Jobs
Interviews

203 Endpoint Jobs - Page 6

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

15.0 - 20.0 years

14 - 19 Lacs

Noida

Work from Office

Project Role : Business and Integration Architect Project Role Description : Designs the integration strategy endpoints and data flow to align technology with business strategy and goals. Understands the entire project life-cycle, including requirements analysis, coding, testing, deployment, and operations to ensure successful integration. Must have skills : Oil and Gas Upstream Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Business and Integration Architect, you will be responsible for designing the integration strategy endpoints and data flow to align technology with business strategy and goals. Your typical day will involve collaborating with various teams to ensure that the integration processes are seamless and effective, while also analyzing project requirements and overseeing the entire project life-cycle to guarantee successful integration outcomes. You will engage in discussions with stakeholders to understand their needs and translate them into actionable integration strategies, ensuring that all aspects of the project are aligned with the overall business objectives. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate workshops and meetings to gather requirements and feedback from stakeholders.- Develop and maintain documentation related to integration strategies and processes. Professional & Technical Skills: - Must To Have Skills: Proficiency in Oil and Gas Upstream.- Strong understanding of integration architecture and design principles.- Experience with data flow management and endpoint design.- Ability to analyze and optimize integration processes.- Familiarity with project management methodologies. Additional Information:- The candidate should have minimum 7.5 years of experience in Oil and Gas Upstream.- This position is based at our Noida office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 month ago

Apply

3.0 - 6.0 years

20 - 25 Lacs

Pune

Work from Office

Experienced Data Analyst skilled in Python, Tableau, and Power BI with exposure to Intune/SCCM. Strong in IT/endpoint data reporting, compliance insights, and dashboarding. Suitable for hybrid Pune-based UEM analytics roles. Required Candidate profile Looking for a Data Analyst with experience in IT systems or Intune/SCCM. Must know Python, Tableau/Power BI. UEM or endpoint data experience is a plus.

Posted 1 month ago

Apply

3.0 - 6.0 years

7 - 15 Lacs

Hyderabad

Remote

We are RadarRadar, experts in the commodity production, trade and processing industry. As a technology company we continuously aim to support our clients with strong data & analytics and business intelligence tools. It is our mission to enable companies to unlock the full potential of their data to improve risk and margin management and boost performance. Awards won: Top 10 Trading & Risk Management Service Providers 2023 | Energy Business Review Technology Innovation Award 2023 | Commodities People Analytics Technology Leader of the Year 2023 | Commodities People Top Business Information Systems Company 2022 | Data Magazine We are looking for a skilled and proactive Security Associate to join our IT team. This role is very important in ensuring the security of our cloud infrastructure. The ideal candidate will have hands- on experience in Azure security services, Windows Server security, SQL Server security, and infrastructure administration. What you will do Manage and optimize Azure Security services, including Microsoft Sentinel, Azure Monitor, Defender for Cloud, Endpoint/Server, Identity etc. Configure and monitor Log Analytics Workspaces and workbooks for effective threat detection and incident response. Create and manage virtual network configurations, private endpoint connections and other networking/firewall resources. Implement security best practices for Azure resources, ensuring compliance on regulatory standards and respond to incidents. Manage security configurations using Azure Policy Manage and secure mobile devices and applications using Microsoft Intune. Manage identity, access and Conditional Access policies within Azure AD. Apply security hardening techniques to Windows Server environments. Monitor and manage security baselines, patch management, and vulnerability assessments. Implement and maintain Group Policies, security auditing, and logging. Enforce SQL Server security best practices, including log management. Conduct regular audits, compliance checks on Servers Manage roles, permissions, and security configurations to protect data integrity. Create and manage various Azure resource (VMs, SQL Servers, Storage accounts, App services, Gateways, key vaults etc.) Create, manage and optimize Azure automation runbooks Perform administrative tasks for SQL Server, Windows Server, Microsoft 365 services including Intune, Entra ID, Teams, Exchange, Purview for data governance etc. Ensure high availability and performance of servers and services. Troubleshoot and resolve infrastructure-related issues promptly. Support backup and restore, disaster recovery, and business continuity planning. What you will bring Bachelors degree in computer science, Information Technology, or related field. 3+ years of experience in Azure security and infrastructure management. Strong knowledge of Microsoft security tools (Sentinel, Defender for Cloud, Defender for Endpoint/server). Proficiency in Windows Server and SQL Server security practices. Experience with Microsoft 365 and Entra ID administration. Microsoft Certified: Azure Security Engineer Associate Microsoft Certified: Azure Administrator Associate Strong analytical and problem-solving abilities. Excellent communication and teamwork skills. Ability to manage multiple tasks and projects effectively. Strong attention to detail and a proactive security mindset. What you will get: Remote work model A competitive salary and working with an amazing international team. An inspiring environment where you learn every day. Personal development plans to help you reach your personal goals.

Posted 1 month ago

Apply

2.0 - 3.0 years

3 - 6 Lacs

Bengaluru

Work from Office

Suprajit Engineering Ltd. is looking for Network Security Engineer to join our dynamic team and embark on a rewarding career journey Maintaining LAN, WLAN and architecture of the server as per the business policy Reporting the security analysis of findings Maintaining the regulatory systems about ISMS policy (Information System Management Systems) Developing the security authentication protocol Maintaining server and switches Maintaining & implementation of the SOP for Network securityKnowledge of performing routing protocols (MPLS, HAIPE/IP, QOS and WAN) Monitoring of web security gateways, perimeter security, network access controls, endpoint security

Posted 1 month ago

Apply

5.0 - 10.0 years

14 - 24 Lacs

Hyderabad, Chennai

Hybrid

JD Background in Data Analysis Experience in training Artificial Intelligence models, with special focus on prompt engineering Two years related work experience in Data Loss Prevention (DLP), and/or Cybersecurity. For DLP, experience providing recommendations for tuning content detection rules to improve accuracy, a plus Able to learn and apply new concepts quickly Proven analytical and problem solving abilities Able to learn and apply new concepts quickly Proven analytical and problem solving abilities Strong communications skills Responsibilities: train Machine Learning (AI) models in answering Data Loss Prevention topics Be an advocate of users of Artificial Intelligence (AI): understand and give prompts from user perspective. generate metrics for AI responses Evaluate AI responses and generate comprehensive feedback about the prompt and the responses Document and articulate the AI feedback into guide books Communicate the AI feedback across stakeholders and drive continuous improvements The JD for the DLP role is still accurate. We want candidates who has domain knowledge in using DLP module of compliance tools such as: MS Purview ProofPoint ForcePoint Symantec DLP others

Posted 1 month ago

Apply

2.0 - 7.0 years

5 - 9 Lacs

Daskroi

Work from Office

About Intas Recruitment Fraud Disclaimer: Intas Pharmaceuticals does not request or accept any fees during recruitment If someone asks for payment on our behalf, it is a scam Please report the incident to the local police or cybercrime unit Your trust and safety are important to us, Intas is a leading global pharmaceutical company specializing in the development, manufacturing, and marketing of pharmaceutical formulations The mission of the company is to address unmet medical and societal needs through a fully integrated pharmaceutical value chain spanning across the world, Through its subsidiaries, the International presence of Intas includes the following countries: over 85 worldwide, with some of the more important global markets like North America, Europe, Latin America, and the Asia-Pacific under the well-known brand name Accord Healthcare The rapid expansion has been due to organic growth and strategic acquisitions alone, vindicating its position in some of the important major pharmaceutical markets across the world, Intas follows high standards of quality, as reflected by products approved for leading global regulatory agencies including USFDA, MHRA, and EMA Substantial in-house R&D capability, along with the beginning of a focus on highly advanced areas like Biosimilars and New Chemical Entities-Intas continues to push the frontiers of excellence in healthcare, At Intas, our success is fundamentally built on the strength of our people Our ongoing commitment is to attract and retain the best talent in the industry while fostering an empowering environment that encourages innovation and excellence This approach ensures that every employee plays a meaningful role in driving both the companys growth and advancements in global healthcare, Job Title: Associate Scientist BDL Job Requisitions No : 13803 Job Description Purpose of Job To perform techniques as per a defined procedure and document the same for a given project under technical supervision, Skill Required Cell-Based Assays Understanding of assay setup, endpoint analysis, and result interpretation, ELISA (Enzyme-Linked Immunosorbent Assay) Strong proficiency in plate-based immunoassays, SDS-PAGE & Western Blotting Experience in protein separation and immunodetection techniques, SPR (Surface Plasmon Resonance) Exposure to or working knowledge of biomolecular interaction analysis, Analytical Instrument Handling Competence in using and maintaining relevant laboratory instruments, Data Compilation & Statistical Analysis Ability to compile raw data and interpret results using Excel or statistical tools, SOP Writing & Technical Documentation Experience in writing/revising technical documents and reports, Roles and Responsibilites Execution of the technique (Cell based assay, ELISA, SDS-PAGE, Western Blot, SPR) as per the defined procedure and documentation of the same, Training on system compliance and documentation Data compilation of sample analysis and method development and qualification experiments, Response to DQA observations related to data verification, Preparation of SOPs, Any other responsibility assigned by supervisor, To follow ?Good Documentation Practices and Data Integrityrequirements during any GxP Operation and recording at site, To take responsibility that application of Data Integrity requirements and potential consequences for not following it are understood and followed, To review in the perspective of compliance to Data Integrity requirements while reviewing any GxP data (Records, Reports) specific to Job description, To ensure that, In case of any event of potential data breach, it shall be handled through SOP on ?Handling of Potential Data Integrity Observation, Qualification Required MSC/MTECH Biotechnology Relevant Skills / Industry Experience Relevant professional / Educational background Any Other Requirements (If Any) Compensation / Reward Location: Biotech, Ahmedabad, GJ, IN, 382213 Travel: 0% Life at Intas Pharmaceuticals For over three decades, Intas has thrived due to the exceptional talent of its people Our growth is fueled by a dynamic environment that nurtures individual potential while fostering collaboration and collective success We believe that when diverse skills and perspectives unite under a shared purpose and value system, we can achieve remarkable outcomes, driving innovation and excellence across the pharmaceutical landscape, Date: 26 May 2025

Posted 1 month ago

Apply

6.0 - 8.0 years

27 - 42 Lacs

Chennai

Work from Office

*L3 Support is Mandatory. Location – Chennai /Bangalore Timing – 24*7 JD Cisco Voice - SA Level Bachelor’s Degree or Higher in Computer Science, Information Technology or related discipline and 10+ years of experience 12+ years of IT experience, 8+ years Cisco Telephony and VoIP experience, Video Conferencing and Contact Center experience Experience in Administration and maintenance of complex enterprise communications architecture that delivers integrated voice, video, and web services. High degree of proficiency with Cisco Unified Communication Manager is required, supporting, troubleshooting and design/deploying Hands on experience in supporting Microsoft Teams Telephony, Video and Chat Experience in the following: Cisco Unified Call Manager, Cisco UCCX, VOIP Telephony; Cisco Communication Products Experience with Cisco Telepresence products including Cisco Telepresence Management Suite, Multipoint Control Units, Video Communications Servers, ISDN Gateways, SIP Gateways, Telepresence Content Servers, and Cisco endpoints. UCCX design, administration and maintenance Cisco VOIP telephony and collaboration services On-Prem and Cloud Expert skill and experience with Cisco Voice Gateways and SBC’s Experience and core knowledge in supporting voice protocols i.e. SIP, H.323 and MGCP Proficient level Cisco certifications is mandatory Maintaining, configuring and sustaining the Cisco VoIP network Experience with L1/L2 knowledge in Data Networking is an advantage.

