0 - 20.0 years
9 - 13 Lacs
Hyderabad
Work from Office
Project Role : Workplace Mgmt & Solutions Practitioner Project Role Description : Provide expertise and/or general administrative space and service support for Accenture people and businesses globally. Must have skills : Microsoft Endpoint Configuration Manager Good to have skills : Microsoft Windows Server Administration, Cloud Infrastructure, Microsoft PowerShellMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Project Role DescriptionDesign, build, configure MECM infrastructure, application deployment, patch management process, OSD. Design and build Windows 10/11 and windows server SOE imageMust have skills:Should be certified/equivalent experienced for configuring and supporting following:oWindows ServersoWindows OS oMECM (including Co-Management)oWindows PatchingoIntuneoAutopilotoAzure ADoPowerShell Good to have skills.Active directory, JAMF, Power BI, Flexera and other application app toolsJob Key Responsibilitiesa.Day to day administration of MECM environment to include engineering new solutions as needed.b.Troubleshoot MECM related issuesc.Providing technical guidance on MECM.d.Provide Tier 3 support for MECMe.Creating and updating technical documentation as required.f.Create monthly reports on windows updates and other compliance parameters Technical Experiencea.Should have strong experience on MECM.b.Ability to design, build and configure MECM environmentc.Design and build applicable Windows image, provide support in image rolloutd.Should be able to design configuration for windows endpoints & serverse.Should have strong hand on Autopilot enrolments and associated configurations and rollout. Professional AttributesExcellent written and oral communication skills Educational QualificationBE/BS in Computer Science, Electronics, Electrical or other branches of engineering, Science graduate Additional InformationAdditional knowledge -- Cloud Technologies Qualification 15 years full time education
Posted 1 week ago
6.0 - 11.0 years
11 - 15 Lacs
Bengaluru
Work from Office
Senior Cybersecurity Analyst with a minimum of 6+ years of experience in thefield of Operation technology, particularly focusing on Endpoint Detection andResponse (EDR) and Intrusion Detection System #40;IDS#41; monitoringtools. The ideal candidate will have demonstrated expertise in Carbon Black AppControl. Carbon Black, MS Defender for Endpoints (EDR/ATP),Data Network Security - IDS, Unix Administration, Windows, Carbon Black, MS Defender for Endpoints (EDR/ATP), Data Network Security - IDS, Unix Administration, Windows. Senior Cybersecurity Analyst with a minimum of 6+ years of experience in the field of Operation technology, particularly focusing on Endpoint Detection and Response (EDR) and Intrusion Detection System (IDS) monitoring tools. The ideal candidate will have demonstrated expertise in Carbon Black App Control.
Posted 1 week ago
4.0 - 8.0 years
6 - 10 Lacs
Pune
Work from Office
Must Have Skills Windows Servers | Domain Controllers | Active Directory | Azure Active Directory | Group Policy Enterprise Proxy Solution - Preferably Zscaler or Netskope. Inline CASB, Web DLP. Zero Trust Platform (Zero Trust Application Access / Zero Trust Remote VPN) Privilege Access Management (PIM/PAM) Basics of hardware, networking, IP addressing, VLAN, LAN, WAN, MPLS Endpoint Security Management. Preferably EDR/XDR CS Falcon, Sentinel One, MS Defender for Endpoint, DLP, ATP, Web Security. Good in Soft skills, logical and analytical thinking, troubleshooting and problem management, ticketing systems, SLA Management, Good to have Azure information protection Microsoft Enterprise Mobility and Security Office 365 Security administration Cloud Computing Basics with Azure / AWS Security administration Web Application Firewall management. Qualifications Basic Graduation and Proficiency in technology areas mentioned. Professional Certifications would be an added advantage.
