Jobs
Interviews

826 Endpoint Security Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

10.0 - 14.0 years

0 Lacs

jaipur, rajasthan

On-site

As the CISO (Chief Information Security Officer) at Digamber Capfin Limited, located in Jaipur, Rajasthan, your primary responsibility is to build the information security function of the organization from the ground up. You will play a crucial role in transforming Digamber NBFC into a tech-first financial institution. Your role is both strategic and operational, involving defining the security vision and directly implementing tools, policies, and processes in the initial stages. **Key Responsibilities:** - **Security Governance & Strategy** - Define a 2-3 year information security roadmap aligned with RBI/NBFC guidelines. - Draft and implement security policies covering endpoint security, IAM, vendor risk management, and incident response. - Establish and run the organization's Governance, Risk, and Compliance (GRC) framework. - **Regulatory & Compliance** - Lead RBI cyber security compliance, including evidence preparation and audit closure. - Coordinate with external auditors and regulators. - Ensure all security initiatives meet or exceed regulatory requirements. - **Security Operations (Hands-On)** - Set up and configure SIEM/SOC monitoring in collaboration with vendors or MSSPs. - Oversee and execute endpoint security rollout (EDR/antivirus, encryption, patching). - Manage incident detection, response, and reporting. - **Identity & Access Management (IAM)** - Implement MFA, privileged access controls, and quarterly access reviews. - Work with IT to automate user provisioning and deprovisioning. - **Vendor & Outsourced Service Security** - Evaluate and approve vendor security posture (e.g., M2P LMS, cloud services). - Integrate security clauses and SLAs into vendor contracts. - Monitor vendor performance and compliance. - **Awareness & Training** - Launch company-wide security awareness programs and phishing simulations. - Build a culture of security across 700+ employees. **Qualifications Required:** - Proven track record of building or maturing a security program from low maturity. - Hands-on experience with SIEM, Endpoint protection & patch management, IAM solutions, Vulnerability scanning & remediation. - Strong understanding of RBI regulations for NBFCs. - Experience managing outsourced SOC/MSSP and IT vendors. - Excellent communication skills - able to work with executives and train non-technical staff. Join Digamber Capfin Limited and be part of a mission-driven organization that empowers rural Indian minds with financial services. With a strong presence in 8 states and over 90 districts, you will contribute to making a positive impact on society by enabling the rural population to succeed and grow.,

Posted 1 day ago

Apply

7.0 - 12.0 years

14 - 24 Lacs

chennai

Work from Office

RESPONSIBILITIES Harden endpoint and server systems through baseline configurations and continuous validation. Manage and monitor PAM and PIM platforms, including session monitoring and access vaulting. Administer antivirus/EDR solutions, ensuring AV coverage, threat response, and policy compliance. Implement DLP controls (non-O365) across USB, endpoint, and file-sharing systems. Coordinate with SOC/MSSP for threat detection, log review, and incident containment. Lead patch management reviews and support monthly compliance validation. Review local admin rights, USB access, and enforce endpoint security controls. Contribute to GRC and audit efforts with evidence and dashboards. Maintain metrics for EDR alerts, patch status, and privilege usage trends REQUIRED SKILLS Strong technical understanding of EDR, AV, and DLP tools. Expertise in endpoint/server configuration and hardening (Windows/Linux). Experience with PAM solutions like CyberArk or BeyondTrust. Familiarity with incident response and threat remediation practices. Ability to collaborate with SOC and MSSP partners.

Posted 1 day ago

Apply

5.0 - 7.0 years

4 - 9 Lacs

thane, navi mumbai, mumbai (all areas)

Work from Office

Position - MS Defender - Endpoint (MDE) Specialist Job location :- Ghansoli Shift:- Rotational shift We are seeking a highly skilled and experienced L3 for handling EDR operations to our dynamic security team. The Ideal candidate will play a key role in advance threat detection, Incident response and responding to critical security incident and enhancing our endpoint security capabilities with EDR tools. Roles & Responsibilities Investigate and analyse sophisticated security alerts and events to determine root cause, scope and impact of security incidents. Provide technical expertise and guidance to junior analysts (L1, L2s), assisting with incident investigations, analysis and resolution. Develop and implement advanced detection and response strategies using Carbon Black EDR to enhance our overall security posture. Lead incident response efforts, including coordination with cross-functional teams and external stakeholders. Conduct in-depth analysis of endpoint data and logs to identify indicators of compromise (IOCs) and advanced attack techniques. Collaborate with threat intelligence teams to stay updated on emerging threats and tactics used by threat actors. Develop and maintain security playbooks, procedures and response plans for incident response and threat hunting. Assist in the tuning and optimization of Carbon Black EDR policies, SIEM rules and custom queries to improve detection efficacy. Stay abreast of industry best practices, emerging technologies and trends in endpoint security and threat detection. Provide regular reports and updates on security incident trends, analysis findings and mitigation efforts to stakeholders. Personal & TECH Skills: Good Team player. Possess Positive and learning attitude. Good Verbal and Written communication skills. Sense of Ownership, Priorities and Autonomous. At least one technical certification required (CEH, CompTIA Security+, CBCA, CSA etc.) Should have at least one cyber security certification (CISM, CCIR, ECSA, GCIH etc) Knowledge of banking business and information technology practices and trends in banking sector. Understanding of technology-related issues and how they might impact business; Ability to communicate effectively, both orally and in writing. Knowledge of banking business and information technology practices and trends in banking sector. Qualifications Graduation/Post graduation in, Computers, Information Systems, Computer Science, or Information. technology systems Experience:- Relavant 5 - 7 years of work experience of MS Defender in cyber security /Information security project, with skills including SIEM,SOAR, Endpoint Detection work experience with security posture. Assessment. Interested candidate can share our updated cv in mgs.rec@mizuho-cb.com if above details are matching to your current role. Preferred Candidates From Mumbai under 20 Kilometers Mizuho Global Services India Pvt. Ltd. 11th Floor, Q2 Building Aurum Q Park,Gen 4/1, Ttc,Thane Belapur Road ,MIDC Industrial Area, Ghansoli, Navi Mumbai- 400710.