Posted 1 month ago

Apply

2.0 - 4.0 years

3 - 6 Lacs

Ahmedabad

Work from Office

Job Summary: We are urgently looking for a skilled Azure Cloud Engineer with strong expertise in Microsoft technologies to join our team. The ideal candidate will take ownership of Azure infrastructure, Office 365 administration, and Intune implementation. The goal is to ensure smooth operations, security compliance, and end-user satisfaction. Key Responsibilities: Azure Cloud Engineering Design, deploy, and manage Azure-based infrastructure and services (IaaS, PaaS). Implement and maintain Azure virtual machines, networking, storage, and security components. Automate deployments using PowerShell, ARM templates, or Terraform. Monitor and optimize cloud performance, cost, scalability, and availability. Ensure alignment with cloud security best practices and compliance requirements. Office 365 Administration Manage Exchange Online, SharePoint Online, Teams, OneDrive, and other Microsoft 365 services. Administer the O365 tenant, including licensing, user/group management, and security policies. Monitor service health and usage through Microsoft 365 Admin Center. Implement security protocols including DKIM, SPF, DMARC, and threat protection tools. Intune & Endpoint Management Lead deployment and configuration of Microsoft Intune for MDM and MAM. Configure security and compliance policies for Windows, Android, and iOS devices. Manage Conditional Access and App Protection policies. Provide support for Intune-related issues during device onboarding. Required Skills & Qualifications: Minimum 2 years of hands-on experience in cloud engineering, preferably in Microsoft Azure. Proven experience with Azure services (VMs, VNets, Azure AD, Storage, NSG, etc.). In-depth knowledge of Microsoft 365 admin center, Exchange Online, Teams, and SharePoint. Experience with Microsoft Intune and Endpoint Manager. Strong PowerShell scripting skills. Understanding of IAM concepts (Azure AD, MFA, Conditional Access). Familiarity with cloud security and compliance standards (ISO preferred). Preferred Certifications (Optional): Microsoft Certified: Azure Administrator Associate (AZ-104) Microsoft Certified: Azure Fundamentals (AZ-900) Soft Skills: Strong troubleshooting and problem-solving abilities. Excellent communication and documentation skills. Proactive, team-oriented, and ownership-driven mindset. Ability to handle multiple projects and changing priorities. Nice to Have: Experience with Microsoft Defender, Sentinel, or other security tools. Familiarity with hybrid Exchange environments.

Posted 1 month ago

Apply

15.0 - 20.0 years

17 - 22 Lacs

Hyderabad

Work from Office

Skills Skill Vendor Management ITIL IT Service Management Project Management Data Center IT Operations Solution Architecture IT Strategy Business Development IT Management Education Qualification No data available CERTIFICATION No data available Job Summary 15+ years’ total experience, including 5+ years in a production 24/7 high-availability multi-site enterprise ERP environment, including application hosting, voice and data networks, security and information protection. Demonstrating a deep technical and strategic understanding of the IT Services and Operations delivered by Sterling. Develop and implement comprehensive IT infrastructure strategies to support business goals and operations. Oversee all IT infrastructure activities, including network management, system administration, and IT security. Experience in leading overall infrastructure for a complex organization and network, including multicounty setup, VLAN setup for regulatory requirements, managing data protection, etc. Managing the day-to-day operational tasks within the IT Infrastructure team. Overseeing the annual IT budget and ensuring cost-effectiveness. Monitoring daily operations, including server hardware, software, and operating systems. Coordinating technology installations, upgrades, and maintenance. Coordinating with the central procurement team for purchase follow-ups, invoice submissions, and vendor follow-ups to complete the tasks. Generating performance reports for operating systems and the Service Desk function. Ensuring all IT activities are performed within the parameters of defined KRA’s and KPI’s. Solving complex and diverse problems by continually re-evaluating new and/or conflicting factors. Managing internal and external communications and being the primary contact of escalation for business issues. Assisting with the management of relationships with external organizations and suppliers. Implement and maintain IT security measures as recommended by Security Teams Ensure compliance with relevant regulations and standards, such as HiTrust, HIPAA, and ISO/IEC 27001. Collaborate with other departments such as IT operations, software development, and customer support to align IT infrastructure efforts with business objectives. Work closely with senior executives to provide IT infrastructure insights and recommendations. Lead and mentor the IT infrastructure team, fostering a culture of high performance and technical excellence. Ensure the IT infrastructure team has the skills and resources necessary to support the company’s objectives. Ability to develop and implement strategic IT infrastructure plans aligned with business objectives. Experience in providing strategic recommendations to senior management. Strong leadership skills with the ability to inspire and lead a high-performing IT infrastructure team. Experience in managing cross-functional teams and working collaboratively with other senior executives. Communication and Interpersonal Skills: Excellent communication skills with the ability to effectively present technical information to various stakeholders including the board of directors, employees, and external partners. Strong interpersonal skills with the ability to build and maintain relationships with internal and external stakeholders. Education Min 15 years of Experience in servers, endpoints, and other Infra applications. A bachelor’s degree in Information Technology, Computer Science, or a related field is typically required. Professional certifications such as Certified Information Systems Security Professional (CISSP) or Cisco Certified Internetwork Expert (CCIE) can enhance a candidate’s credentials. Exposure to ITIL concepts and adoption.

Posted 1 month ago

Apply

6.0 - 8.0 years

8 - 10 Lacs

Bengaluru

Work from Office

We’re looking for an experienced, motivated hands-on engineer who brings ideas about large-scale design, security, Cloud, UI design and mobile technologies; As a software engineer, you’ll apply your deep expertise in designing, developing and delivering a world class UEM solution. You need to be versatile, display leadership qualities and open minded to take on new problems that our customers face. ESSENTIAL JOB FUNCTIONS: Analyzes and designs software modules, features or components of software programs and develops related specifications using C++, C#, MFC, and Powershell Develops, tests, documents and maintains complex software programs for assigned systems, applications and/or products. Gathers and evaluates software project requirements and apprises appropriate individual(s). Codes, tests and debugs new software or enhances existing software. Troubleshoots and resolves or recommends solutions to complex software problems. Provides senior level support and mentoring by evaluating product enhancements for feasibility studies and providing completion time estimates. Assists management with the planning, scheduling, and assigning of projects to software development personnel. Ensures product quality by participating in design reviews, code reviews, and other mechanisms. Interacts effectively with Quality Assurance team. Participates in developing test procedures for system quality and performance. Writes and maintains technical documentation for assigned software projects. Provides initial input on new or modified product/application system features or enhancements for user documentation. Reviews user documentation for technical accuracy and completeness. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 6-8+ years of relevant experience Strong C++, C# programming and object-oriented skills Extensive knowledge of Windows internals - Registry/Process Management, Memory & Resource Management and WinAPIs. Good understanding of .NET framework Strong debugging & troubleshooting skills Other LanguagesC , Java DatabasesMS SQL Server; Oracle Tools & IDEMicrosoft Visual Studio, Jenkins, Git Operating SystemsWindows 10+, Window Server Preferred technical and professional experience Operating SystemsUnix, Linux LanguageLUA Device Management and security concepts. Endpoint Configuration Management

Posted 1 month ago

Apply

4.0 - 9.0 years

6 - 11 Lacs

Mumbai

Work from Office

The CyberArk Operation Support Team Lead is a pivotal role responsible for overseeing and managing the day-to-day operations of the CyberArk environment. This position involves leading a team of support professionals, ensuring the availability, performance, and security of CyberArk solutions, and collaborating with cross-functional teams to deliver efficient privileged access management. Key Responsibilities * Team LeadershipSupervise and mentor a team of CyberArk support professionals, fostering collaboration and skill development. * Operational ManagementOversee the operational aspects of CyberArk solutions, ensuring 24/7 availability, scalability, and optimal performance. * Incident ManagementLead the resolution of CyberArk-related incidents and problems, coordinating with technical teams and stakeholders to ensure timely and effective solutions. * Security EnhancementCollaborate with the security team to implement and enhance security controls, policies, and procedures for privileged access management. * Performance MonitoringMonitor system performance, conduct regular health checks, and proactively identify and address potential performance bottlenecks. * Patch and Upgrade ManagementPlan and execute system upgrades, patches, and enhancements, ensuring minimal disruption to ongoing operations. * DocumentationMaintain thorough documentation of configurations, processes, and procedures related to CyberArk operations. * Vendor ManagementCoordinate with CyberArk vendors for support, troubleshooting, and escalations to ensure timely issue resolution. * Continuous ImprovementDrive continuous improvement initiatives to enhance the effectiveness and efficiency of CyberArk operations. * ReportingGenerate regular reports on system performance, incident management, and operational metrics for management review. * Willing to work in 24/7 operations and project support activities Required education Bachelor's Degree Preferred education Associate's Degree/College Diploma Required technical and professional expertise Proven experience in CyberArk operations and support, with a minimum of 4+years of hands-on experience. * Professional certifications such as CyberArk Certified Trustee (CCT) or Certified Delivery Engineer (CDE). Strong knowledge of privileged access management concepts and CyberArk technologies. Experience in organizations control, monitor, and secure privileged access across their IT infrastructure. Good Exposure in endpoint Analytics capabilities to identify unusual or suspicious activities related to privileged access. Preferred technical and professional experience * Leadership skills with the ability to guide and mentor a team effectively. * Problem-solving aptitude with a proactive approach to resolving technical challenges. * Strong communication skills for effective collaboration with cross-functional teams. * Detail-oriented mindset with a commitment to maintaining high standards. * Adaptability to changing requirements and a willingness to stay updated on emerging technologies

Posted 1 month ago

Apply

2.0 - 7.0 years

1 - 6 Lacs

Ahmedabad

Work from Office

Number of open positions 2 Title: Cloud Engineer or Sr. Cloud Engineer Experience: 3-5 years relevant work experience Qualification, Experience & Skills Required Good to have Professional Certification in Domain (1. Microsoft 365 Certified: Administrator Expert / Endpoint Administrator 2. Azure Administrator) Excellent oral & written communication skills Ready to work in morning & afternoon shifts along with occasional night shifts (if required). The purpose of the role is to be the main customer facing point of contact for all Microsoft Office 365 & Azure Cloud projects implementation & consulting work. Ability to work intuitively, along or as part of a team environment, Self-starter with ability to plan and execute work. Proven hands-on experience in Implementing, Configuring, Testing, Migrating & Securing Microsoft 365 & Azure Cloud Solutions. Microsoft Windows Active Directory, Azure AD Connect Azure AD Premium Features deployment mainly User & Device based Conditional Access, Multi-Factor Authentication Policies. Email & data Migrations from different source environments to Office 365 (Exchange & SharePoint Online, Microsoft Teams & One Drive for Business respectively) using Microsoft methods, tools and/or 3rd party migration solutions bit titan, SkyKick, AvePoint, Sharegate etc. Microsoft Mobile Device Management (Intune MDM & MAM) Solutions, Windows Autopilot Technologies

Posted 1 month ago

Apply

10.0 - 15.0 years

12 - 17 Lacs

Pune

Work from Office

Wipro Limited (NYSE:WIT, BSE:507685, NSE:WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role : Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

10.0 - 20.0 years

12 - 22 Lacs

Bengaluru

Work from Office

About The Role : Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led

Posted 1 month ago

Apply

5.0 - 10.0 years

12 - 17 Lacs

Hyderabad

Work from Office

About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role _x000D_ Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? _x000D_ Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? _x000D_ i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? _x000D_ 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? _x000D_ Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Cloud Security Posture Management_x000D_. Experience8-10 Years_x000D_. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

6.0 - 11.0 years

12 - 17 Lacs

Kolkata

Work from Office

Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Saviynt. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

6.0 - 11.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

3.0 - 5.0 years

4 - 8 Lacs

Bengaluru

Work from Office

About The Role Primary Skill (Technical Skill) Application Packaging Secondary Skill Windows, MECM, Intune ? Experience Level 6 –8 Years (B3) 3 - 5 Years (B2) Location of Posting Chennai Rates Including Mark up - 80 K/M - 90K/M ? Candidate should have the experience of customer facing role Primary Knowledge- Hands-on experience in Creation of MSI, MSIX, Intunewin packages using Flexera Admin Studio/ Install-shield, Microsoft Tools like Win32 Content Prep & MSIX Packaging tool Experience in creating Connection groups and Runvirtual keys Basic to Intermediate know-how and experience towards Scripting – VB script / PowerShell scripting Knowledge of Operating Systems – Win 10, Win11 Experience with SCCM (Microsoft Endpoint Configuration Manager) ? Support the Service & Product Manager across several technical domains Contribute expertise to the management of existing and new IT products and services Define workarounds for known errors and initiate process improvements Strong understanding of performance analysis for Applications packaging process Experience in Testing and implementing Application Packages Establish and implement policies, procedures, and technologies. Familiarity with support processes, including Incident, Problem, Request, Event, and Change Management. ? Mandatory Skills: Application Packaging - Windows. Experience3-5 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Hyderabad

Work from Office

About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: ForgeRock Identity Manager. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

6.0 - 8.0 years

7 - 8 Lacs

Pune

Work from Office

Diverse Lynx is looking for Network Security Engineer to join our dynamic team and embark on a rewarding career journey Maintaining LAN, WLAN and architecture of the server as per the business policy Reporting the security analysis of findings Maintaining the regulatory systems about ISMS policy (Information System Management Systems) Developing the security authentication protocol Maintaining server and switches Maintaining & implementation of the SOP for Network security Knowledge of performing routing protocols (MPLS, HAIPE/IP, QOS and WAN) Monitoring of web security gateways, perimeter security, network access controls, endpoint security Experience with Ansible for automation and configuration management

Posted 1 month ago

Apply

5.0 - 10.0 years

7 - 11 Lacs

Bengaluru

Work from Office

The Group Security (GS) Cybersecurity Defense Center (CDC) team is looking for a Security Operations Center (SOC) Analyst, responsible for execution of incident response, investigative analysis of security incidents, reporting, continuous improvement, and post-incident activities. Will work closely with the CDC Engineering Team, internal Nokia teams, external Security Suppliers, and various technology vendors. Group Security (GS) is part of Strategy & Technology and Nokias central knowledge center for Nokias cybersecurity policies and standards, the cybersecurity architecture and roadmap, and the monitoring and alerting of security incidents. You have: 5+ years of experience in a Security Operations Center (SOC) or similar role 2+ years of experience working with one or more of following systemsMicrosoft Sentinel, Microsoft Defender for Endpoint (MDE), Microsoft Defender for Identity (MDI), SentinelOne or Rapid7 Deep knowledge of incident response methodologies and forensic analysis techniques Strong understanding of cloud security principles and experience with major cloud platforms (AWS, Azure, GCP) Expertise in leveraging automation tools for enhancing security operations It would be nice if you also had: Certifications such as CompTIA Cybersecurity Analyst (CySA+), GIAC Certified Incident Handler (GCIH), or Certified SOC Analyst (CSA) Mentoring experience with junior analysts Execute complex security investigations using log analysis and threat intelligence across all Nokia assets Collaborate with SOC Engineers to drive automation and implement AI-powered security solutions Apply cloud security best practices and zero-trust architecture principles in security operations Engage with senior stakeholders to communicate security risks and improve incident response efforts Lead advanced threat hunting initiatives leveraging expertise in security tools and techniques Contribute to the continuous development of SOC processes, technologies, and techniques for enhanced security Mentor and guide junior analysts to foster a culture of learning and professional growth Facilitate post-incident activities, ensuring comprehensive reporting and continuous improvement of security measures

Posted 1 month ago

Apply

15.0 - 20.0 years

9 - 13 Lacs

Hyderabad

Work from Office

Project Role : Workplace Mgmt & Solutions Practitioner Project Role Description : Provide expertise and/or general administrative space and service support for Accenture people and businesses globally. Must have skills : Microsoft Endpoint Configuration Manager Good to have skills : Microsoft Windows Server Administration, Cloud Infrastructure, Microsoft PowerShellMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Project Role DescriptionDesign, build, configure MECM infrastructure, application deployment, patch management process, OSD. Design and build Windows 10/11 and windows server SOE imageMust have skills:Should be certified/equivalent experienced for configuring and supporting following:oWindows ServersoWindows OS oMECM (including Co-Management)oWindows PatchingoIntuneoAutopilotoAzure ADoPowerShell Good to have skills.Active directory, JAMF, Power BI, Flexera and other application app toolsJob Key Responsibilitiesa.Day to day administration of MECM environment to include engineering new solutions as needed.b.Troubleshoot MECM related issuesc.Providing technical guidance on MECM.d.Provide Tier 3 support for MECMe.Creating and updating technical documentation as required.f.Create monthly reports on windows updates and other compliance parameters Technical Experiencea.Should have strong experience on MECM.b.Ability to design, build and configure MECM environmentc.Design and build applicable Windows image, provide support in image rolloutd.Should be able to design configuration for windows endpoints & serverse.Should have strong hand on Autopilot enrolments and associated configurations and rollout. Professional AttributesExcellent written and oral communication skills Educational QualificationBE/BS in Computer Science, Electronics, Electrical or other branches of engineering, Science graduate Additional InformationAdditional knowledge -- Cloud Technologies Qualification 15 years full time education

Posted 1 month ago

Apply

6.0 - 11.0 years

11 - 15 Lacs

Bengaluru

Work from Office

Senior Cybersecurity Analyst with a minimum of 6+ years of experience in thefield of Operation technology, particularly focusing on Endpoint Detection andResponse (EDR) and Intrusion Detection System #40;IDS#41; monitoringtools. The ideal candidate will have demonstrated expertise in Carbon Black AppControl. Carbon Black, MS Defender for Endpoints (EDR/ATP),Data Network Security - IDS, Unix Administration, Windows, Carbon Black, MS Defender for Endpoints (EDR/ATP), Data Network Security - IDS, Unix Administration, Windows. Senior Cybersecurity Analyst with a minimum of 6+ years of experience in the field of Operation technology, particularly focusing on Endpoint Detection and Response (EDR) and Intrusion Detection System (IDS) monitoring tools. The ideal candidate will have demonstrated expertise in Carbon Black App Control.

Posted 1 month ago

Apply

4.0 - 8.0 years

6 - 10 Lacs

Pune

Work from Office

Must Have Skills Windows Servers | Domain Controllers | Active Directory | Azure Active Directory | Group Policy Enterprise Proxy Solution - Preferably Zscaler or Netskope. Inline CASB, Web DLP. Zero Trust Platform (Zero Trust Application Access / Zero Trust Remote VPN) Privilege Access Management (PIM/PAM) Basics of hardware, networking, IP addressing, VLAN, LAN, WAN, MPLS Endpoint Security Management. Preferably EDR/XDR CS Falcon, Sentinel One, MS Defender for Endpoint, DLP, ATP, Web Security. Good in Soft skills, logical and analytical thinking, troubleshooting and problem management, ticketing systems, SLA Management, Good to have Azure information protection Microsoft Enterprise Mobility and Security Office 365 Security administration Cloud Computing Basics with Azure / AWS Security administration Web Application Firewall management. Qualifications Basic Graduation and Proficiency in technology areas mentioned. Professional Certifications would be an added advantage.

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies