Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
8.0 - 10.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Our client is a global leader in Consulting, Technology and Outsourcing Business in the SW Services & Product arena. Client has impressive customers list in over 30 countries this includes some of the best known names across globe. With offices in every continent and development centres in practically every developed country, our client is known for their successful Delivery model. Our client is structured into Business Units and caters to the BFSI, Manufacturing, Infrastructure, System Integration, Retail, Engineering Services Industries/domains. Their foray into Banking Software products and Intellectual property has differentiated them from their competitors. Key Responsibilities: Design and develop secure network architectures for on-premises, cloud, and hybrid environments. Evaluate and recommend security solutions, tools, and technologies. Conduct risk assessments and vulnerability analyses of network infrastructure. Define and enforce security policies, standards, and procedures. Collaborate with IT and DevOps teams to integrate security into system and application design. Monitor network traffic for unusual activity and respond to security incidents. Lead penetration testing and red/blue team exercises. Ensure compliance with regulatory requirements (e.g., ISO 27001, NIST, GDPR, HIPAA). Provide technical guidance and mentorship to security engineers and analysts. Stay current with emerging threats, vulnerabilities, and security trends. Required Qualifications: Bachelor s or Master s degree in Computer Science, Information Security, or related field. 8+ years of experience in network security or cybersecurity roles. Strong knowledge of firewalls, VPNs, IDS/IPS, SIEM, and endpoint protection. Experience with cloud platforms (AWS, Azure, GCP) and their security models. Familiarity with Zero Trust Architecture and Secure Access Service Edge (SASE). Proficiency in scripting and automation (Python, PowerShell, etc.). Relevant certifications (e.g., CISSP, CCSP, CISM, CEH).
Posted 4 days ago
5.0 - 10.0 years
5 - 10 Lacs
Bengaluru / Bangalore, Karnataka, India
On-site
Job description Role Overview We are seeking an enthusiastic Security Researcher to join a growing organization that specializes in advanced malware analysis, exploit analysis, reverse engineering, and machine learning. Our global organization works in the areas of malware research, customer escalation response and system Engineering and development. Looking for security researchers specializing in malware analysis with a propensity for finding evil. The candidate must have the passion and experience necessary to turn research findings into practical threat detections in our Trellix Endpoint Security (ENS) product. Our team doesnt just analyze malware we find evil. You will be expected to learn the ins-and-outs of our daily malware escalation responses, routines and procedures. Additionally, you will help build platforms and automations, and author detection content which will help fight the bad guys. About the role: You will process incoming malware analysis and detection requests from customers, our first level Research team, and other teams within Trellix. You will proactively add detection for prevalent threats, and author proactive detection to provide enhanced protection. You will perform static and dynamic analysis of malware, including - infection, propagation, lateral movement, exploitation POCs, etc. You will extract malicious patterns from malware and author effective detection and repair signatures and test them before being utilized by our Trellix endpoint protection product. You will participate in the incident response process on an as needed basis and prepare analysis of the incident, remediation instructions, and assist customers. Using your coding skills, you will help develop automation framework for malware analysis and efficiency improvements. You will propose and create innovative solutions for problems that our customers are facing. You will share your most exciting research findings through blogs and internal presentations. You will work closely with colleagues in the same and other time zones, and attend a daily handover to the next region. You may be required to support on-call work during holidays and weekends as part of a team rotation. About you: You must have 5+ years of experience in a Malware Researcher role You must have experience with Python, C/C++, or other similar programming languages. You must have experience in reverse engineering, and proficiency in debugger usage (OllyDbg, IDA pro). You must understand file formats for Windows (PE), Linux (ELF), or macOS (APP, PKG) You must have knowledge of OS internals (memory, threads, processes, API, etc.) on Windows, Linux, or macOS You must have awareness of global threats, regional threats, and top adversaries / criminal groups focusing on malware including affiliate networks pertaining to Windows OSes. You must have experience with various malware analysis tools. You should have excellent problem-solving skills, be a fast learner, and be self-motivated to take on initiatives with a focus on achieving results in a timely manner. You should have a proven ability to translate insights into business recommendations. Ability to positively adapt to changes and multitasking in a fast-moving industry Additional Qualifications: Knowledge of networking protocols and experience with network traffic analysis tools (Wireshark, Fiddler). Knowledge of exploitation concepts such as Shellcode, Heap Spray, ROP, etc. Experience working for Endpoint Protection (AV) operations and SOC environments is a plus Experience with sandbox-based detection technologies
Posted 1 week ago
4.0 - 8.0 years
2 - 11 Lacs
Bengaluru / Bangalore, Karnataka, India
On-site
Advanced Technical Proficiency: Manage and troubleshoot endpoint security tools such as EDR, EPP, antivirus, and MDM solutions Conduct endpoint vulnerability assessments and drive remediation plans Support secured configuration management and endpoint encryption activities Automate routine monitoring and response tasks using scripting tools Strategic Oversight & Integration: Define and implement endpoint security policies and deployment strategies Monitor performance metrics and ensure alignment with enterprise security goals Collaborate with IT, compliance, and network security teams to ensure integrated defenses Incident & Breach Response: Participate in L2/L3 level response to endpoint-related security incidents Support root cause analysis and documentation of incidents and remediations Ensure timely containment and recovery of endpoint security breaches Communication & Documentation: Clearly communicate complex security issues and technical risks to stakeholders Document security events, investigations, configuration changes, and response outcomes Continuous Improvement & Learning: Stay current with evolving threat landscapes and industry best practices Recommend enhancements to endpoint security processes and tools Pursue relevant certifications and training to maintain technical excellence Leadership & Mentorship: Mentor junior analysts and support their technical growth Contribute to team knowledge sharing and cross-training efforts
Posted 1 week ago
8.0 - 10.0 years
25 - 30 Lacs
Hyderabad, Pune, Gurugram
Work from Office
Designation: Cloud security engineer location: Chennai/Hyderabad/Pune/Gurugram Shift: US Must-Have Skills:- 1. 5+ years in public cloud (AWS, Azure) 2. Strong cloud and network security knowledge 3. Experience with security tools (vulnerability scanners, IDS/IPS, firewalls, endpoint protection) 4. CI/CD and automated security testing 5. Proficient in scripting/programming (Python, Bash) 6. Experience with Unix/Linux and networking 7. Strong collaboration and communication skills Good-to-Have Skills:- 1. Cloud access provisioning & automation 2. Log management, SQL, dashboards, reporting 3. Security architecture review & recommendations 4. Database programming/administration 5. Experience with security process documentation 6. Ability to act as a security SME.
Posted 1 week ago
3.0 - 8.0 years
4 - 8 Lacs
Bhopal, Patna, Mumbai (All Areas)
Work from Office
Must-Have Skills: Minimum 3 years of experience in EDR (End point security) Minimum experience of 3 years as L1 level Only look for L1 level experienced candidates who are expert on EDR (EDR, incident response) and Trend Micro (Antivirus) Active CEH certificate Requirements: Location: Patna/Bhopal/Mumbai/Kanpur/Kolkata./Delhi Notice Period: Immediate to 30 days Salary Range: 9 LPA (Including 5% variable) Job Type: Work from Office Key Performance Indicators: Assess endpoint security infrastructure Deploy and configure EDR agents Monitor endpoints for suspicious activities Generate real-time alerts for potential security incidents Ensure compatibility with other security systems
Posted 2 weeks ago
4.0 - 6.0 years
4 - 5 Lacs
Hyderabad / Secunderabad, Telangana, Telangana, India
On-site
????????? Job Opening: Network Engineer / IT Infrastructure Engineer ???? Location: Hyderabad | ???? Experience: 46 Years ???? Package: As per industry standards | ???? Field Work Mandatory ???? Key Responsibilities: Install & configure firewalls, SIEM, servers, and cloud infra (AWS/Azure/GCP). System integration, testing, and on-site commissioning. Provide L1/L2 support, troubleshoot networks & coordinate with vendors. Manage cloud & edge computing setups, VPN, endpoint security. Maintain documentation and use tools like ServiceNow/Jira. ? Required Skills: Networking (TCP/IP, VLANs), Linux/Windows, VMware/Hyper-V. Firewalls: Palo Alto, Fortinet, SonicWall, etc. Cloud: AWS, Azure, GCP | Scripting: Bash, PowerShell.
Posted 2 weeks ago
5.0 - 9.0 years
13 - 17 Lacs
Kolkata
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Cloud Security Architecture Good to have skills : Managed Cloud Security Services Minimum 5 year(s) of experience is required Educational Qualification : Minimum 15 years of full time education Primary Skill :Design and implementation in NGFW (PA/Prisma/Fortinet/Checkpoint/cisco),Web Security( Zscaler, Symantec), in on-prem and Cloud, End point protection, Data center migration.Experience in AWS, Azure, GCP,Experience in Palo Alto/Cisco ASA/ Fortinet firewall / Prisma Access SASE / Zscaler SASE / Netskope / Cloudflare WAF / Email Security.Designing and Preparing HLD, LLD Viso diagrams.Palo Alto Networks Prisma Access SASE.Experience in designing infra security technology products (Panorama, PA NGFW, Prisma Cloud, Email security, Web Security in on-prem and cloud( Azure, AWS, GCP)A Good understanding of Palo Alto Prisma, Panorama, firewalls, App-ID, user-ID, content-ID and Global Protect B In-depth understanding on IPsec VPNs, Global Protect VPNs, Security Profiles, Firewall implementation Good understanding on cloud providers like AWS, Azure D Basic Knowledge on Operating Systems Windows, Unix, Linux"Hands-on experience in Azure/AWS / Email Security ProofPoint / WAF/ SASE (Zscaler/Palo Alto/Netskope)Build & configuration of various NGFW such as Paloalto, FortiGate, Checkpoint, Cisco, Prisma Cloud. Zscaler ZTNA, Netskope, Cloudflare WAFHands on experience and troubleshooting experience in NGFW such as Paloalto, Prisma, fortigate, Checkpoint, Cisco. Prisma Cloud. Zscaler ZTNA, Netskope, Cloudflare WAFHands on experience to skybox,firemon, Tufin Firewall rule review toolCheckpoint, Cisco, Palo alto Certifications, Cloud certificationExperince on Infra Security tools Assessment and security standards like (NIST, CIS, ISO HIPPA & PCI DSS )Professional skills :Quick learner, team player and self-starter.Good Articulation and presentation skills
Posted 2 weeks ago
5.0 - 10.0 years
7 - 12 Lacs
Gurugram
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Architecture Design Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security professional, you will have the opportunity to work on multiple projects that help organizations manage and mitigate risk and maximize enterprise value. In this role, ensuring it meets the business requirements and performance goals. You have to closely work with Project Architect to implement the solution as well as Create and update all supporting documentation for security solutions, Configure and optimize policies to enforce security and compliance standards, follow all security best practices while implementing security solutions. Roles & Responsibility -Create and update all supporting documentation for security solutions, Configure and optimize policies to enforce security and compliance standards.-Follow all security best practices while implementing security solutions.-Responsible for team decisions.-Engage with multiple teams and contribute on key decisions.-Provide solutions to problems for their immediate team and across multiple teams.-Develop and implement security policies and procedures.-Stay updated on the latest security trends and technologies. Professional & Technical Skills:-Design and implementation in Zscaler SASE along with NGFW (PA/Prisma / Zscaler) Web Security (, Symantec), in on-prem and Cloud, End point protection, Data center migrationExperience in Zscaler SASE / Prisma Access SASE / Zscaler SASE / Netskope / Palo Alto/Cisco ASA/ Fortinet firewall / Cloudflare WAF / Email Security-Zscaler SASE cloud-Experience in designing infra security technology products (Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), Zscaler Digital experience (ZDX), deployment of Branch connector & Cloud connector, Remote browser isolation.-In-depth understanding on IPsec VPNs, Global Protect VPNs, Security Profiles, Firewall implementation-Good understanding on cloud providers like AWS, Azure D Basic Knowledge on Operating Systems Windows, Unix, Linux-Build, Design & configuration of various NGFW such as Palo Alto, FortiGate, Checkpoint, Cisco, Prisma Cloud.-Hand-on experience in Azure/AWS-Good Hands-on experience and troubleshooting experience in NGFW such as Palo Alto, Prisma, FortiGate, Checkpoint, Cisco.-Design and hands on experience to skybox, firemon, Tufin Firewall rule review tool, Firewall on-boarding-Checkpoint, Cisco, Palo alto Certification, Cloud certification-Experience on Infra Security tools Assessment and security standards like (NIST, CIS, ISO HIPPA & PCI DSS)NAC, Cisco ISE, Web security technologies as Zscaler, SymantecGood conceptual and working knowledge around Workflow, Approval process. Additional Information:-B.E or MCA or M.Sc with Good Computer Science Background with good academic records-15 years full time education is required. The candidate should have a minimum of 9 years of experience in SASE Tecnologies. Qualifications 15 years full time education
Posted 2 weeks ago
10.0 - 14.0 years
27 - 30 Lacs
Gurugram
Work from Office
Top Selection & Auto Elimination Criteria: Rotational Shift, Only Immediate joiners (0-15 days ), Cab facility : Yes only late night pick or drop(1 side only for Gurgaon Employees) Location : Gurgaon Mode : 5 days work from Office only (NO Work from home) Relevant experience range 9+ Position : L3 SOC Analyst Position Description: The SOC Level 3 Analyst is a senior-level cybersecurity professional responsible for leading advanced threat detection, response, and mitigation activities within the Security Operations Center. This role acts as the final escalation point for complex security incidents and plays a crucial role in enhancing security monitoring, incident response procedures, and overall threat defense capabilities. The L3 Analyst collaborates with security engineers, incident response teams, threat intelligence analysts, and IT stakeholders to identify, investigate, and remediate security threats in real-time. Role and responsibilities: 1. Incident Response and Escalation Lead and coordinate end-to-end response for critical and high-severity security incidents. Perform advanced investigation and forensics on compromised systems, including log correlation, packet analysis, and endpoint review. Serve as a primary escalation point for SOC Tier 1 and Tier 2 analysts. Conduct root cause analysis and provide detailed incident reports with lessons learned and mitigation steps. 2. Threat Detection and Analysis Analyze and triage alerts generated by the SIEM and other security tools. Hunt for threats in the environment using threat intelligence and behavioral indicators (proactive threat hunting). Analyze and reverse-engineer malware, if required, to understand behavior and determine mitigation steps. Correlate threat intelligence feeds with internal data to identify indicators of compromise (IOCs) and advanced persistent threats (APTs). 3. Tooling and Automation Optimize and fine-tune detection rules and SIEM use cases to reduce false positives and enhance detection accuracy. Build automation scripts and workflows to improve efficiency in incident triage, correlation, and response. Collaborate with security engineers to integrate new data sources and tools into the SOC ecosystem. 4. Documentation and Reporting Maintain detailed and accurate documentation of incidents, investigations, and actions taken. Develop and update SOC standard operating procedures (SOPs) and playbooks. Prepare and present technical reports, dashboards, and metrics to senior management and stakeholders. 5. Mentorship and Leadership Mentor and guide SOC L1 and L2 analysts on technical skills and investigative processes. Provide training on new threats, tools, and techniques. Assist in evaluating and improving team workflows, processes, and overall SOC maturity. 6. Collaboration and Stakeholder Engagement Work closely with threat intelligence, vulnerability management, and risk teams to stay ahead of emerging threats. Communicate with IT, DevOps, and business units to coordinate responses and ensure secure configurations. Participate in red/blue team exercises and post-mortem reviews to enhance SOC readiness. Required Experience / Skills: Strong expertise with SIEM platforms (e.g., QRadar, Sentinel, LogRhythm , Splunk,). Proficient in EDR and XDR tools (e.g., CrowdStrike, SentinelOne, Carbon Black). Hands-on knowledge of packet capture analysis tools (e.g., Wireshark, tcpdump), forensic tools, and malware analysis tools. Familiarity with scripting or automation languages such as Python, PowerShell, or Bash. Deep understanding of networking protocols, OS internals (Windows/Linux), and security best practices. Familiar with frameworks such as MITRE ATT&CK, NIST, and the Cyber Kill Chain. Minimum of nine (9) years technical experience 7+ years of experience in SOC, security operations, cyber technical analysis, threat hunting, and threat attribution assessment with increasing responsibilities. 3+ years of rule development and tuning experience 2+ years of Incident response Experience supporting 24x7x365 SOC operations and willing to operate in Shifts including but not limited to Alert and notification activities- analysis/triage/response, Review and action on Threat Intel for IOCs and other operationally impactful information, initial review and triage of reported alerts and Incidents. Manage multiple tickets/alerts in parallel, including end-user coordination. Demonstrated ability to evaluate events (through a triage process) and identify appropriate prioritization for response. Solid understanding and experience analyzing security events generated from security tools and devices not limited to QRadar, MS Sentinel, FireEye, Elastic, SourceFire, Malware Bytes, CarbonBlack/Bit9, Splunk, Prisma Cloud/Compute, Cisco IronPort, BlueCoat Experience and solid understanding of Malware analysis Demonstrated proficiencies with one or more toolsets such as QRadar, MS Sentinel, Bit9/CarbonBlack, Endgame, FireEye HX / CM / ETP, Elastic Kibana Experience and ability to use, contribute, develop and follow Standard Operating Procedures (SOPs) In-depth experience with processing and triage of Security Alerts from multiple sources but not limited to: Endpoint security tools, SIEM, email security solutions, CISA, Threat Intel Sources Experience with scripting languages applied to SOC operations; for example, automating investigations with tools, automating IOC reviews, support SOAR development. Experience with bash, python, and Windows PowerShell scripting Demonstrated experience with triage and resolution of SOC tasks, including but not limited to vulnerability announcements, phishing email review, Tier 1 IR support, SIEM/Security Tools - alert analysis. Demonstrated experience and understanding of event timeline analysis and correlation of events between logs sources. Demonstrated experience with the underlying logs generated by operating systems (Linux/Windows), Network Security Devices, and other enterprise tools. Demonstrated proficiencies with an enterprise SIEM or security analytics solution, including the Elastic Stack or Splunk. Solid understanding and experience analyzing security events generated from security tools and devices not limited to: QRadar, MS Sentinel, Carbon Black, FireEye, Palo Alto, Cylance, and OSSEC Expert in security incident response processes Required Certifications: Two of the following certifications are preferred: GIAC-GCIH Global Certified Incident Handler GIAC-GCFE - Global Information Assurance Certification Forensic Examiner GIAC-GCFA - Global Information Assurance Certification Forensic Analyst GIAC-GREM - GIAC Reverse Engineering Malware GIAC-GNFA - GIAC Network Forensic Analyst GIAC-GCTI - GIAC Cyber Threat Intelligence GIAC-GPen GIAC Certified Penetration Tester GIAC-GWAPT GIAC Certified Web Application Penetration Tester CEPT - Certified Expert Penetration Tester (CEPT) CASS - Certified Application Security Specialist (CASS) CWAPT - Certified Penetration Tester (CWAPT) CREA - Certified Reverse Engineering Analyst (CREA) Qualifications : Bachelors degree in computer science, Information Technology, or a related field. Experience of 5 years or 3 years relevant experience. Strong troubleshooting and problem-solving skills. Excellent communication and interpersonal skills. Ability to work independently and as part of a team. Strong organizational and time management skills. Willingness to work after hours and provide on-call support.
Posted 2 weeks ago
2.0 - 5.0 years
4 - 9 Lacs
Mohali
Work from Office
Job Title: IT Security Specialist Location: Mohali Job Type: Full- Time Key Responsibilities: • Server Hardening: Implement industry-standard server hardening practices to reduce vulnerabilities across critical servers and endpoints. • Network Hardening & Segmentation: Review firewall rules, apply secure network configurations, and implement logical segmentation to minimize the risk of lateral movement within the network. • Configuration & Patch Management: Define and maintain secure baseline configurations for IT assets. Ensure timely application of security patches and updates to mitigate known vulnerabilities. • Active Directory (AD) Hygiene: Perform regular audits to identify and remove stale user accounts, orphaned objects, and excessive privileges. Implement AD best practices to improve both security and compliance. • Endpoint Security Management: Deploy and manage antivirus software, EDR/XDR solutions, device control mechanisms, and full-disk encryption tools to safeguard endpoints across the enterprise. Qualifications: • Bachelors degree in Computer Science, Information Security, or a related field (or equivalent work experience) • 2+ years of hands-on experience in IT security, system hardening, and endpoint protection • Strong understanding of Windows and Linux server environments • Experience with Active Directory and group policy management • Familiarity with security frameworks such as NIST, CIS Controls, or ISO 27001 • Working knowledge of EDR/XDR platforms (e.g., CrowdStrike, SentinelOne, Microsoft Defender) • Excellent problem-solving skills and attention to detail
Posted 2 weeks ago
1.0 - 2.0 years
1 - 4 Lacs
Mumbai, Navi Mumbai
Work from Office
Role & responsibilities Deploy, configure, and manage endpoint protection solutions (e.g., EDR, antivirus, DLP). Monitor and respond to endpoint security alerts and events. Conduct regular endpoint vulnerability scans and assist in remediation efforts. Support incident response activities involving compromised endpoints. Analyze security incidents and recommend improvements to reduce risk. Collaborate with IT teams to ensure secure system configurations and patch management. Document processes, procedures, and security incidents. Assist in compliance efforts related to endpoint security. Keep up to date with the latest security threats and trends impacting endpoint devices.
Posted 2 weeks ago
4.0 - 9.0 years
7 - 12 Lacs
Chennai
Work from Office
Hi All, Greetings from Movate Technologies ( Formerly known as CSSCORP ), We are hiring for L2 Endpoint Security Engineer Role, Job Responsibilities: Provide Technical Support to customers and partners Provide technical services include writing scripts, troubleshooting and best practices to customers Manage support cases to ensure issues are recorded, tracked, resolved, and follow-ups are completed in a timely manner Provide fault isolation and root cause analysis for technical issues Publish Technical Support Bulletins and other technical documentation in the Knowledge Base Review of technical documentation for training materials, technical marketing collateral, manuals, troubleshooting guides, etc. Travel to customer sites in the event of a critical situation to expedite resolution as required Provide on-call support 24x7 on an as needed basis Provide configurations, troubleshooting and best practices to customers. Work with our Engineering team and influence the operability of the product. Participate in regular weekend on-call rotation and provide after-hours support on an as-needed basis. Able to effectively communicate to all levels and stakeholders - internally and externally on complex technical issues Desired Skills: 3+ years of related experience. Provide configurations, troubleshooting and best practices to customers. Required experience with supporting EndPoint software products. Required strong experience with Windows OS, Linux OS and macOS based applications (Installation, troubleshooting, Debugging). Experience with Android OS based applications (Installation, troubleshooting, Debugging). Strong experience with MS environment (SCCM, GPO, AD, MSSQL, IIS). Experience with EndPoint security software is a plus (Antivirus, DLP, IPS, NAC). Knowledge of SIEM, vulnerability management tools and firewalls. Experience understanding malware, exploits, operating system structure and behavior. Experience with batch scripting and Python is a plus Strong ability to independently troubleshoot, reproduce issues and identify feasible workarounds in broad, complex, and unique environments with mixed applications and protocols required. Knowledge of Cloud infrastructure a plus Knowledge of VDI (VMWare Horizon, Citrix XenApp and XenDesktop) is a plus BS/MS or equivalent experience require
Posted 2 weeks ago
3.0 - 7.0 years
3 - 7 Lacs
Pune
Work from Office
About the Role We are seeking a skilled Senior Security Analyst to join our SOC team. The ideal candidate will have a strong background in SOC operation and ensure that the SOC team is performing its functions as required and to trouble shoot incidents and events. As a Senior Security Analyst shall also act as the technical SME, and handle critical SOC task, Incident, guiding Level 1 and Level 2, customer communications. Key Roles & Responsibilities: Incident Response and Management Lead the investigation of high-severity security incidents and breaches. Provide expert analysis for complex incidents that L1 and L2 analysts cannot resolve. Develop and execute incident response procedures, including containment, eradication, and recovery. Ensure proper escalation processes are followed for incidents requiring higher expertise. Communicate with stakeholders, such as management and IT teams, to ensure appropriate handling of incidents. Threat Hunting and Analysis Perform proactive threat hunting activities to identify potential vulnerabilities, threats, and attacks before they happen using Splunk / QRadar SIEM. Use threat intelligence feeds to enrich SOC operations and identify emerging threats. Analyze large volumes of security data to detect patterns and anomalies. Security Tool Management Oversee and optimize the usage of security monitoring tools such as Splunk/ QRadar SIEM (Security Information and Event Management), IDS/IPS (Intrusion Detection/Prevention Systems), and endpoint protection systems. Configure, update, and fine-tune security tools to improve detection capabilities and reduce false positives. Recommend new security tools and technologies to improve SOC operations. Log and Event Analysis Review logs from various sources (network, endpoints, servers, etc.) to identify security incidents. Ensure accurate log data collection and retention practices are followed. Provide in-depth analysis of security alerts and generate reports. Vulnerability Management Conduct vulnerability assessments and prioritize remediation activities for critical vulnerabilities. Collaborate with the IT and development teams to address security flaws and implement patches. Collaboration and Escalation Serve as the point of escalation for L1 and L2 SOC analysts when complex issues arise. Collaborate with other security teams, such as network security, application security, and IT operations, to ensure a comprehensive defense strategy. Work with external partners, including Managed Security Service Providers (MSSPs), to coordinate incident management and threat intelligence sharing. Security Policies and Best Practices Review and recommend improvements to security policies, procedures, and best practices. Ensure that the organization's security policies are being followed and advise on improvements. Conduct regular security awareness training for SOC staff and the broader organization. Reporting and Documentation Generate detailed reports on incidents, security posture, and threats for senior management and relevant stakeholders. Maintain incident logs and documentation to comply with regulatory and internal policies. Ensure all incidents are well-documented with root cause analysis, remediation efforts, and lessons learned. Continuous Improvement Analyze the effectiveness of the SOC's operations and suggest improvements to processes, workflows, and technologies. Stay updated on the latest cyber threats, tools, and techniques. Assist with the development and execution of simulations, exercises, and training to improve SOC capabilities. Compliance and Regulatory Requirements Ensure compliance with SLAs for all projects. Ensure SOC operations meet industry compliance requirements (e.g., GDPR, HIPAA, PCI DSS). Help in audits and compliance assessments related to security operations. Mentoring and Training Provide mentorship and training to junior SOC analysts (L1 and L2). Share knowledge on advanced attack techniques, response strategies, and threat detection methods. Report deviations and concerns to the SOC Manager Basic Qualifications: B.E/B.Tech in Computer Science, Information Technology, Cybersecurity, or a related field. 5+ year of experience and strong foundational knowledge in security operations, SIEM, or IT security. Basic understanding of cybersecurity concepts, networking fundamentals, and security monitoring. Knowledge of IT infrastructure, networking, and cybersecurity principles. Communicate effectively with customers, teammates, and management Excellent problem-solving skills and attention to detail. Strong communication and interpersonal skills. Preferred Qualifications: Certifications in ECIH/GCIH/CISM/CISSP etc. Splunk Certified candidate Exposure to SIEM solutions, specifically Splunk, Qradar ,DNIF or similar platforms. Familiarity with security tools such as EDR, XDR, WAF, DLP, email security gateways, and proxy solutions. Enthusiasm for learning and a strong interest in cybersecurity as a career. Ability to work in a team and adjust to rotational shifts in a high-stakes environment. Knowledge of cloud security and platforms (e.g., AWS, Azure, GCP)
Posted 3 weeks ago
5.0 - 8.0 years
10 - 12 Lacs
Bengaluru
Work from Office
Job Title: Data Privacy & Protection Specialist (Technical Compliance) Key Responsibilities: Ensure compliance with global data protection regulations including GDPR, CCPA, and other relevant frameworks . Design, implement, and maintain data privacy and protection policies , procedures, and controls. Evaluate and implement technical security controls such as: Encryption and Cryptography Data Loss Prevention (DLP) Endpoint Protection Platforms (EPP) Conduct privacy impact assessments (PIAs) and data protection impact assessments (DPIAs) . Provide guidance on data classification, retention, and secure data handling . Required Skills & Qualifications: Bachelors or masters degree in information security, Computer Science, Law, or a related field. 5+ years of experience in data privacy, protection, or compliance roles. Strong understanding of GDPR, CCPA, ISO 27001, NIST , and other data protection standards. Familiarity with SIEM, CASB, IAM, and other security technologies is a plus. Relevant certifications such as CIPM, CIPP/E, CISSP, CISM, or ISO 27001 Lead Implementer are highly desirable. Experience- 5 to 8 years Work location- Bangalore Shift- General Notice- 15 to 30 days.
Posted 3 weeks ago
6.0 - 8.0 years
13 - 18 Lacs
Mumbai, Hyderabad
Work from Office
Summary Lead Endpoint Security and Management, shall be responsible for ensuring the day-to-day operations and maintenance of the organization's Endpoint security. Strengthen security posture and ensure the control effectiveness of security systems within an organization. Collaborate with diverse teams to ensure the seamless functioning of the Solutions, optimization of the security infrastructure and controls. Role & responsibilities 1. Ensure the day-to-day operations and maintenance of the organization's cyber security infrastructure and controls to protect systems, networks, and data. 2. Configuration, Monitoring & Troubleshooting of Antivirus, EDR, XDR, DLP, APT, Sandboxing, Secure Proxy, Endpoint Security, PIM,HIPS, FIM, Laptop/Desktop Encryption etc. 3.Provide resolution of issues escalated from L1 and L2. Handling Shift Operations across 24x7 4.Prepare HLD & LLD, generate configuration template etc for changes. 5. Ensure coverage and effectiveness of Security Solution, Report and Review incidents. 6. Ensure optimum security, availability, performance, and capacity of security solutions under management 7. Ensure & maintain up-to-date documentation - SOPs, Architecture digrams etc. to remove dependency on people 8. Manage configuration changes and deployments according to established change management processes, ensuring minimal disruption and adherence to best practices. 9. Ensure hardening, latest stable version and security patches of security devices and solutions 10. Track EOL/EOS and ensre that there no technology obsolescence. 11. Ensure resolution of incidents and outages, coordinating with internal teams and external vendors to restore service within agreed-upon SLAs. 12. Manage escalations and run the smooth operations of security solutions. 13. Ensure relevant processes are followed for change, incident & daily operations 14. Identify & analyse pain areas in existing security operations & implement improvements 15. Manage operational issues which require design/technical inputs. 16. Ensure compliance with regulatory requirements, security policies, and security frameworks such as ISO 27001, NIST, or CIS 17. Publish the relevant dashboards and status updates. 18. Escalate deviations and violations in a timely manner. 19. Remain current with organizations security policies, latest security advisories/threats, industry best-practices and developments in cyber security, and recommend and implement best practices and technologies to mitigate emerging threats. Knowledge 1. Sound experience in managing Endpoint security technologies and operations in a large and complex environment. 2. Should have sound understanding & knowledge of various Operating system, security technologies & techniques like Anti-malware,APT, Sandboxing, Secure Proxy, Endpoint Security, PIM, NAC,HIPS, FIM, Laptop/Desktop Encryption etc. 3. Should have hands on experience on Antivirus, EDR, XDR, DLP and incident response techniques and technologies. 4. Should have knowledge & understanding of Cloud Technologies, IT infrastructure & networking technologies, operations and security principles. 5. Should have sound understanding about Threat Hunting, Mitigation and Response. 6. Strong understanding of Regulatory security guildelines & master directions and security frameworks such as ISO 27001, NIST, or CIS. 7. Should be well versed with ITIL and ITSM practices. Preferred candidate profile 1. Exceptional analytical, conceptual thinking, Troubleshooting and problem-solving skills. 2. Strong leadership, negotiation, and conflict resolution skills. 3. Detail-oriented with a focus on quality and accuracy in project/service deliverables 4. Should have strong written, verbal and presentation skills. 5. Ability to perform under pressure, influence stakeholders and work closely with them to determine acceptable solutions.
Posted 3 weeks ago
3 - 8 years
5 - 10 Lacs
Gurugram
Work from Office
Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Endpoint Protection Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Job Summary :We are seeking a skilled Beyond Trust Endpoint Privilege Management (EPM) Specialist to join our IT security team. The ideal candidate will be responsible for implementing, managing, and optimizing Beyond Trust EPM solutions on Windows 10 and Windows 11 environments. This role focuses on enhancing security by managing and controlling administrative privileges on endpoints, reducing attack surfaces, and ensuring compliance with security policies.Key Responsibilities: Implementation and Configuration:oDeploy and configure Beyond Trust EPM solutions on Windows 10 and Windows 11 systems.oCustomize EPM policies to meet organizational security requirements and best practices.oIntegrate Beyond Trust EPM with existing IT infrastructure and security tools. Privilege Management:oDevelop and enforce policies for least privilege access on endpoints.oMonitor and manage user and application privileges to prevent unauthorized access.oCreate and maintain whitelists and blacklists for applications and processes. Security and Compliance:oEnsure endpoint security compliance with organizational policies and regulatory requirements.oConduct regular audits of privileged access and generate compliance reports.oCollaborate with security and compliance teams to address findings and improve security posture. Monitoring and Reporting:oSet up and maintain monitoring and alerting systems for privileged access activities.oAnalyze and respond to security incidents related to privileged access.oGenerate regular reports on EPM activities, incidents, and compliance status. User Training and Support:oProvide training and support to end-users and IT staff on EPM policies and procedures.oAssist in troubleshooting and resolving issues related to EPM solutions.oDevelop and update documentation and training materials. Continuous Improvement:oStay up to date with the latest security threats, trends, and technologies.oRecommend and implement improvements to EPM policies and configurations.oParticipate in security assessments and risk management activities. Qualifications: Education:oBachelor's degree in information technology, Computer Science, Cybersecurity, or related field. Relevant certifications and experience may be considered in lieu of a degree. Experience:oProven experience in implementing and managing Beyond Trust EPM solutions.oStrong knowledge of Windows 10 and Windows 11 operating systems.oExperience with endpoint security and privilege management. Skills and Competencies:oDeep understanding of least privilege access principles and practices.oProficiency in configuring and managing EPM policies and rules.oFamiliarity with Active Directory, Group Policy, and other endpoint management tools.oExcellent troubleshooting and problem-solving skills.oStrong communication and interpersonal skills.oAbility to work independently and as part of a team. Certifications:oRelevant certifications such as Beyond Trust Certified Engineer (BTCE), Certified Information Qualifications 15 years full time education
Posted 1 month ago
5 - 10 years
4 - 9 Lacs
Nagpur
Work from Office
Job Title: Lead Engineer Email Gateway Experience: 5 to 6 Years Location: Nagpur Education: Bachelor of Engineering (BE) Bachelor of Technology (BTech) Master of Technology (M.Tech) Industry Type: IT Services & Consulting / Cybersecurity Employment Type: Full Time, Permanent Role Category: IT Infrastructure Services / Security Job Description: We are hiring a Lead Engineer Email Gateway to manage and secure enterprise email infrastructure. The role involves hands-on operational support, enhancement of email security measures, and collaboration with vendors to ensure robust and secure email services. Key Responsibilities: Act as the primary contact for operational ticket resolution for email security issues Manage and maintain Trend Micro Email Gateway (DDEI and IMSVA) Daily monitoring of mail services, patch management, and server performance Perform email threat analysis : phishing, spoofing, spam, malware Conduct patching, upgrades, and implementation of email gateways Monitor SPF, DKIM, DMARC configurations for email authentication Troubleshoot mail delivery issues and prepare Root Cause Analysis (RCA) Ensure proper documentation and support during audits Work with vendors to resolve escalations and system improvements Basic networking and DNS records knowledge is a must Required Skills: Strong knowledge of email authentication protocols : SPF, DKIM, DMARC Experience in patching, upgrading, and implementing secure email gateways Knowledge of spam, phishing, and spoofing mitigation Hands-on experience with Trend Micro Email Security Solutions Familiarity with DNS records , networking basics RCA preparation and ticket management Desired Candidate Profile: 5+ years of experience in email infrastructure or email security roles Strong communication and troubleshooting skills Team player with ability to handle pressure and time-sensitive tasks Experience working in enterprise environments and with vendor support Interested cadidates fill the details below and share on Anurag.Yadav@softenger.com Updated Resume : Total Experience : Relevant Experience : Current CTC : Expected CTC : Notice Period : Are you willing to relocate to Nagpur location:
Posted 1 month ago
5 - 10 years
8 - 13 Lacs
Pune
Work from Office
About The Role : Job TitleSenior Engineer, AVP LocationPune, India Role Description We are seeking a Data Security Engineer to design, implement and manage security measures that protect sensitive data across our organization. This role focusses on the execution and delivery of Data Security solutions, focusing on configuration, engineering, and integration within a complex enterprise environment. While the role operates within Cybersecurity the person will collaborate with IT, Risk Management, and Business Units on a case-by-case basis, delving Data Loss prevention solutions. The ideal candidate understands and manages the existing tool stack within a complex environment, navigates through technical integration challenges and supports the transition from legacy solutions to new solutions within the pillar and across different areas of the bank. This role will work on specific tools like Symantec DLP, Zscaler but require the flexibility to evaluate and integrate new solutions like PaloAlto, Fortinet, Microsoft Purview and capabilities in existing cloud security solutions like Azure/GCP. What we'll offer you As part of our flexible scheme, here are just some of the benefits that youll enjoy Best in class leave policy Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Policy Development and ImplementationDesign and implement data loss prevention policies, standards, and procedures to protect sensitive data from unauthorized access and disclosure. Risk AssessmentConduct regular assessments of our implementation to identify vulnerabilities and potential threats to the organization's data. Develop strategies to mitigate identified risks. DLP SolutionsEvaluate, deploy, and manage DLP solutions and technologies. Ensure that these tools are effectively integrated and configured to protect sensitive data across the organization. Monitoring and AnalysisMonitor data movement and usage to detect and respond to potential data breaches or policy violations. Analyse incidents to identify root causes and develop corrective actions. CollaborationWork with IT, legal, and business teams to ensure that DLP measures align with organizational goals and regulatory requirements. Provide guidance and support to stakeholders on data protection issues. Design and Implement data security frameworks, including encryption, tokenization and anonymization techniques within a hybrid environment Implement cloud-native security controls (e.g., CASB, CSPM, DSPM ) to protect data in SaaS, IaaS, and PaaS environments. Implement Digital Rights Management, encryption and tokenization strategies and solutions to protect data in hybrid environments and prevent unauthorized access and disclosure. Deploy and manage data discovery & classification tools to identify sensitive data across structured and unstructured sources. Implement automated classification and labeling strategies for compliance and risk reduction. Your skills and experience Technical Expertise 5+ years of hands-on experience in Data Security, Information Protection, or Cloud Security. Strong expertise in delivering Data Security platforms (Symantec, Netskope, Zscaler, PaloAlto, Fortinet, etc.). Knowledge of Cloud Service Provisioning and experience with Cloud Security (AWS, Azure, GCP) and SaaS data protection solutions. Experience with Cloud Security (CASB), SaaS Security Posture Management (SSPM), Data Security Posture Management (DSPM). Proficiency in network security, endpoint protection, and identity & access management (IAM). Scripting knowledge (Python, PowerShell, APIs) for security automation are a plus. Hands-on experience with AI/ML and data security related remediations are a plus. Soft Skills & Collaboration Strong problem-solving and analytical skills to assess security threats and data exposure risks. Ability to work cross-functionally with Security, IT, and Risk teams. Effective written and verbal communication skills, especially when documenting security configurations and investigations. Professional certifications such as CISSP, CISM, CCSP, GIAC (GCIH, GCFA), or CEH. How we'll support you Training and development to help you excel in your career Coaching and support from experts in your team A culture of continuous learning to aid progression A range of flexible benefits that you can tailor to suit your needs
Posted 1 month ago
3 - 8 years
5 - 10 Lacs
Gurugram
Work from Office
Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Endpoint Protection Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Job Summary :We are seeking a skilled Beyond Trust Endpoint Privilege Management (EPM) Specialist to join our IT security team. The ideal candidate will be responsible for implementing, managing, and optimizing Beyond Trust EPM solutions on Windows 10 and Windows 11 environments. This role focuses on enhancing security by managing and controlling administrative privileges on endpoints, reducing attack surfaces, and ensuring compliance with security policies.Key Responsibilities: Implementation and Configuration:oDeploy and configure Beyond Trust EPM solutions on Windows 10 and Windows 11 systems.oCustomize EPM policies to meet organizational security requirements and best practices.oIntegrate Beyond Trust EPM with existing IT infrastructure and security tools. Privilege Management:oDevelop and enforce policies for least privilege access on endpoints.oMonitor and manage user and application privileges to prevent unauthorized access.oCreate and maintain whitelists and blacklists for applications and processes. Security and Compliance:oEnsure endpoint security compliance with organizational policies and regulatory requirements.oConduct regular audits of privileged access and generate compliance reports.oCollaborate with security and compliance teams to address findings and improve security posture. Monitoring and Reporting:oSet up and maintain monitoring and alerting systems for privileged access activities.oAnalyze and respond to security incidents related to privileged access.oGenerate regular reports on EPM activities, incidents, and compliance status. User Training and Support:oProvide training and support to end-users and IT staff on EPM policies and procedures.oAssist in troubleshooting and resolving issues related to EPM solutions.oDevelop and update documentation and training materials. Continuous Improvement:oStay up to date with the latest security threats, trends, and technologies.oRecommend and implement improvements to EPM policies and configurations.oParticipate in security assessments and risk management activities. Qualifications: Education:oBachelor's degree in information technology, Computer Science, Cybersecurity, or related field. Relevant certifications and experience may be considered in lieu of a degree. Experience:oProven experience in implementing and managing Beyond Trust EPM solutions.oStrong knowledge of Windows 10 and Windows 11 operating systems.oExperience with endpoint security and privilege management. Skills and Competencies:oDeep understanding of least privilege access principles and practices.oProficiency in configuring and managing EPM policies and rules.oFamiliarity with Active Directory, Group Policy, and other endpoint management tools.oExcellent troubleshooting and problem-solving skills.oStrong communication and interpersonal skills.oAbility to work independently and as part of a team. Certifications:oRelevant certifications such as Beyond Trust Certified Engineer (BTCE), Certified Information Qualifications 15 years full time education
Posted 1 month ago
5 - 10 years
7 - 12 Lacs
Gurugram
Work from Office
Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Endpoint Protection Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Job Summary :We are seeking a skilled Beyond Trust Endpoint Privilege Management (EPM) Specialist to join our IT security team. The ideal candidate will be responsible for implementing, managing, and optimizing Beyond Trust EPM solutions on Windows 10 and Windows 11 environments. This role focuses on enhancing security by managing and controlling administrative privileges on endpoints, reducing attack surfaces, and ensuring compliance with security policies.Key Responsibilities: Implementation and Configuration:oDeploy and configure Beyond Trust EPM solutions on Windows 10 and Windows 11 systems.oCustomize EPM policies to meet organizational security requirements and best practices.oIntegrate Beyond Trust EPM with existing IT infrastructure and security tools. Privilege Management:oDevelop and enforce policies for least privilege access on endpoints.oMonitor and manage user and application privileges to prevent unauthorized access.oCreate and maintain whitelists and blacklists for applications and processes. Security and Compliance:oEnsure endpoint security compliance with organizational policies and regulatory requirements.oConduct regular audits of privileged access and generate compliance reports.oCollaborate with security and compliance teams to address findings and improve security posture. Monitoring and Reporting:oSet up and maintain monitoring and alerting systems for privileged access activities.oAnalyze and respond to security incidents related to privileged access.oGenerate regular reports on EPM activities, incidents, and compliance status. User Training and Support:oProvide training and support to end-users and IT staff on EPM policies and procedures.oAssist in troubleshooting and resolving issues related to EPM solutions.oDevelop and update documentation and training materials. Continuous Improvement:oStay up to date with the latest security threats, trends, and technologies.oRecommend and implement improvements to EPM policies and configurations.oParticipate in security assessments and risk management activities. Qualifications: Education:oBachelor's degree in information technology, Computer Science, Cybersecurity, or related field. Relevant certifications and experience may be considered in lieu of a degree. Experience:oProven experience in implementing and managing Beyond Trust EPM solutions.oStrong knowledge of Windows 10 and Windows 11 operating systems.oExperience with endpoint security and privilege management. Skills and Competencies:oDeep understanding of least privilege access principles and practices.oProficiency in configuring and managing EPM policies and rules.oFamiliarity with Active Directory, Group Policy, and other endpoint management tools.oExcellent troubleshooting and problem-solving skills.oStrong communication and interpersonal skills.oAbility to work independently and as part of a team. Certifications:oRelevant certifications such as Beyond Trust Certified Engineer (BTCE), Certified Information Qualifications 15 years full time education
Posted 1 month ago
5 - 10 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Operation Automation Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are seeking an experienced and innovative SOAR Architect to lead the design, development, and implementation of advanced Security Orchestration, Automation, and Response (SOAR) solutions. The ideal candidate will leverage their expertise in platforms like Splunk Phantom, Chronicle SOAR, and Cortex XSOAR to optimize and automate incident response workflows, enhance threat detection, and improve overall security operations efficiency. Roles & Responsibilities: SOAR Strategy and Architecture:Develop strategies for automation, playbook standardization, and process optimization. Playbook Development:Create, test, and deploy playbooks for automated threat detection, investigation, and response. Collaborate with SOC teams to identify repetitive tasks for automation and translate them into SOAR workflows. Integration and Customization:Integrate SOAR platforms with existing security tools, including SIEM, threat intelligence platforms, and endpoint protection. Customize connectors and APIs to enable seamless communication between security tools. Collaboration and Leadership:Work closely with SOC analysts, threat hunters, and other stakeholders to align automation efforts with organizational goals. Provide technical mentorship to analysts on SOAR platform utilization. Performance Optimization:Continuously evaluate SOAR platform performance and implement improvements for scalability and reliability. Monitor automation workflows and troubleshoot issues to ensure consistent operations. Compliance and Best Practices:Ensure that all SOAR implementations align with industry standards, compliance regulations, and organizational policies. Stay up to date with the latest advancements in SOAR technology and incident response practices. Professional & Technical Skills: Proficiency in scripting and programming Python to develop custom playbooks and integrations. Strong understanding of security operations, incident response, and threat intelligence workflows. Proven track record of integrating SOAR with SIEM solutions (e.g., Splunk, Chronicle), EDR, and other security tools. Ability to troubleshoot complex integration and automation issues effectively. Additional Information: Certifications such as Splunk Phantom Certified Admin, XSOAR Certified Engineer, or equivalent. Experience with cloud-native SOAR deployments and hybrid environments. Familiarity with frameworks like MITRE ATT&CK, NIST CSF, or ISO 27001. A 15 year full-time education is required 3.5 years of hands-on experience with SOAR platforms like Splunk Phantom (On-Prem and Cloud), Chronicle SOAR, and Cortex XSOAR. Qualification 15 years full time education
Posted 1 month ago
3 - 7 years
8 - 13 Lacs
Pune
Work from Office
About The Role : Job TitleSenior Engineer, AVP LocationPune, India Role Description We are seeking a Data Security Engineer to design, implement and manage security measures that protect sensitive data across our organization. This role focusses on the execution and delivery of Data Security solutions, focusing on configuration, engineering, and integration within a complex enterprise environment. While the role operates within Cybersecurity the person will collaborate with IT, Risk Management, and Business Units on a case-by-case basis, delving Data Loss prevention solutions. The ideal candidate understands and manages the existing tool stack within a complex environment, navigates through technical integration challenges and supports the transition from legacy solutions to new solutions within the pillar and across different areas of the bank. This role will work on specific tools like Symantec DLP, Zscaler but require the flexibility to evaluate and integrate new solutions like PaloAlto, Fortinet, Microsoft Purview and capabilities in existing cloud security solutions like Azure/GCP. What we'll offer you As part of our flexible scheme, here are just some of the benefits that youll enjoy Best in class leave policy Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Policy Development and ImplementationDesign and implement data loss prevention policies, standards, and procedures to protect sensitive data from unauthorized access and disclosure. Risk AssessmentConduct regular assessments of our implementation to identify vulnerabilities and potential threats to the organization's data. Develop strategies to mitigate identified risks. DLP SolutionsEvaluate, deploy, and manage DLP solutions and technologies. Ensure that these tools are effectively integrated and configured to protect sensitive data across the organization. Monitoring and AnalysisMonitor data movement and usage to detect and respond to potential data breaches or policy violations. Analyse incidents to identify root causes and develop corrective actions. CollaborationWork with IT, legal, and business teams to ensure that DLP measures align with organizational goals and regulatory requirements. Provide guidance and support to stakeholders on data protection issues. Design and Implement data security frameworks, including encryption, tokenization and anonymization techniques within a hybrid environment Implement cloud-native security controls (e.g., CASB, CSPM, DSPM ) to protect data in SaaS, IaaS, and PaaS environments. Implement Digital Rights Management, encryption and tokenization strategies and solutions to protect data in hybrid environments and prevent unauthorized access and disclosure. Deploy and manage data discovery & classification tools to identify sensitive data across structured and unstructured sources. Implement automated classification and labeling strategies for compliance and risk reduction. Your skills and experience Technical Expertise 5+ years of hands-on experience in Data Security, Information Protection, or Cloud Security. Strong expertise in delivering Data Security platforms (Symantec, Netskope, Zscaler, PaloAlto, Fortinet, etc.). Knowledge of Cloud Service Provisioning and experience with Cloud Security (AWS, Azure, GCP) and SaaS data protection solutions. Experience with Cloud Security (CASB), SaaS Security Posture Management (SSPM), Data Security Posture Management (DSPM). Proficiency in network security, endpoint protection, and identity & access management (IAM). Scripting knowledge (Python, PowerShell, APIs) for security automation are a plus. Hands-on experience with AI/ML and data security related remediations are a plus. Soft Skills & Collaboration Strong problem-solving and analytical skills to assess security threats and data exposure risks. Ability to work cross-functionally with Security, IT, and Risk teams. Effective written and verbal communication skills, especially when documenting security configurations and investigations. Professional certifications such as CISSP, CISM, CCSP, GIAC (GCIH, GCFA), or CEH. How we'll support you Training and development to help you excel in your career Coaching and support from experts in your team A culture of continuous learning to aid progression A range of flexible benefits that you can tailor to suit your needs
Posted 1 month ago
3 - 5 years
0 - 0 Lacs
Trivandrum
Work from Office
Overview: We are seeking a skilled IT Security Engineer to manage patching, endpoint security, and automation across our infrastructure. The ideal candidate will be responsible for implementing security measures, ensuring compliance, and optimizing system performance through proactive security initiatives. Key Responsibilities: Patch Management: Develop and implement an effective patching strategy for Windows, Linux, and third-party applications. Utilize Endpoint Central (ManageEngine) to deploy patches, track compliance, and troubleshoot failures. Coordinate with teams to test and schedule patch rollouts with minimal business impact. Generate patch compliance reports and remediate non-compliant systems. Endpoint Central Management: Administer and optimize ManageEngine Endpoint Central for device management, patching, and software deployment. Monitor system health, enforce policies, and manage endpoint security configurations. Automate routine endpoint tasks using custom scripts. CrowdStrike Antivirus Management: Deploy, configure, and manage CrowdStrike Falcon for endpoint protection. Monitor security s, analyze threats, and take remediation actions. Ensure endpoint devices comply with security standards and company policies. Collaborate with SOC teams to investigate security incidents and fine-tune detection rules. Scripting & Automation: Develop and maintain PowerShell, Python, or Bash scripts to automate patching, compliance checks, and endpoint management tasks. Create dashboards and reports for patch status, endpoint security, and compliance tracking. Optimize security operations through custom automation solutions. Required Skills & Qualifications: 3+ years of experience in IT security, patch management, and endpoint protection. Hands-on experience with ManageEngine Endpoint Central for endpoint and patch management. Strong knowledge of CrowdStrike Falcon or similar EDR/XDR solutions. Proficiency in scripting (PowerShell, Python, or Bash) for automation and system management. Understanding of vulnerability management tools (Qualys, Nessus, Tenable, etc.). Familiarity with compliance frameworks like ISO 27001, NIST, or CIS benchmarks. Strong troubleshooting, analytical, and communication skills. Preferred Qualifications: Experience in security hardening and compliance auditing. Knowledge of cloud-based security solutions. Relevant certifications such as CISSP, CISM, CEH, or Security+. Required Skills Patch Management,Endpoint Management,CrowdStrike
Posted 2 months ago
5 - 10 years
8 - 13 Lacs
Pune
Work from Office
About The Role : Job TitleSenior Engineer, AVP LocationPune, India Role Description We are seeking a Data Security Engineer to design, implement and manage security measures that protect sensitive data across our organization. This role focusses on the execution and delivery of Data Security solutions, focusing on configuration, engineering, and integration within a complex enterprise environment. While the role operates within Cybersecurity the person will collaborate with IT, Risk Management, and Business Units on a case-by-case basis, delving Data Loss prevention solutions. The ideal candidate understands and manages the existing tool stack within a complex environment, navigates through technical integration challenges and supports the transition from legacy solutions to new solutions within the pillar and across different areas of the bank. This role will work on specific tools like Symantec DLP, Zscaler but require the flexibility to evaluate and integrate new solutions like PaloAlto, Fortinet, Microsoft Purview and capabilities in existing cloud security solutions like Azure/GCP. What we'll offer you As part of our flexible scheme, here are just some of the benefits that youll enjoy Best in class leave policy Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Policy Development and ImplementationDesign and implement data loss prevention policies, standards, and procedures to protect sensitive data from unauthorized access and disclosure. Risk AssessmentConduct regular assessments of our implementation to identify vulnerabilities and potential threats to the organization's data. Develop strategies to mitigate identified risks. DLP SolutionsEvaluate, deploy, and manage DLP solutions and technologies. Ensure that these tools are effectively integrated and configured to protect sensitive data across the organization. Monitoring and AnalysisMonitor data movement and usage to detect and respond to potential data breaches or policy violations. Analyse incidents to identify root causes and develop corrective actions. CollaborationWork with IT, legal, and business teams to ensure that DLP measures align with organizational goals and regulatory requirements. Provide guidance and support to stakeholders on data protection issues. Design and Implement data security frameworks, including encryption, tokenization and anonymization techniques within a hybrid environment Implement cloud-native security controls (e.g., CASB, CSPM, DSPM ) to protect data in SaaS, IaaS, and PaaS environments. Implement Digital Rights Management, encryption and tokenization strategies and solutions to protect data in hybrid environments and prevent unauthorized access and disclosure. Deploy and manage data discovery & classification tools to identify sensitive data across structured and unstructured sources. Implement automated classification and labeling strategies for compliance and risk reduction. Your skills and experience Technical Expertise 5+ years of hands-on experience in Data Security, Information Protection, or Cloud Security. Strong expertise in delivering Data Security platforms (Symantec, Netskope, Zscaler, PaloAlto, Fortinet, etc.). Knowledge of Cloud Service Provisioning and experience with Cloud Security (AWS, Azure, GCP) and SaaS data protection solutions. Experience with Cloud Security (CASB), SaaS Security Posture Management (SSPM), Data Security Posture Management (DSPM). Proficiency in network security, endpoint protection, and identity & access management (IAM). Scripting knowledge (Python, PowerShell, APIs) for security automation are a plus. Hands-on experience with AI/ML and data security related remediations are a plus. Soft Skills & Collaboration Strong problem-solving and analytical skills to assess security threats and data exposure risks. Ability to work cross-functionally with Security, IT, and Risk teams. Effective written and verbal communication skills, especially when documenting security configurations and investigations. Professional certifications such as CISSP, CISM, CCSP, GIAC (GCIH, GCFA), or CEH. How we'll support you Training and development to help you excel in your career Coaching and support from experts in your team A culture of continuous learning to aid progression A range of flexible benefits that you can tailor to suit your needs
Posted 2 months ago
4 - 6 years
5 - 9 Lacs
Bengaluru
Work from Office
We are seeking a highly skilled and experienced Senior Security Engineer to join our cybersecurity team. The ideal candidate will have a deep understanding of security technologies and practices, particularly in the areas of automation, cloud security, vulnerability management, endpoint protection, and security data analytics. You will play a pivotal role in securing our infrastructure, automating security operations, and ensuring that our security posture is both proactive and responsive to emerging threats. As a Senior Security Engineer, you will be working with cutting-edge technologies like Cortex XSOAR , Splunk , AWS , Terraform , Qualys , CrowdStrike , and Axonius . A strong foundation in penetration testing and experience in security data analytics using tools like Splunk will be crucial. The role will also require expertise in asset management using Axonius to track and manage assets within our environment. Additionally, the candidate should possess relevant certifications such as XSOAR , AWS , and Penetration Testing (OSCP) . Roles and Responsibilities Key Responsibilities: • Security Automation & Orchestration: Design, implement, and manage automated workflows in Cortex XSOAR to streamline security operations. Integrate multiple security tools, including Splunk , Qualys , CrowdStrike , and Axonius , into XSOAR to enable automated detection, response, and remediation actions. Leverage Terraform to define and provision cloud security resources and configurations. • Cloud Security (AWS): Design and implement security controls, monitoring, and automation in AWS environments. Work with cloud-native tools and services to enhance the security of infrastructure, including IAM , VPC , and EC2 security. Conduct security assessments on cloud services, identifying risks and implementing mitigation strategies. • Security Data Analytics with Splunk: Utilize Splunk for comprehensive security event monitoring, log analysis, and threat hunting across the infrastructure. Develop advanced search queries, dashboards, and alerts within Splunk to identify anomalies and potential threats. Leverage Splunk 's capabilities to correlate data from multiple sources and detect security incidents in real time. Conduct root cause analysis of incidents using Splunk and provide actionable insights for incident response and remediation. • Penetration Testing & Security Assessments: Perform basic penetration testing and vulnerability assessments to identify weaknesses in both cloud and on-prem systems. Collaborate with security teams to perform red team exercises and simulate real-world attacks to assess the effectiveness of existing defenses. • Incident Response & Investigation: Lead or support the investigation of security incidents, including detection, analysis, containment, and remediation. Provide recommendations for improvements to the overall security posture based on incident learnings. • Collaboration & Documentation: Collaborate with other security engineers and teams to improve overall security practices. Document security processes, workflows, and incident reports clearly and concisely. Educate and mentor junior security engineers and team members on security best practices and tools. Required Qualifications: • Experience: At least 5-7 years of experience in a security engineering role, with a strong background in security automation, cloud security, vulnerability management, and security data analytics . Hands-on experience with Cortex XSOAR to automate security operations and integrate security tools into centralized workflows. Proficiency with Splunk for security monitoring, alerting, and reporting. Experience securing AWS environments, including managing IAM , VPC , EC2 , and other cloud resources. Familiarity with Terraform for automating infrastructure as code (IaC) to provision and secure cloud resources. Experience with Qualys for vulnerability management, including scanning, remediation tracking, and reporting. Proficiency in CrowdStrike Falcon for endpoint protection and incident detection. Experience with Axonius for asset management, including inventory tracking, compliance monitoring, and integration with other security tools. Basic knowledge of penetration testing techniques, including identifying common vulnerabilities and exploiting weaknesses. • Certifications: Cortex XSOAR Certified (Preferred) or equivalent experience. AWS Certified Security or other relevant AWS certifications (Preferred). Offensive Security Certified Professional (OSCP) or other penetration testing certifications (Preferred). • Skills: Strong understanding of security concepts, protocols, and technologies. Familiarity with common attack vectors, exploit techniques, and security mitigation strategies. Experience in security event monitoring, log analysis, and threat hunting using SIEM platforms like Splunk . Knowledge of regulatory compliance frameworks such as NIST , ISO 27001 , SOC 2 , and GDPR . Solid scripting or programming skills ( Python , Bash , etc.) to automate tasks and processes. Strong analytical, troubleshooting, and problem-solving skills. Preferred Qualifications: AWS Certifications (e.g., AWS Certified Solutions Architect, AWS Certified DevOps Engineer) or similar certifications in Azure or GCP. Familiarity with security best practices in DevSecOps environments. Hands-on experience with serverless computing (e.g., AWS Lambda, Google Cloud Functions). Knowledge of SIEM (Security Information and Event Management) tools and how to configure and manage them. Experience working in Agile or DevOps environments. Strong troubleshooting skills for cloud infrastructure, security incidents, and workflow orchestration.
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2