Posted 1 week ago
4.0 - 9.0 years
14 - 19 Lacs
Bengaluru
Work from Office
About Target As a Fortune 50 company with more than 400,000 team members worldwide, Target is an iconic brand and one of America's leading retailers. At Target, we have a timeless purpose and a proven strategy and that hasn t happened by accident. Some of the best minds from diverse backgrounds come together at Target to redefine retail in an inclusive learning environment that values people and delivers world-class outcomes. That winning formula is especially apparent in Bengaluru, where Target in India operates as a fully integrated part of Target s global team and has more than 4,000 team members supporting the company s global strategy and operations. Joining Target means promoting a culture of mutual care and respect and striving to make the most meaningful and positive impact. Becoming a Target team member means joining a community that values diverse backgrounds. We believe your unique perspective is important, and you'll build relationships by being authentic and respectful. At Target, inclusion is part of the core value. We aim to create equitable experiences for all, regardless of their dimensions of difference. As an equal opportunity employer, Target provides diverse opportunities for everyone to grow and win. About Target Tech Every time a guest enters a Target store or browses Target.com, they experience the impact of Target s investments in technology and innovation. We re the technologists behind one of the most loved retail brands, delivering joy to millions of our guests, team members, and communities. The Sr. Engineering Manager (SEM) is responsible for a managing a team of engineers. This role is accountable for leading a team, developing code, deploying and managing in production. You will be called upon to be the technical representative for your team during cross-team collaborative efforts and planning. Success in this role will require strong and innovative approaches to problem solving, great technical leadership, excellent communication (written and verbal, formal and informal), flexibility, accountability and a self-motivated working style with attention to detail. About Team Our mission is two-foldwe protect the hundreds of thousands of Target endpoints (such as user laptops, in store devices, distribution center technology, servers and containers) from cyber threats while balancing the stability and functionality needs of Target s technology environment. To do this, we use a combination of vendor tools, in-house developed utilities and strong organizational partnerships to achieve shared goals. Use your skills, experience and talents to be a part of groundbreaking thinking and visionary goals. As a Sr. Engineering Manager, you ll take the lead as you Optimize a suite of products to secure Target endpoints. Use innovation and critical thinking to solve complex security and technology problems. Test the efficacy of tools by leveraging adversary emulation tools. Establish good stakeholder relationships and work closely with Tech teams, influence the product roadmap and help drive requirements while being a strong advocate of agile and DevOps practices across the team. Execution of the team-developed strategy, solving enterprise-wide problems and addressing key security concerns. Provide career development and performance management to a team of engineers. Industry endpoint security domain expert, benchmarking with other retailers and companies, staying on top of new trends and technology in a quickly-moving space. About you 4 year degree in Computer Science or equivalent experience 9+ years of engineering experience 1-3 years of managing teams with a strong track record of delivery for cross-functional products Strong written and verbal communication skills with the ability to present complex technical information in a clear and concise manner to variety of audiences Team-orientated, passionate about developing others skills and capabilities Successful track record of working in large enterprise technology ecosystems leading complex technology teams Deep understanding of agile development processes and methodology including continuous integration and delivery, with a mindset of building incrementally and delivering business value quickly Strong collaboration skills, effective management of complex cross-team initiatives and leads with the desire to enable our engineering teams.
Posted 1 week ago
5.0 - 8.0 years
2 - 6 Lacs
Mumbai
Work from Office
Job Information Job Opening ID ZR_1863_JOB Date Opened 13/04/2023 Industry Technology Job Type Work Experience 5-8 years Job Title SCCM Administrator City Mumbai Province Maharashtra Country India Postal Code 400072 Number of Positions 2 Software packaging and deployment or distribution via SCCM. Patch or Patching deployment (window monthly should be deployed in SCCM). Integration SCCM and WSUS (window server update services) for client operation system. OS deployment (win 10 and 11 ). Active Directory Group policies, ad domains service and certificate services on prem solution. Azure ad cloud Knowledge is fine. O365 Admin, configuration, managing and troubleshoot experience needed. Good knowledge or experience is fine. ServiceNow ticketing tool experience needed. Mobility- Intune, Air watch or Vmware workspace one (managing or administration of mobile devices android, iOS, and endpoint) Good to have. Power shell scripting automation Location: Pan India check(event) ; career-website-detail-template-2 => apply(record.id,meta)" mousedown="lyte-button => check(event)" final-style="background-color:#2B39C2;border-color:#2B39C2;color:white;" final-class="lyte-button lyteBackgroundColorBtn lyteSuccess" lyte-rendered=""> I'm interested
Posted 1 week ago
3.0 - 6.0 years
6 - 15 Lacs
Mumbai
Work from Office
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you ready to embark on a technical adventure and become a hero to our external and internal users? As Technical Support at Kyndryl, you'll be part of an elite team that provides exceptional technical assistance, enabling our clients to achieve their desired business outcomes. You'll be a troubleshooter extraordinaire, diagnosing and repairing complex equipment, software, and systems with ease. Nothing will be too challenging for you to solve as you respond to escalated issues, report critical design flaws, reliability and maintenance problems, and bugs. You'll be the go-to person for our customers who require assistance with highly technical or sophisticated products, as well as for customer installations and training. With your passion for technology, you'll provide world-class support that exceeds customer expectations. As Technical Support, you'll perform varying degrees of problem determination and resolution of desktop hardware and software issues using your technical expertise and available resources to ensure that our customers' issues are resolved efficiently and effectively. You'll also have the opportunity to perform installs, moves, adds, and changes (IMAC) activities, as well as data backup and restore on certain accounts for clients, ensuring that all related administrative duties are completed within Service Level Agreement objectives. You will develop a deep understanding of the local and regional infrastructure, as well as key contacts in other competencies, which will enable you to ensure that the proper team is aware of – and taking action on the problem. If you're a technical wizard, a customer service superstar, and have an unquenchable thirst for knowledge, we want you to join our team. Key Responsibilities: Design, implement, and manage endpoint management and security tools. Ensure effective deployment, monitoring, and maintenance of endpoint protection software (e.g., anti-virus, anti-malware, encryption, etc.). Automate the deployment and configuration of endpoint security tools across the organization. Develop and maintain endpoint management processes for patching, updates, and configuration changes. Work with IT and security teams to ensure compliance with security policies, industry regulations, and best practices. Analyze endpoint security events and alerts, and provide recommendations for remediation. Troubleshoot and resolve endpoint security and performance issues. Maintain inventory and tracking of all endpoints in the environment. Assist in the development and enforcement of endpoint security policies and procedures. Collaborate with cross-functional teams (e.g., network, IT, security, operations) to ensure the seamless integration of endpoint tools. Stay up to date with the latest trends and best practices in endpoint security and management. Conduct regular assessments of endpoint health, configuration, and security posture. Create and maintain documentation related to endpoint tools, processes, and configurations. Provide support for endpoint-related incidents and requests from end-users and other IT teams. Your Future at Kyndryl Imagine being part of a dynamic team that values your growth and development. As Technical Support at Kyndryl, you'll receive an extensive and diverse set of technical trainings, including cloud technology, and free certifications to enhance your skills and expertise. You'll have the opportunity to pursue a career in advanced technical roles and beyond – taking your future to the next level. With Kyndryl, the sky's the limit. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Expertise Bachelor’s degree in Computer Science, Information Technology, Engineering, or a related field. Minimun 5+ Years of experience in anakage tool. Proven experience as an Endpoint Tool Engineer, Systems Engineer, or in a similar role with a focus on endpoint security and management, mainly Anakage Automation Tool Strong experience with endpoint security tools such as Symantec, McAfee, CrowdStrike, Carbon Black, or similar. Familiarity with endpoint management systems such as Microsoft Endpoint Configuration Manager (SCCM), Intune, Jamf, or other similar tools. Experience with patch management, system imaging, and software deployment. Knowledge of endpoint security policies and industry regulations (e.g., GDPR, HIPAA). Experience working with Windows, macOS, and mobile operating systems (Android, iOS). Experience with scripting and automation (e.g., PowerShell, Bash, Python). Strong understanding of network security and endpoint threat prevention strategies. Familiarity with Active Directory and Group Policy for endpoint configuration management. Experience with monitoring and reporting tools to track endpoint performance and security status Preferred Technical and Professional Experience Certifications such as CompTIA Security+, CISSP, CEH, or other relevant security certifications. Experience with endpoint detection and response (EDR) tools. Knowledge of cloud-based endpoint management solutions. Familiarity with endpoint backup and recovery strategies. Experience with SIEM systems (e.g., Splunk, ArcSight) for security monitoring. Excellent problem-solving skills and the ability to troubleshoot complex endpoint issues. Strong attention to detail, ensuring that endpoint security and configurations are consistently monitored and optimized. Ability to work effectively in a team environment and collaborate with other departments. Strong written and verbal communication skills for documenting processes and interacting with other teams. Ability to prioritize tasks effectively and manage multiple projects simultaneously. Proactive and self-motivated approach to learning and applying new technologies Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted 1 week ago
3.0 - 8.0 years
4 - 8 Lacs
Bhopal, Patna, Mumbai (All Areas)
Work from Office
Must-Have Skills: Minimum 3 years of experience in EDR (End point security) Minimum experience of 3 years as L1 level Only look for L1 level experienced candidates who are expert on EDR (EDR, incident response) and Trend Micro (Antivirus) Active CEH certificate Requirements: Location: Patna/Bhopal/Mumbai/Kanpur/Kolkata./Delhi Notice Period: Immediate to 30 days Salary Range: 9 LPA (Including 5% variable) Job Type: Work from Office Key Performance Indicators: Assess endpoint security infrastructure Deploy and configure EDR agents Monitor endpoints for suspicious activities Generate real-time alerts for potential security incidents Ensure compatibility with other security systems
Posted 1 week ago
8.0 - 13.0 years
25 - 40 Lacs
Mumbai
Work from Office
Essential Services: Role & Location fungibility To achieve this, employees at ICICI Bank are expected to be role and location-fungible with the understanding that Banking is an essential service. The role descriptions give you an overview of the responsibilities, it is only directional and guiding in nature. About the Role As a Team Lead - SOC Infrastructure Engineer in the banks security operations center (SOC), the individual will be responsible to oversee the implementation of all the underlying IT infrastructure necessary to send logs from all the log sources to the banks new SIEM platform . Key Responsibilities Business Understanding: Responsible to ensure connectivity from all the banks IT systems and applications (whether on cloud or on-prem) to the banks SIEM platform. Responsible to ensure the upkeep of bank’s inventory to reflect the correct status of which systems are reporting logs to the SIEM. General upkeep of the SIEM platform’s health and availability. Collaborate: Lead a team of engineers and provide technical guidance to a team of Security systems engineers who will be responsible for ensuring connectivity from (i)network log sources such as routers, switches, firewalls, load balancers, network Proxy (ii) Server log sources of various categories such as Windows, *nix, AD, Database, AIX, Solaris, etc. (iii) Endpoints (iv) security solutions such as DAM, IDAM, PIM/PAM, IPS, WAF, etc. and (V) Cloud (AWS, Azure, GCP and OCI) to the bank’s SIEM solution such that logs can be ingested by the SIEM platform. Ensuring systems and network readiness for deploying SIEM in the bank’s network. Hosting interactions with the bank’s technology team to resolve any underlying connectivity issues limiting the logs from being sent to the SIEM platform. Work with the respective peers in the bank’s technology group to ingest logs from newly introduced systems and log sources. Work with the designated bank’s department to ensure alignment with RBI guidelines in the respective areas. Vendor Management: Working with the vendors to ensure resolution of issues limiting the sharing of the logs. Qualifications & Skills Educational Qualification: Engineering Graduate in CS, IT, EC or InfoSec, CyberSec or MCA equivalent. Certifications: CCNP, CCNA Security, Any Cloud security certifications (AWS, GCP, Azure, OCI) and/or any Microsoft or VMware or RHEL certifications. Compliance: Stay up to date with the latest trends and developments in cybersecurity and SIEM technologies and recommend improvements to the organization security posture and creation of procedural documents necessary for the department. Communication Skills: Excellent communication and interpersonal skills. Synergize with the Team: Ability to work collaboratively with different teams for closure of activities. Strong understanding of cybersecurity principles will be required. Knowledge of Networking components, Servers (RHEL, Windows, etc.) and Endpoints, and cloud technology will be required including the capability to design new solutions. Strong understanding of cybersecurity principles will be required. You can also apply here - https://www.icicicareers.com/CareerApplicant/Career/job-details/2555533
Posted 2 weeks ago
4.0 - 9.0 years
15 - 19 Lacs
Bengaluru
Work from Office
locationsBangalore, Indiaposted onPosted 10 Days Ago job requisition id30684 FICO (NYSEFICO) is a leading global analytics software company, helping businesses in 100+ countries make better decisions. Join our world-class team today and fulfill your career potential! The Opportunity "This is an opportunity to define, build, and shape the future of FICOs Cybersecurity and Risk Posture. As part of the Threat & Vulnerability Management team, you will collaborate across the business, IT, and client environments to secure our cloud and data center infrastructure. Your contributions will be key to strengthening FICO's defense mechanisms and enhancing our compliance posture. We're looking for a cybersecurity expert passionate about continuous improvement, cloud security, and vulnerability risk reduction. If you're someone who thrives in a fast-paced environment and wants to work on high-impact global security initiatives, this role is for you" - VP, Software Engineering. What Youll Contribute Detect, identify, and analyze vulnerabilities across FICO environment. Assess the risk of vulnerabilities detected to determine true impact. Support stakeholders as a SME to understand technical details of vulnerabilities and steps to carry out remediation. Coordinate with stakeholders to track issues remediation until closure. Act as a SME for new projects in terms of vulnerability management lifecycle. Manage, maintain, and tune tools used to support the VM process. Update yourself with the latest security and technology developments. What Were Seeking Experience in a similar role such as vulnerability management specialist. Experience with Qualys or other security vulnerability detection technology required. Demonstrates subject-matter expert level understanding in multiple IT, Security and Software disciplines. Ability to understand the cause and effect of application vulnerabilities with Operating System Vulnerabilities. Must be able to multi-task and keep track of large amounts of information across disparate systems. Ability to keep making progress and define future strategy/policy with regards to Enterprise. Adherent to continuous monitoring and continuous improvement thought process. Demonstrated technical IT skills, ability to understand and manage different OS flavors, network technologies and topologies. Demonstrated technical security expertise in a variety of cloud platforms (AWS is preferred). Comfortable interfacing with other internal or external organizations regarding problems that must be addressed to enhance security posture. Ability to effectively translate and present solutions in business or management terms. Ability to work effectively in a team environment. Knowledge of Python scripting or other languages is nice to have. Moderate documentation and analytical skills; documenting processes, policies, and standards. Moderate ability to provide end-to-end support to enterprise counterparts, identifying root- cause of complex enterprise initiatives. Moderate trouble shooting skills across complex enterprise applications, server, and endpoint environments. Moderate ability to learn onboard and adapt to new technologies. Basic privileged access management/right management experience, designing solutions based on least privilege. Basic knowledge of malware operation, indicators or threat. Moderate knowledge of current threat landscape Entry Cybersecurity certifications, such as CompTIA Security +, GIAC Security Fundamentals, GIAC Security Essentials, ISC2 Associate, ISACA Cybersecurity Fundamentals are nice to have. Our Offer to You An inclusive culture strongly reflecting our core valuesAct Like an Owner, Delight Our Customers and Earn the Respect of Others. The opportunity to make an impact and develop professionally by leveraging your unique strengths and participating in valuable learning experiences. Highly competitive compensation, benefits and rewards programs that encourage you to bring your best every day and be recognized for doing so. An engaging, people-first work environment offering work/life balance, employee resource groups, and social events to promote interaction and camaraderie. Why Make a Move to FICO At FICO, you can develop your career with a leading organization in one of the fastest-growing fields in technology today Big Data analytics. Youll play a part in our commitment to help businesses use data to improve every choice they make, using advances in artificial intelligence, machine learning, optimization, and much more. FICO makes a real difference in the way businesses operate worldwide Credit Scoring FICO Scores are used by 90 of the top 100 US lenders. Fraud Detection and Security 4 billion payment cards globally are protected by FICO fraud systems. Lending 3/4 of US mortgages are approved using the FICO Score. Global trends toward digital transformation have created tremendous demand for FICOs solutions, placing us among the worlds top 100 software companies by revenue. We help many of the worlds largest banks, insurers, retailers, telecommunications providers and other firms reach a new level of success. Our success is dependent on really talented people just like you who thrive on the collaboration and innovation thats nurtured by a diverse and inclusive environment. Well provide the support you need, while ensuring you have the freedom to develop your skills and grow your career. Join FICO and help change the way business thinks! Learn more about how you can fulfil your potential at FICO promotes a culture of inclusion and seeks to attract a diverse set of candidates for each job opportunity. We are an equal employment opportunity employer and were proud to offer employment and advancement opportunities to all candidates without regard to race, color, ancestry, religion, sex, national origin, pregnancy, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. Research has shown that women and candidates from underrepresented communities may not apply for an opportunity if they dont meet all stated qualifications. While our qualifications are clearly related to role success, each candidates profile is unique and strengths in certain skill and/or experience areas can be equally effective. If you believe you have many, but not necessarily all, of the stated qualifications we encourage you to apply. Information submitted with your application is subject to theFICO Privacy policy at
Posted 2 weeks ago
4.0 - 9.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : CyberArk Privileged Access Management Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will be responsible for overseeing the implementation and delivery of Security Services projects. A typical day involves coordinating with various teams to ensure that projects are executed efficiently, utilizing global delivery capabilities, and ensuring that all security measures are effectively integrated into the project lifecycle. You will engage with stakeholders to align project goals with organizational objectives, while also providing guidance and support to your team members to foster a collaborative work environment. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team skills and knowledge.- Monitor project progress and implement necessary adjustments to meet deadlines. Professional & Technical Skills: Must Have Skills: - Proficiency in CyberArk Privileged Access Management implementation and component installation and testing.- Proficiency in CyberArk Endpoint Privilege Management implementation, EPM Policy and scope definition, EPM Agent testing, troubleshooting and rollout.- Experience preferred in CyberArk Identity Security Platform Shared Services (ISPSS shared tenant)- Experience leading build or implementation teams for CyberArk PAM and CyberArk EPM.- Minimum CyberArk PAM Sentry or EPM Defender certification is preferred.- Strong understanding of security protocols and best practices.- Experience with identity and access management solutions.- Ability to analyze and mitigate security risks effectively.- Familiarity with compliance standards and regulatory requirements. Additional Information:- The candidate should have minimum 4 years of experience in CyberArk Privileged Access Management and CyberArk Endpoint Privilege Management.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
3.0 - 8.0 years
13 - 17 Lacs
Gurugram
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Endpoint Extended Detection and Response Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are seeking a skilled cybersecurity professional with hands-on experience in managing and optimizing CrowdStrike EDR, FIM, Host Firewall, MxDR solutions. As a CrowdStrike EDR Specialist, you will play a critical role in endpoint threat detection, incident response, and continuous monitoring of the enterprise environment to identify and remediate cyber threats. Roles & Responsibilities:-Deploy, configure, and maintain CrowdStrike Falcon EDR agents across enterprise endpoints.-Monitor CrowdStrike dashboards and alerts for suspicious activity, malware, and unauthorized behavior.-Investigate, analyze, and respond to endpoint-related security incidents.-Create and tune detection rules, indicators of compromise (IOCs), and response workflows.-Collaborate with SOC teams, IT administrators, and incident responders on security investigations.-Perform threat hunting using CrowdStrike Falcon and other tools.-Develop reports and dashboards that provide visibility into the EDR environment and incident trends.-Ensure EDR platform integration with SIEM and other cybersecurity tools.-Stay updated on emerging threats and recommend configuration or policy improvements.-Knowledge and Exposure on Service Now ticketing for Incident Management, Problem Management and Change Management. Professional & Technical Skills: -Experience in a EDR (CrowdStrike) or threat detection role.-Strong hands-on experience with CrowdStrike Falcon EDR (deployment, policy management, investigation, etc.).-Solid understanding of malware, endpoint threats, and attack vectors.-Familiarity with MITRE ATT&CK framework and threat intelligence principles.-Experience with scripting (PowerShell, Python, etc.) and automation tools is a plus.-Knowledge of SIEM platforms (Splunk, QRadar, etc.) and their integration with EDR.-Relevant certifications preferred (e.g., CrowdStrike CCFA, FIM, Azure Fundamental). Additional Information:- The candidate should have minimum 3 years of experience in Endpoint Extended Detection and Response.- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field (or equivalent experience).- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2