Posted 1 day ago

Apply

4.0 - 7.0 years

12 - 20 Lacs

gurugram

Work from Office

Role & responsibilities Performance Engineering & Troubleshooting o Perform advanced diagnostics for boot/login delays, application slowness, memory/CPU bottlenecks, and storage I/O issues o Utilize tools such as Windows Performance Analyzer (WPA), Windows Performance Recorder (WPR), Sysinternals Suite, PerfMon, ProcMon, and ETW tracing o Define and maintain endpoint performance baselines and implement proactive monitoring strategies o Conduct root cause analysis of recurring endpoint performance issues and recommend long-term solutions Endpoint Imaging & Deployment Automation o Design, maintain, and optimize Windows 11 golden images for large-scale enterprise deployment. o Automate OS and application deployments using Intune (Autopilot) and Azure AD o Develop and maintain PowerShell scripts for image updates, driver integration, and application packaging o Implement zero-touch provisioning and streamline device onboarding processes Intune & Security Policy Management o Configure and manage Intune endpoint policies, compliance rules, and Autopilot deployments o Implement and maintain Windows Defender Application Control (WDAC) policies to enforce application security and compliance without compromising performance o Align endpoint configurations with enterprise security baselines (BitLocker, Microsoft Defender, CIS, and MDM policies) o Collaborate with Security teams to ensure balance between performance, optimization and compliance Digital Employee Experience (DEX) Monitoring o Use DEX tools (e.g., Aternity, Nexthink, or equivalent) to monitor user experience, identify performance gaps, and improve endpoint reliability o Analyze telemetry and feedback to drive continuous improvement in end-user productivity and satisfaction o Integrate DEX insights with automation to create proactive remediation and self-healing solutions Knowledge and Experience requirements Required Qualifications o 4 - 6 years of experience in Windows endpoint engineering, imaging, and performance optimization o Strong expertise in Windows 11 internals (boot process, registry, kernel processes, OS servicing) o Hands-on experience with Microsoft Intune (Autopilot, Endpoint Security, Compliance, Analytics) o Proven experience implementing and managing Windows Defender Application Control (WDAC) o Proficiency in automation and scripting (PowerShell required; Python a plus) o Skilled in using performance diagnostics tools (WPA, WPR, Sysinternals, ProcMon, ETW, PerfMon) o Working knowledge of Active Directory, Group Policy, Azure AD, and hybrid identity models o Familiarity with DEX tools for endpoint experience monitoring Preferred Skills o Experience with application packaging and distribution o Exposure to endpoint CI/CD pipelines (Azure DevOps, GitHub Actions) o Understanding of network performance tuning for endpoints o Knowledge of VDI/AVD environments and Windows 11 performance in virtualized contexts Soft Skills o Strong problem-solving and analytical skills with a structured, detail-oriented approach o Ability to work independently while collaborating across IT, Security, and Operations teams o Excellent documentation and communication skills o Passion for automation, security, and improving end-user experiences

Posted 2 days ago

Apply

8.0 - 12.0 years

0 Lacs

karnataka

On-site

Role Overview: Are you looking for new opportunities, a change, and new challenges Do you enjoy being part of a successful team Join Baker Hughes, a leader in the oilfield services industry, offering opportunities for qualified individuals to grow in a high-performance organization. As a Cyber Security Architect - Endpoint Security, you will play a crucial role in defining strategies and technology roadmaps for endpoint Cyber Security Programs, ensuring high-value outcomes for the business. Partner with the best and be part of a team that values innovation and progress. Key Responsibilities: - Define strategy and technology roadmap for endpoint Cyber Security Programs, delivering high-value outcomes - Identify IT solutions, build a cybersecurity design and assessment framework, lead assessments and evaluations of existing solutions, and remediate cyber security risks - Document secure architecture, design strategies, and roadmaps for Baker Hughes and customer solutions - Identify appropriate endpoint security metrics and drive compliance with internal stakeholders - Manage risks associated with smartphones, mobile applications, IoT devices, and other cellular connected devices - Lead strategic projects with high impact, being a recognized expert in security architecture and design - Evaluate new threats, solutions, and balance needs to implement the best security solutions - Develop a strategy to mitigate risk, reduce attack surface, and provide recommendations for improving asset and application security - Communicate change effectively to internal stakeholders, gaining their support and buy-in Qualifications Required: - Experience in implementing specialized security frameworks, including CIS Benchmarks for a broad range of endpoints - Bachelor's Degree with a minimum of 8 years of professional experience in a Technology field - Understanding of current IT Security frameworks, attack methods, and protective technologies - Fluent in English - Deep understanding of operating systems security configurations for Windows Server/Desktop/IoT/Teams, Mac OS, LINUX, UNIX, iOS, and Android About the Company: Baker Hughes, a leading energy technology company, provides innovative solutions to energy and industrial customers worldwide. With a century of experience and operations in over 120 countries, Baker Hughes is dedicated to advancing energy, making it safer, cleaner, and more efficient for people and the planet. Note: Please ensure to apply to vacancies through official communication channels mentioned on www.bakerhughes.com/careers to avoid any fraudulent activities.,

Posted 2 days ago

Apply

6.0 - 11.0 years

8 - 13 Lacs

chennai

Work from Office

Seeking a highly skilled Endpoint Management Engineer (macOS | Jamf | Microsoft Intune) with 6 years of experience to join our dynamic team. The ideal candidate will have strong scripting skills, a proactive approach to automation and a proven track record of maintaining secure, scalable. The role also includes handling compliant device fleets, in a large enterprise environment. Requirements: At least 6+ years of experience in macOS endpoint engineering and management. Should have 4+ years of experience managing Microsoft Intune in enterprise environments (1,000+ devices). Expert level knowledge of Jamf Pro (policies, scripts, configuration profiles, smart groups, EA). Expertise with Apple Business Manager (ABM), ADE, and macOS security frameworks. Familiarity with macOS internals, MDM protocols and enterprise security compliance. Proficiency in scripting languages such as Bash, Python, AppleScript or Zsh for Jamf; PowerShell for Intune. Sound understanding of endpoint security tools such as CrowdStrike, EDR or Defender for Endpoint. Experience with identity and access management tools such as Active Directory and Microsoft Entra ID. Excellent troubleshooting skills and experience providing Tier 3 support. Should hold certification in Jamf 100/ Jamf 200 or above. #LI-MK2 #LI-Onsite

Posted 2 days ago

Apply

8.0 - 13.0 years

25 - 30 Lacs

mumbai, pune, bengaluru

Work from Office

A leader in the oilfield services industry. Baker Hughes offers opportunities for qualified people who want to grow in our high-performance organization. Our leading technologies and our ability to apply them safely and effectively create value for our customers and shareholders. Partner with the best As a Cyber Security Architect Endpoint Security you will be responsible for : Defining strategy and technology roadmap for endpoint Cyber Security Programs and providing hands-on technical capability to deliver high value outcomes to the business Identifying IT solutions, build a cybersecurity design and assessment framework, leading the assessments and evaluations of existing solutions, and leading the remediation of cyber security risks or vulnerabilities Documenting secure architecture , design strategies and roadmaps fo r Baker Hughes and customer solutions Identifying appropriate endpoint security metrics and working with internal stakeholders to drive compliance Un derstanding and managing risks associated with the use of smartphones, mobile applications , IoT devices and other cellular connected devices Leading strategic projects and initiatives with broad scope and high impact to the business and be a recognized expert in security architecture and design Evaluating new threats, solutions and the impact on IT and Business operations and balancing these needs to develop and implement the best security solutions for the business Creating a strategy to mitigate risk and perpetuate attack surface reduction whilst p erforming periodic assessments, gap analysis, and provide recommendations for improving asset and application security Effectively communicating change to internal stake holder s and business segment leaders to gain their support and buy in Required Qualifications Experience in implementing specialized security frameworks including CIS Benchmarks for a broad range of endpoint s Bachelors Degree. A minimum 8 years of professional experience in a Technology field.. Have an understanding of current IT Security frameworks, attack methods and protective technologies. Fluent in English. A deep understanding of operating systems security configurations and operating systems generally ; Windows Server/Desktop/ IoT/Teams , Mac OS , LINUX, UNIX , iOS and Android Desired Characteristics Experience in implementing specialized security frameworks including CIS Benchmarks for a broad range of endpoint s Be highly experienced in EDR/XDR solutions such as Microsoft Windows Def ender suite, Qualys EVM, Flexara , Applocker or similar A good understanding in the deployment and monitoring of Microsoft ASR rules Experience in m aintaining /managing endpoint compliance including system hardening, host firewall settings, endpoint applications, regulatory requirements, audit issues, endpoint security tools such as Microsoft DLP, AV, EDR, patching etc Demonstrate capability of working with in a high paced environment managing multiple tasks within agreed time scales Experience of enterprise vulnerability management Enterprise asset discovery Excellent interpersonal skills and the ability to work effectively with people in a wide range of levels. Demonstrated exceptional written and verbal communication skills. Great communication, team spirit, and leadership abilities.

Posted 2 days ago

Apply

8.0 - 13.0 years

25 - 30 Lacs

mumbai, pune, bengaluru

Work from Office

A leader in the oilfield services industry. Baker Hughes offers opportunities for qualified people who want to grow in our high-performance organization. Our leading technologies and our ability to apply them safely and effectively create value for our customers and shareholders. Partner with the best As a Cyber Security Architect Endpoint Security you will be responsible for : Defining strategy and technology roadmap for endpoint Cyber Security Programs and providing hands-on technical capability to deliver high value outcomes to the business Identifying IT solutions, build a cybersecurity design and assessment framework, leading the assessments and evaluations of existing solutions, and leading the remediation of cyber security risks or vulnerabilities Documenting secure architecture , design strategies and roadmaps fo r Baker Hughes and customer solutions Identifying appropriate endpoint security metrics and working with internal stakeholders to drive compliance Un derstanding and managing risks associated with the use of smartphones, mobile applications , IoT devices and other cellular connected devices Leading strategic projects and initiatives with broad scope and high impact to the business and be a recognized expert in security architecture and design Evaluating new threats, solutions and the impact on IT and Business operations and balancing these needs to develop and implement the best security solutions for the business Creating a strategy to mitigate risk and perpetuate attack surface reduction whilst p erforming periodic assessments, gap analysis, and provide recommendations for improving asset and application security Effectively communicating change to internal stake holder s and business segment leaders to gain their support and buy in Required Qualifications Experience in implementing specialized security frameworks including CIS Benchmarks for a broad range of endpoint s Bachelors Degree. A minimum 8 years of professional experience in a Technology field.. Have an understanding of current IT Security frameworks, attack methods and protective technologies. Fluent in English and Spanish. A deep understanding of operating systems security configurations and operating systems generally ; Windows Server/Desktop/ IoT/Teams , Mac OS , LINUX, UNIX , iOS and Android Desired Characteristics Experience in implementing specialized security frameworks including CIS Benchmarks for a broad range of endpoint s Be highly experienced in EDR/XDR solutions such as Microsoft Windows Def ender suite, Qualys EVM, Flexara , Applocker or similar A good understanding in the deployment and monitoring of Microsoft ASR rules Experience in m aintaining /managing endpoint compliance including system hardening, host firewall settings, endpoint applications, regulatory requirements, audit issues, endpoint security tools such as Microsoft DLP, AV, EDR, patching etc Demonstrate capability of working with in a high paced environment managing multiple tasks within agreed time scales Experience of enterprise vulnerability management Enterprise asset discovery Excellent interpersonal skills and the ability to work effectively with people in a wide range of levels. Demonstrated exceptional written and verbal communication skills. Great communication, team spirit, and leadership abilities.

Posted 2 days ago

Apply

10.0 - 15.0 years

35 - 40 Lacs

hyderabad

Work from Office

About the Role: Our team is seeking an experienced technologist to join our Cybersecurity team. The ideal candidate must have a strong background in Windows and Linux server OS environments, Identify and Access Management MFA configurations, RBAC, vulnerability management, SSH keys and firewall policy management. Experience with REST APIs is required while experience with public cloud platforms, and Cybersecurity experience is highly recommended. The role involves implementing the selected endpoint security solution based on specified requirements and following internal processes. It also requires excellent troubleshooting skills . The job will include growing the co-Admin role and handling platform management activities. The candidate must have excellent analytical and problem-solving skills , be self-motivated, have strong communication and documentation skills, and a background in computer science, data science, or engineering with Cybersecurity familiarity. Roles Responsibilities: The Individual in this role will Work with different Business unit teams to deploy the Endpoint security solution into target operating environments. Configure policy management, reporting and assessment requirements into production. Work with SIEM / Security Monitoring Platforms, Flexera and ServiceNow teams to integrate functionality and data feeds as required. Working with the project lead based on Work Plan to research compliance scenarios to develop solutions for improvements in data analysis to provide to the business unit teams. Testing and onboarding configurations via team s processes. Grow knowledge of Cybersecurity. Team processes, and Systems. Required Skills: 10+ years of experience in either as an admin or senior operations person for a company utilizing Tanium is highly recommended. Hands-on experience with configuration and deployment of Tanium modules and Tanium agents. Minimum of 5-7 years practical experience in firewall and vulnerability management solutions. Minimum of 5-7 years experience working with SQL and Splunk. Experience in Windows and Linux server OS environments. Some knowledge of MacOS and SunOS might be useful but not as important. Experience with REST APIs is required Experience with public cloud platforms, and Cybersecurity experience is highly recommended. The role involves implementing solutions based on specified requirements and following internal processes. It also requires configuring or modifying rules and processes on the endpoint management platform . The job will include growing the testing role and handling end to end testing. The candidate must have excellent analytical and problem-solving skills , be self-motivated and work independently Sense of urgency and attention to detail. Should be flexible to work on weekends. Should be flexible to provide coverage in US morning hours. Desired Skills: Excellent communication skills including metrics/performance documentation/presentation, technical drawing/architecture origination and modification Operates well under pressure and urgent circumstances Self-reliant and diligent in follow-through for assigned tasks Ability to work with a geographically disperse team Engaged collaborator, contributor and team player CISSP, CISM, SANS GIAC or relevant cybersecurity Experience working in an environment where coordination with multiple teams is essential to success Ability to prioritize individual/group work in a high-stress and time-bound environment Bachelor s / Masters degree in Information Systems, Engineering, Mathematics. Computer Science or Cyber Security or equivalent experience.

Posted 2 days ago

Apply

15.0 - 20.0 years

50 - 100 Lacs

hyderabad

Work from Office

About the Job: The functional leader in this role will be responsible for leading and managing a team of highly experienced endpoint and infrastructure security professionals in ATT India. The leader in this role oversees, manages and supports day-to-day operations, including various projects, tasks and initiatives. Continuously collaborates with US and India Cyber Security leadership teams and other stakeholders on engineering and operational matters. In this role, you will functionally lead and manage highly experienced security teams that will operate in follow-the-sun model working with CSO and different Business unit teams in US and India to engineer and operationalize the endpoint security and infrastructure security solutions into target operating environments. Roles Responsibilities include: Functionally lead and manage a highly experienced and specialized Cybersecurity professionals in ATT India Oversees, manages and supports day-to-day operations, including various projects, tasks and initiatives Continuously collaborates with US and India Cyber Security leadership teams and other stakeholders on engineering and operational matters in endpoint and infrastructure security areas. Supports innovation, strategic planning, technical proof of concepts, testing, lab work, and various other technical program management related tasks associated with the designated functional areas. The individual in this role interviews and selects employees, maintains proper staffing levels, allocates resources, supervises teams daily operations, productivity, identifies areas for improvement, develops action plans to improve performance, develops teams technical and managerial expertise through on-the-job and formal training opportunities, enforces Company policies, takes necessary disciplinary action, evaluates individual performance for annual performance review, merit increases, promotions and other employment status changes, and conducts long-range planning for the team. Experience Level: 15+ years. Location: Hyderabad / Bengaluru Primary / Mandatory Skills: Overall 15+ years of Cybersecurity engineering and operations experience focused on Endpoint and Infrastructure security. At least 8 -10 years of practical hands-on and proven track record working with: Endpoint Security technologies such as Tanium, SentinelOne Infrastructure Security technologies such as: ProofPoint, Exchange (Email Security) Guardicore (Network and Infrastructure security) 5+ years of technical team management experience Information security credentials CISSP, CCNP Security, SANS GIAC certifications, or equivalent Security product / technology credentials such as Guardicore Certified Specialist, SentinelOne Certified Administrator/Engineer Deep understanding of Cyber Security frameworks, methodologies, and industry best practices Collaborate with other security teams to improve overall security practices and incident response capabilities. Collaborate with leadership teams, provide subject matter expertise and insights. Support, guide and mentor team members in technical and functional matters Track record of staying current with trends, techniques, tools, and processes that drive improvement of Cyber Security posture Ability to asses and articulate risks from a business standpoint. Operate in a fast-paced, dynamic, and geographically matrixed teams. Flexible to provide coverage in US morning hours Sense of urgency and attention to detail. Should be flexible to work on weekends. Should be flexible to provide coverage in US morning hours. Demonstrate Analytical Thinking Proven ability to manage Processes and projects Team-oriented thinking with demonstrated ability to produce high-quality work Bachelors / Masters in Cyber Security and / or Computer Science Additional information (if any): Should be flexible to work on weekends. Should be flexible to provide coverage in US morning hours. Information security credentials CISSP, CCNP Security, SANS GIAC certifications, or equivalent Security product / technology credentials such as Guardicore Certified Specialist, SentinelOne Certified Administrator/Engineer

Posted 2 days ago

Apply

0.0 - 2.0 years

1 - 4 Lacs

jaipur

Work from Office

JPR Systems is looking for Telecaller - 1 to join our dynamic team and embark on a rewarding career journey A telecaller is a customer service representative who contacts customers over the telephone A typical job description for a telecaller includes the following responsibilities: Make outbound calls to customers to promote products and services, or follow up on recent purchases Respond to customer inquiries and provide information about products and services Resolve customer complaints and provide appropriate solutions Keep records of all customer interactions and transactions, updating customer information in a database as necessary Meet and exceed sales and customer satisfaction targets Continuously improve product and service knowledge to provide accurate information to customers Stay up-to-date with industry developments and maintain a working knowledge of competitor offerings Follow all company policies and procedures, including those related to confidentiality and data security Participate in training and development opportunities to improve skills and knowledge 0 Adhere to schedules and work efficiently under pressure to meet deadlines Disclaimer: This job description has been sourced from a public domain and may have been modified by Naukri.com to improve clarity for our users. We encourage job seekers to verify all details directly with the employer via their official channels before applying.

Posted 2 days ago

Apply

5.0 - 10.0 years

5 - 9 Lacs

pune

Work from Office

We are looking for a seasoned AWS Network Security Engineer to lead the deployment and management of a Cisco Identity Services Engine (ISE) environment within our AWS infrastructure. This role demands deep expertise in cloud-based network security, ISE architecture, and secure integration practices. Key Responsibilities: Architect and deploy Cisco ISE within AWS cloud environments. Design secure VPC architectures and configure routing, subnets, and security controls. Implement and manage AWS security services (e.g., IAM, Security Groups, NACLs, GuardDuty, etc.). Integrate ISE with AWS services and on-prem systems for identity and access control. Conduct vulnerability assessments and ensure compliance with security standards. Automate deployment and configuration using tools like Terraform, Ansible, or CloudFormation. Monitor network traffic and logs to detect and respond to security incidents. Maintain detailed documentation of network configurations, security policies, and operational procedures. Collaborate with infrastructure, application, and security teams to ensure seamless integration. Required Qualifications: Bachelor s degree in Computer Science, IT, or related field. 5+ years of experience in network security engineering, preferably in cloud environments. Hands-on experience with AWS networking (VPC, Transit Gateway, VPN, Direct Connect). Proven experience deploying and managing Cisco ISE. Strong understanding of TCP/IP, DNS, DHCP, RADIUS, TACACS+, and other network protocols. Experience with firewall configurations, VPNs, and endpoint security. Familiarity with automation and Infrastructure-as-Code (IaC) tools. Preferred Certifications: AWS Certified Security Specialty Cisco Certified Network Professional (CCNP) Security Certified Information Systems Security Professional (CISSP)

Posted 2 days ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

pune

Work from Office

We are looking for a seasoned Network Security Engineer to lead the deployment and management of a Cisco Identity Services Engine (ISE) environment within our AWS infrastructure. This role demands deep expertise in cloud-based network security, ISE architecture, and secure integration practices. Key Responsibilities: Architect and deploy Cisco ISE within AWS cloud environments. Design secure VPC architectures and configure routing, subnets, and security controls. Implement and manage AWS security services (e.g., IAM, Security Groups, NACLs, GuardDuty, etc.). Integrate ISE with AWS services and on-prem systems for identity and access control. Conduct vulnerability assessments and ensure compliance with security standards. Automate deployment and configuration using tools like Terraform, Ansible, or CloudFormation. Monitor network traffic and logs to detect and respond to security incidents. Maintain detailed documentation of network configurations, security policies, and operational procedures. Collaborate with infrastructure, application, and security teams to ensure seamless integration. Required Qualifications: Bachelor s degree in Computer Science, IT, or related field. 5+ years of experience in network security engineering, preferably in cloud environments. Hands-on experience with AWS networking (VPC, Transit Gateway, VPN, Direct Connect). Proven experience deploying and managing Cisco ISE. Strong understanding of TCP/IP, DNS, DHCP, RADIUS, TACACS+, and other network protocols. Experience with firewall configurations, VPNs, and endpoint security. Familiarity with automation and Infrastructure-as-Code (IaC) tools. Preferred Certifications: AWS Certified Security Specialty Cisco Certified Network Professional (CCNP) Security Certified Information Systems Security Professional (CISSP)

Posted 2 days ago

Apply

2.0 - 7.0 years

13 - 17 Lacs

pune

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Operational Technology (OT) Security Good to have skills : Endpoint Protection Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Senior IT/ OT Endpoint Security consultant, you will focus to lead the design, implementation, and management of endpoint security controls across enterprise /OT environments, will play a crucial role in protecting critical assets such as Server, Workstations, and ICS equipment. Roles and Responsibilities:-Lead the deployment, management, and optimization of endpoint security tools. (e.g., CrowdStrike, Sentinel One, Microsoft Defender for Endpoint, Trellix, Carbon Black, Symantec Endpoint Protection)-End to end platform management activities such as upgradation of servers and clients, signature updates and compliance, groups management, Access management etc. -Monitor, detect, and respond to endpoint-related security incidents and vulnerabilities.-Using MITRE ATT4CK framework improve threat hunting.-Integrate EDR telemetry with SIEM/SOAR platforms and tune detection rules, policies, and behavioral indicators.-Perform real-time threat hunting and investigation using EDR consoles, log data, and forensic artifacts.-Implement host-based control policies, and privilege management solutions.-Monitor and analyze endpoint alerts, triage suspicious activity, and escalate incidents based on impact and severity.Professional and Technical Skills: - Over 8 years of experience in deploying or managing large-scale endpoint security, with at least 2+ years in OT/ICS environment. -Experience in multi-vendor Endpoint Protection tools - CrowdStrike, Microsoft Defender for Endpoint, Carbon Black etc.- Certifications on the vendor products will be added advantage -Experience with endpoint security scripting and automation using Python, PowerShell or API.-Familiarity with OT security and industrial protocols and vendor protocols (Modbus, DNP3, OPC, etc.) is added advantage.-Working experience with Patch and Vulnerability Management of end point device with coordination with IT team. Additional Information:- The candidate should have minimum 2 years of experience in Operational Technology (OT) Security.- This position is based at our Bengaluru office.- A 15-year full time education is required. Qualification 15 years full time education

Posted 2 days ago

Apply

1.0 - 6.0 years

13 - 17 Lacs

bengaluru

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Operational Technology (OT) Security Good to have skills : Network Security Implementation Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Senior IT/ OT Endpoint Security consultant, you will focus to lead the design, implementation, and management of endpoint security controls across enterprise /OT environments, will play a crucial role in protecting critical assets such as Server, Workstations, and ICS equipment. Roles and Responsibilities:-Lead the deployment, management, and optimization of endpoint security tools. (e.g., CrowdStrike, Sentinel One, Microsoft Defender for Endpoint, Trellix, Carbon Black, Symantec Endpoint Protection)-End to end platform management activities such as upgradation of servers and clients, signature updates and compliance, groups management, Access management etc. -Monitor, detect, and respond to endpoint-related security incidents and vulnerabilities.-Using MITRE ATT4CK framework improve threat hunting.-Integrate EDR telemetry with SIEM/SOAR platforms and tune detection rules, policies, and behavioral indicators.-Perform real-time threat hunting and investigation using EDR consoles, log data, and forensic artifacts.-Implement host-based control policies, and privilege management solutions.-Monitor and analyze endpoint alerts, triage suspicious activity, and escalate incidents based on impact and severity.Professional and Technical Skills: - Over 5 years of experience in deploying or managing large-scale endpoint security, with at least 1+ years in OT/ICS environment. -Experience in multi-vendor Endpoint Protection tools - CrowdStrike, Microsoft Defender for Endpoint, Carbon Black etc.- Certifications on the vendor products will be added advantage -Experience with endpoint security scripting and automation using Python, PowerShell or API.-Familiarity with OT security and industrial protocols and vendor protocols (Modbus, DNP3, OPC, etc.) is added advantage.-Working experience with Patch and Vulnerability Management of end point device with coordination with IT team. Additional Information:- The candidate should have 1 minimum years of experience in Operational Technology (OT) Security.- This position is based at our Bengaluru office.- A 15-year full time education is required. Qualification 15 years full time education

Posted 2 days ago

Apply

2.0 - 7.0 years

13 - 17 Lacs

bengaluru

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Operational Technology (OT) Security Good to have skills : Endpoint Protection Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Senior IT/ OT Endpoint Security consultant, you will focus to lead the design, implementation, and management of endpoint security controls across enterprise /OT environments, will play a crucial role in protecting critical assets such as Server, Workstations, and ICS equipment. Roles and Responsibilities:-Lead the deployment, management, and optimization of endpoint security tools. (e.g., CrowdStrike, Sentinel One, Microsoft Defender for Endpoint, Trellix, Carbon Black, Symantec Endpoint Protection)-End to end platform management activities such as upgradation of servers and clients, signature updates and compliance, groups management, Access management etc. -Monitor, detect, and respond to endpoint-related security incidents and vulnerabilities.-Using MITRE ATT4CK framework improve threat hunting.-Integrate EDR telemetry with SIEM/SOAR platforms and tune detection rules, policies, and behavioral indicators.-Perform real-time threat hunting and investigation using EDR consoles, log data, and forensic artifacts.-Implement host-based control policies, and privilege management solutions.-Monitor and analyze endpoint alerts, triage suspicious activity, and escalate incidents based on impact and severity.Professional and Technical Skills: - Over 8 years of experience in deploying or managing large-scale endpoint security, with at least 2+ years in OT/ICS environment. -Experience in multi-vendor Endpoint Protection tools - CrowdStrike, Microsoft Defender for Endpoint, Carbon Black etc.- Certifications on the vendor products will be added advantage -Experience with endpoint security scripting and automation using Python, PowerShell or API.-Familiarity with OT security and industrial protocols and vendor protocols (Modbus, DNP3, OPC, etc.) is added advantage.-Working experience with Patch and Vulnerability Management of end point device with coordination with IT team. Additional Information:- The candidate should have minimum years of experience in Operational Technology (OT) Security.- This position is based at our Bengaluru office.- A 15-year full time education is required. Qualification 15 years full time education

Posted 2 days ago

Apply

2.0 - 5.0 years

3 - 6 Lacs

lucknow

Work from Office

Responsibilities: 1) Monitoring Security Alerts: Continuous monitoring using SIEM tools to identify alerts and anomalies 2) Incident Response: 3) Threat Analysis: 4) Log Analysis: 5) Vulnerability Management: 6) Reporting: Health insurance

Posted 2 days ago

Apply

4.0 - 7.0 years

8 - 12 Lacs

hyderabad

Work from Office

Responsibilities Manage and monitor IT systems and infrastructure to ensure optimal performance and availability, Install, configure, test, and maintain operating systems, software, and system tools, Provide technical support for desktops, network connectivity, and peripheral devices (printers, VOIP), Set up and operate AV equipment for meetings, presentations, and corporate events, Ensure functionality of AV systems including projectors, microphones, speakers, and video conferencing tools, Support virtual and hybrid meetings with high-quality audio/video transmission, Troubleshoot AV and IT issues in real-time and respond to service tickets promptly, Perform routine maintenance and inspections of AV and IT equipment, Coordinate with vendors for AV repairs, upgrades, and replacements, Collaborate with facilities and event teams to meet AV and IT requirements, Maintain Windows networking and security components (LAN/Wi-Fi, VPN, certificates, antivirus), Manage OS imaging, deployment, and backups, Provide in-house tech support across all levels within defined SLAs, Ensure efficient execution of IT-related projects in collaboration with internal teams, Education / Qualifications Bachelors degree in Audio Engineering, Video Production, Information Technology, or a related field, 35 years of experience in L2 desktop support or IT service desk roles, Strong knowledge of Windows OS, Microsoft 365, endpoint security tools, and networking concepts (LAN/Wi-Fi, VPN, DHCP, DNS), Proficiency in audio/video signal flow, AV formats, and sound reinforcement, Experience with AV equipment including microphones, mixers, amplifiers, projectors, and video switchers, Familiarity with ITIL framework and automation using Microsoft applications, Excellent troubleshooting, communication, and documentation skills, Flexible, self-motivated, and able to work independently or in shifts, About Hexagon Hexagon is the global leader in digital reality solutions, combining sensor, software and autonomous technologies We are putting data to work to boost efficiency, productivity, quality and safety across industrial, manufacturing, infrastructure, public sector, and mobility applications, Our technologies are shaping production and people related ecosystems to become increasingly connected and autonomous ensuring a scalable, sustainable future, Hexagon (Nasdaq Stockholm: HEXA B) has approximately 24,500 employees in 50 countries and net sales of approximately 5 4bn EUR Learn more at?hexagon?and follow us?@HexagonAB, Hexagons R&D Centre in India Hexagons R&D Center in India is the single largest R&D hub for the company globally Over 2,100 talented engineers and developers create innovation from this center that powers Hexagon's products and solutions, It was established with Hexagons acquisition of Intergraph, the first IT MNC in Hyderabad and has now grown to deliver innovations and create solutions for all business lines of Hexagon including Asset Lifecycle Intelligence, Safety Infrastructure & Geospatial, Geosystems, Mining, Manufacturing Intelligence and Autonomous Solutions It also hosts a few dedicated services teams for global implementation of Hexagon's products, Hexagon is undergoing a global reorganization, resulting in the formation of two separate entities: core Hexagon and NewCo (a placeholder for internal communication) This job opening is for the role at core Hexagons R&D Center in India comprising of 450 colleagues With the proposed split, core Hexagon globally will have 17,600 employees with a 4 B?annual revenue and an operating margin of 29%, R&D India MAKES THINGS INTELLIGENT MAKE The ingenuity of creating new solutions, processes, opportunities, by using Hexagon`s Reality Technology, THINGS Hexagon`s sensors, software, and autonomous tech, stitched together by high-value engineering, and applied to various aspects of human endeavour, INTELLIGENT To sense, understand, decide or act, either completely or partially, either through human control or autonomously, Everyone is welcome At Hexagon, we believe that diverse and inclusive teams are critical to the success of our people and our business Everyone is welcome?as an inclusive workplace, we do not discriminate In fact, we embrace differences and are fully committed to creating equal opportunities, an inclusive environment, and fairness for all, Respect is the cornerstone of how we operate, so speak up and be yourself You are valued here, Show more Show less

Posted 2 days ago

Apply

8.0 - 13.0 years

11 - 15 Lacs

noida

Work from Office

Technical Experience : Must have 8+ years of IT experience, 3+ years in managing endpoint tools Nexthink/ 1E Tachyon/ SysTrack Nexthink/ 1E Tachyon/ SysTrack Platform Foundation & Administrator certificates ITIL foundation certifications Project Management tools JIRA, Azure DevOps Experience of working on ITSM - ServiceNow, Remedy Possesses knowledge of Microsoft Applications like MS Visio, MS Excel & MS PowerPoint Roles & Responsibilities : Identification of potential use cases to improve user experience, stability, and performance scores in the designated DEX tool Experience in implementing and driving automation initiatives Create intake processes to gather requirements from stake holders Participate in problem hunting sessions to identify opportunities in the environment Analytical skills to slice and dice the data per use case needs Create success stories for the customer/ leadership Responsible for customer/stakeholder relationship management Provide cross functional support Act as a liaison between vendor and client Key Expertise : Exhibits passion and alignment with our vision, values & operating principles Strong Communication & Presentation skills Vendor Management Stakeholder management Demonstrates the ability to multi-task Exceptional listening abilities and detail oriented Ability to work in heterogeneous environment Demonstrates ability to succeed with the team Educational Qualification : Degree from a reputed educational institution 15 years of education is must

Posted 3 days ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: ForgeRock Identity Manager . Experience: 8-10 Years .

Posted 3 days ago

Apply

5.0 - 9.0 years

0 Lacs

maharashtra

On-site

**Role Overview:** As a Threat Hunter, your primary responsibility will be to monitor, detect, and analyze network, server, and endpoint threats. You will work closely with senior leadership and engineering teams to develop and implement effective detection strategies and solutions. Your role will involve coordinating with threat intelligence teams to gather real-time Indicators of Compromise (IOCs) and conducting intelligence-based threat hunting activities. You will proactively search for IOCs and Advanced Persistent Threat (APT) Tactics, Techniques, and Procedures (TTPs) to enhance the organization's security posture. **Key Responsibilities:** - Monitor and analyze network, server, and endpoint threats - Collaborate with senior leadership and engineering teams to devise detection strategies - Coordinate with threat intelligence teams to obtain real-time IOCs - Conduct intelligence-based threat hunting activities - Proactively search for IOCs and APT TTPs - Utilize industry-wide frameworks like MITRE ATT&CK, STIX, TAXII, and SCAP - Identify attack vectors, threat tactics, and attacker techniques - Provide key information to respond to threats and report on observed threats **Qualifications Required:** - Deep experience with industry-wide frameworks such as MITRE ATT&CK, STIX, TAXII, and SCAP - Strong analytical skills to identify attack vectors, threat tactics, and attacker techniques (Note: No additional details about the company were included in the job description.),

Posted 3 days ago

Apply

8.0 - 12.0 years

0 Lacs

karnataka

On-site

Are you looking to take on new challenges and be part of a successful team at a leading oilfield services industry company like Baker Hughes If so, this opportunity might be for you. Role Overview: As a Cyber Security Architect specializing in Endpoint Security, your role involves defining the strategy and technology roadmap for endpoint Cyber Security Programs. You will provide hands-on technical expertise to deliver valuable outcomes to the business. Your responsibilities also include identifying IT solutions, building a cybersecurity design and assessment framework, leading assessments and evaluations of existing solutions, and remediating cybersecurity risks and vulnerabilities. You will document secure architecture, design strategies, and roadmaps for Baker Hughes and customer solutions. Additionally, you will identify appropriate endpoint security metrics, work with internal stakeholders to drive compliance, and manage risks associated with the use of smartphones, mobile applications, IoT devices, and other cellular connected devices. Leading strategic projects and initiatives with high impact to the business will be part of your role, establishing you as a recognized expert in security architecture and design. You will evaluate new threats and solutions, balancing the needs of IT and Business operations to implement the best security solutions. Furthermore, you will create a strategy to mitigate risks and reduce the attack surface while conducting periodic assessments, gap analysis, and providing recommendations for improving asset and application security. Effective communication of change to internal stakeholders and business segment leaders is crucial to gain their support and buy-in. Key Responsibilities: - Define strategy and technology roadmap for endpoint Cyber Security Programs - Identify IT solutions and lead cybersecurity design and assessment framework - Document secure architecture, design strategies, and roadmaps - Identify endpoint security metrics and drive compliance - Manage risks associated with smartphones, mobile applications, IoT devices, and other cellular connected devices - Lead strategic projects with high impact and be an expert in security architecture and design - Evaluate new threats, solutions, and their impact on IT and Business operations - Create a strategy to mitigate risks and reduce attack surface - Conduct periodic assessments, gap analysis, and provide recommendations for improving asset and application security - Communicate change effectively to internal stakeholders and business segment leaders Qualifications Required: - Experience in implementing specialized security frameworks including CIS Benchmarks for a broad range of endpoints - Bachelor's Degree with a minimum of 8 years of professional experience in a Technology field - Understanding of current IT Security frameworks, attack methods, and protective technologies - Fluency in English and Spanish - Deep understanding of operating systems security configurations including Windows Server/Desktop/IoT/Teams, Mac OS, LINUX, UNIX, iOS, and Android Additional Company Details: Baker Hughes is an energy technology company that provides solutions to energy and industrial customers worldwide. With over a century of experience and operations in over 120 countries, the company's innovative technologies and services are driving energy forward towards a safer, cleaner, and more efficient future. Please ensure to send your resume only in English as per the instructions provided in the job description.,

Posted 3 days ago

Apply

5.0 - 7.0 years

3 - 8 Lacs

thane, navi mumbai, mumbai (all areas)

Work from Office

Position - MS Defender - Endpoint (MDE) Specialist Job location :- Ghansoli Shift:- Rotational shift WALKIN DRIVE:- 12th September 12pm to 5pm 13th September 9am to 12.30pm HR Spoc:- Ruchika HR We are seeking a highly skilled and experienced L3 for handling EDR operations to our dynamic security team. The Ideal candidate will play a key role in advance threat detection, Incident response and responding to critical security incident and enhancing our endpoint security capabilities with EDR tools. Roles & Responsibilities Investigate and analyse sophisticated security alerts and events to determine root cause, scope and impact of security incidents. Provide technical expertise and guidance to junior analysts (L1, L2s), assisting with incident investigations, analysis and resolution. Develop and implement advanced detection and response strategies using Carbon Black EDR to enhance our overall security posture. Lead incident response efforts, including coordination with cross-functional teams and external stakeholders. Conduct in-depth analysis of endpoint data and logs to identify indicators of compromise (IOCs) and advanced attack techniques. Collaborate with threat intelligence teams to stay updated on emerging threats and tactics used by threat actors. Develop and maintain security playbooks, procedures and response plans for incident response and threat hunting. Assist in the tuning and optimization of Carbon Black EDR policies, SIEM rules and custom queries to improve detection efficacy. Stay abreast of industry best practices, emerging technologies and trends in endpoint security and threat detection. Provide regular reports and updates on security incident trends, analysis findings and mitigation efforts to stakeholders. Personal & TECH Skills: Good Team player. Possess Positive and learning attitude. Good Verbal and Written communication skills. Sense of Ownership, Priorities and Autonomous. At least one technical certification required (CEH, CompTIA Security+, CBCA, CSA etc.) Should have at least one cyber security certification (CISM, CCIR, ECSA, GCIH etc) Knowledge of banking business and information technology practices and trends in banking sector. Understanding of technology-related issues and how they might impact business; Ability to communicate effectively, both orally and in writing. Knowledge of banking business and information technology practices and trends in banking sector. Qualifications Graduation/Post graduation in, Computers, Information Systems, Computer Science, or Information. technology systems Experience:- Relavant 5 - 7 years of work experience of MS Defender in cyber security /Information security project, with skills including SIEM,SOAR, Endpoint Detection work experience with security posture. Assessment. Interested candidate can share our updated cv in mgs.rec@mizuho-cb.com or can directly Walkin if above details are matching to your current role. Preferred Candidates From Mumbai under 20 Kilometers Mizuho Global Services India Pvt. Ltd. 11th Floor, Q2 Building Aurum Q Park,Gen 4/1, Ttc,Thane Belapur Road ,MIDC Industrial Area, Ghansoli, Navi Mumbai- 400710.

Posted 3 days ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SailPoint Identity Now. Experience: 8-10 Years.

Posted 3 days ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SailPoint Identity Mgmt and Governance.Experience: 8-10 Years.

Posted 3 days ago

Apply

Exploring Endpoint Security Jobs in India

Endpoint security is a critical area of focus for organizations looking to protect their systems and data from cyber threats. In India, the demand for skilled professionals in endpoint security is on the rise, with many companies actively hiring for these roles.

Top Hiring Locations in India

  1. Bangalore
  2. Mumbai
  3. Delhi
  4. Pune
  5. Hyderabad

Average Salary Range

The average salary range for endpoint security professionals in India varies based on experience and skill level. Entry-level positions may start at around INR 4-6 lakhs per annum, while experienced professionals can earn upwards of INR 15 lakhs per annum.

Career Path

A typical career path in endpoint security may progress from roles such as Junior Security Analyst or Endpoint Security Engineer to Senior Security Consultant or Endpoint Security Architect, and ultimately to positions like Chief Information Security Officer (CISO) or Security Director.

Related Skills

In addition to expertise in endpoint security, professionals in this field are often expected to have knowledge of network security, threat intelligence, incident response, and security compliance.

Interview Questions

  • What is endpoint security and why is it important? (basic)
  • Can you explain the difference between antivirus and endpoint protection? (medium)
  • How do you stay updated on the latest trends and threats in endpoint security? (basic)
  • Describe a recent endpoint security incident you handled and how you resolved it. (medium)
  • What are the key components of an endpoint security solution? (medium)
  • How would you assess the security posture of an organization's endpoints? (advanced)
  • What role does encryption play in endpoint security? (medium)
  • Can you explain the concept of zero trust security in the context of endpoint protection? (advanced)
  • How do you prioritize security patches for endpoints in a large organization? (medium)
  • What are some common challenges in managing endpoint security in a remote work environment? (medium)
  • How would you respond to a ransomware attack targeting endpoints in your organization? (advanced)
  • What tools or technologies have you used to monitor and secure endpoints? (medium)
  • Describe your experience with implementing and managing endpoint detection and response (EDR) solutions. (advanced)
  • How do you approach endpoint security training and awareness programs for employees? (medium)
  • Can you discuss a time when you had to balance security requirements with user productivity in an endpoint security context? (advanced)
  • What are the key considerations for securing IoT devices as part of an endpoint security strategy? (advanced)
  • How do you assess the effectiveness of an endpoint security program? (medium)
  • What are the benefits of integrating endpoint security with a Security Information and Event Management (SIEM) system? (advanced)
  • How do you handle security incidents involving BYOD (Bring Your Own Device) endpoints? (advanced)
  • Discuss your experience with implementing endpoint security policies and controls in a cloud environment. (advanced)
  • How would you approach securing legacy systems and endpoints that cannot be easily updated or patched? (advanced)
  • What are the key differences between traditional antivirus solutions and next-generation endpoint security products? (advanced)
  • Can you explain the concept of endpoint isolation and how it enhances security? (advanced)
  • How do you ensure compliance with data protection regulations in your endpoint security practices? (medium)
  • What are your thoughts on the future of endpoint security and emerging trends in the field? (advanced)

Closing Remark

As you prepare for your endpoint security job search in India, remember to showcase not only your technical skills but also your ability to think critically, problem-solve, and adapt to evolving threats. With the right preparation and a confident attitude, you can position yourself as a strong candidate in this in-demand field. Good luck!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies