Home
Jobs

269 Endpoint Security Jobs - Page 10

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

7.0 - 10.0 years

12 - 16 Lacs

Gurugram

Work from Office

Naukri logo

Job Description : We are seeking a dynamic andresults-driven Channel Sales Manager to join our growing team. The idealcandidate will have a proven track record of building and managing channelpartner relationships, driving revenue growth through partner channels, and achievingsales targets. The ideal candidate will have a strong background in IT/ITESsales, extensive experience in channel partner management, and a proven trackrecord of driving revenue growth. This role requires a strong understanding ofthe cybersecurity market, excellent communication and negotiation skills, andthe ability to work effectively in a fast-paced and dynamic environment. Role & Responsibilities : Channel Partner Identification : Identify and onboard channel partnerswith a proven track record in IT/ITES sales, particularly for similar products(like \u2013 Firewall/End point security products). Evaluate potential partnersbased on their market expertise, customer base, and sales capabilities. Contract Negotiation : Negotiate contractual agreements with new channel partners, ensuringmutually beneficial terms and conditions that align with our businessobjectives. Onboarding and Training : Conduct comprehensive product and sales training sessions for newlyonboarded channel partners to equip them with the necessary knowledge andskills to effectively market and sell our solutions. Relationship Building : Build and maintain strong, long-term relationships with keystakeholders, including management, owners, and founders of channel partnerorganizations. Act as a trusted advisor and liaison between our company and thechannel partners. Sales Support : Collaborate closely with channel partners to support lead generationefforts, facilitate deal closures, and provide timely assistance to addresscustomer inquiries and concerns. Sales Strategy Development : Develop tailored sales strategies and initiatives to empower channelpartners in driving both top-line and bottom-line growth. Utilize marketinsights and trends to identify opportunities for revenue enhancement. Marketing and Promotions : Design and implement targeted marketing campaigns, promotionalactivities, and incentive programs to drive product awareness and demand amongchannel partners and end customers. Sales Metrics Monitoring : Establish key performance indicators (KPIs) and sales metrics tomonitor channel partner performance, track growth, and identify areas forimprovement. Regularly analyze data to measure the effectiveness of salesstrategies and initiatives. Individual Sales Contribution : Actively engage in sales activities,including prospecting, lead generation, and deal closure, to contribute tooverall revenue targets. Lead by example and demonstrate best practices insales execution. \u200b Team Leadership Experience : Demonstrate leadership capabilities by having previously led a team of5 or more salespersons. Provide mentorship, guidance, and support to teammembers to foster their professional development and drive collective Requirements 1.Total 7-10 years of experience in a similar profile. 2.Minimum of 4 years\u2019 experience in B2B Sales, of Industry sectors \u2013 Retail/Education/Hospitality/IT Technology/ IT Services/ IT hardware organization where in managing resellers/ franchisees/ channel partners. 3.Strong negotiation skills and the ability to cultivate strategic partnerships with channel partners. 4.Excellent communication and interpersonal skills, with the ability to build rapport and influence stakeholders at all levels. 5.Demonstrated leadership experience, including managing a team of sales professionals, in the past, for providing guidance and support to drive individual and collective success. 6.Good understanding of cybersecurity products and industry trends, with a passion for technology and innovation. 7.Strategic thinker with the ability to develop and execute sales and marketing strategies to achieve business objectives. 8.Analytical mindset with the ability to leverage data and metrics to drive informed decision-making. 9.Proactive and results-oriented approach, with a focus on delivering exceptional customer experiences and driving revenue growth. 10.A willingness to learn technical details of the product. 11.Experience in B2B SAAS is preferred. 12.Should be process-oriented and disciplined. Benefits Our Benefits Include: Health Insurance, Performance-Based Bonuses (For Specific Roles), Wellness Programs \u2013 Access to mental health support, meditation sessions, and ergonomic workspaces to ensure a healthy and productive work environment, Team Lunches & Celebrations \u2013 Regular team lunches, parties, and win celebrations to foster a collaborative and fun work culture.

Posted 1 month ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

Job Description Overview: As an MECM and Intune Administrator, you will play a critical role in the design and management of these Microsoft-based systems. You will lead the effort to ensure the effective deployment of software, updates, monitoring, and mobile device management across our organization. US Shift Key Responsibilities: 1. MECM Design and Optimization: Lead the design and optimization of MECM infrastructure, including site servers, distribution points, and client settings. Implement advanced software deployment strategies, automation, and ensure efficient patch management. 2. Intune Configuration and MDM Expertise: Good knowledge on Intune policies, Azure policies and AD GPO. Lead the configuration and management of Microsoft Intune for mobile device management (MDM) and endpoint security. Implement and manage complex security policies, device settings, and compliance rules. 3. Software Packaging and Deployment Leadership: Lead the packaging and deployment of software applications, updates, and patches using MECM. Implement advanced software distribution methodologies, package creation, and automation. 4. Operating System Deployment Expertise: Design, create, and maintain advanced task sequences for OS deployments, including in-place upgrades and dynamic provisioning. Optimize and automate OS deployment processes for efficiency. 5. Advanced Troubleshooting and Support: Provide support for MECM and Intune-related issues and incidents. Conduct root cause analysis for complex issues and incidents. 6. Documentation and Reporting: Maintain detailed documentation of configurations, best practices, and optimization procedures for MECM and Intune. Create and present advanced reports on the performance and effectiveness of these systems to management and stakeholders. Qualifications: 5+ years of experience in MECM, SCOM, and Intune administration, optimization, and troubleshooting. In-depth knowledge of Microsoft technologies, including Windows OS, MECM and Intune. Strong analytical, problem-solving, and advanced troubleshooting skills. Excellent communication

Posted 1 month ago

Apply

6.0 - 8.0 years

13 - 18 Lacs

Mumbai, Hyderabad

Work from Office

Naukri logo

Summary Lead Endpoint Security and Management, shall be responsible for ensuring the day-to-day operations and maintenance of the organization's Endpoint security. Strengthen security posture and ensure the control effectiveness of security systems within an organization. Collaborate with diverse teams to ensure the seamless functioning of the Solutions, optimization of the security infrastructure and controls. Role & responsibilities 1. Ensure the day-to-day operations and maintenance of the organization's cyber security infrastructure and controls to protect systems, networks, and data. 2. Configuration, Monitoring & Troubleshooting of Antivirus, EDR, XDR, DLP, APT, Sandboxing, Secure Proxy, Endpoint Security, PIM,HIPS, FIM, Laptop/Desktop Encryption etc. 3.Provide resolution of issues escalated from L1 and L2. Handling Shift Operations across 24x7 4.Prepare HLD & LLD, generate configuration template etc for changes. 5. Ensure coverage and effectiveness of Security Solution, Report and Review incidents. 6. Ensure optimum security, availability, performance, and capacity of security solutions under management 7. Ensure & maintain up-to-date documentation - SOPs, Architecture digrams etc. to remove dependency on people 8. Manage configuration changes and deployments according to established change management processes, ensuring minimal disruption and adherence to best practices. 9. Ensure hardening, latest stable version and security patches of security devices and solutions 10. Track EOL/EOS and ensre that there no technology obsolescence. 11. Ensure resolution of incidents and outages, coordinating with internal teams and external vendors to restore service within agreed-upon SLAs. 12. Manage escalations and run the smooth operations of security solutions. 13. Ensure relevant processes are followed for change, incident & daily operations 14. Identify & analyse pain areas in existing security operations & implement improvements 15. Manage operational issues which require design/technical inputs. 16. Ensure compliance with regulatory requirements, security policies, and security frameworks such as ISO 27001, NIST, or CIS 17. Publish the relevant dashboards and status updates. 18. Escalate deviations and violations in a timely manner. 19. Remain current with organizations security policies, latest security advisories/threats, industry best-practices and developments in cyber security, and recommend and implement best practices and technologies to mitigate emerging threats. Knowledge 1. Sound experience in managing Endpoint security technologies and operations in a large and complex environment. 2. Should have sound understanding & knowledge of various Operating system, security technologies & techniques like Anti-malware,APT, Sandboxing, Secure Proxy, Endpoint Security, PIM, NAC,HIPS, FIM, Laptop/Desktop Encryption etc. 3. Should have hands on experience on Antivirus, EDR, XDR, DLP and incident response techniques and technologies. 4. Should have knowledge & understanding of Cloud Technologies, IT infrastructure & networking technologies, operations and security principles. 5. Should have sound understanding about Threat Hunting, Mitigation and Response. 6. Strong understanding of Regulatory security guildelines & master directions and security frameworks such as ISO 27001, NIST, or CIS. 7. Should be well versed with ITIL and ITSM practices. Preferred candidate profile 1. Exceptional analytical, conceptual thinking, Troubleshooting and problem-solving skills. 2. Strong leadership, negotiation, and conflict resolution skills. 3. Detail-oriented with a focus on quality and accuracy in project/service deliverables 4. Should have strong written, verbal and presentation skills. 5. Ability to perform under pressure, influence stakeholders and work closely with them to determine acceptable solutions.

Posted 1 month ago

Apply

7.0 - 10.0 years

10 - 15 Lacs

Pune

Work from Office

Naukri logo

Job Description We are seeking a highly skilled and experienced Senior System Engineer to join our dynamic IT team. This role is ideal for a well-rounded professional with strong expertise in managing hybrid infrastructures, covering cloud platforms (Azure & AWS), virtualization, server administration, endpoint security, and backup technologies. The candidate should be capable of independently managing L2/L3-level tasks and contributing to cloud transformation, automation initiatives, and security-focused integrations. Responsibilities Administer and support Office 365, Azure, and SharePoint at L2/L3 levels. Manage and maintain Azure VMs, resource groups, networking, and RBAC. Provide intermediate-level (L2) support and operations for AWS infrastructure including EC2, IAM, S3, and VPC. Perform day-to-day administration and troubleshooting of VMware environments. Manage and configure FortiClient EMS for endpoint protection and policy enforcement. Administer and monitor backup platforms like IBM Spectrum Protect Plus for VMs and Druva for Office 365. Manage Linux server environments (RHEL, SUSE, CentOS, Ubuntu) and Windows Servers. Administer Mimecast email security, archiving, and continuity solutions. Handle On-Prem Active Directory (L3-level) including GPO, DNS, DHCP, user and group management. Collaborate with the security and compliance teams for audits, policy implementation, and security tool integrations. Support basic SIEM-related activities such as log source onboarding and integration with IT infrastructure components. Develop and maintain technical documentation and operational procedures. Microsoft Azure: VM provisioning, cost optimization, Azure AD integration, virtual networking, storage, monitoring, and automation (ARM/Bicep templates or equivalent). Amazon Web Services (AWS): Hands-on experience with EC2, IAM policies, S3, CloudWatch, and basic VPC/networking. Office 365 / Microsoft 365: Tenant management, Exchange Online, Teams, SharePoint, and Intune. Understanding of hybrid infrastructure models and integrating on-premises systems with cloud platforms. Exposure to cloud security best practices, backup strategies, and resource tagging/governance. Work with internal teams to track, assess, and remediate vulnerabilities across systems, applications, and cloud resources. Essential Skills Office 365 and SharePoint (L2-level) administration. Microsoft Azure and AWS (L2-level) operational experience. VMware administration and performance monitoring. FortiClient EMS management and policy deployment. Proficient in Windows and Linux server administration. Mimecast configuration and mail flow troubleshooting. Strong Active Directory management (L3-level). Experience with backup solutions: IBM Spectrum Protect Plus and Druva. Vulnerability management processes and remediation tracking. Basic knowledge of SIEM platforms (e.g., log source integration, onboarding, and verification). Strong problem-solving and documentation skills. Additional Desired Skills Industry certifications (AZ-104, AWS SysOps/Associate, VMware VCP, RHCSA/RHCE, ITIL). Experience with PowerShell or shell scripting for automation. Familiarity with Jira Service Management or other ITSM platforms. Basic knowledge of networking and firewall rules. Exposure to cloud cost management and resource optimization tools. Education Requirements & Experience Bachelor’s degree in computer science, Information Technology, or related field. 7–10 years of experience in systems and cloud administration roles. Strong background in hybrid cloud environments and enterprise IT infrastructure. Excellent communication and stakeholder management skills.

Posted 1 month ago

Apply

3 - 4 years

3 - 4 Lacs

Bengaluru

Work from Office

Naukri logo

locationsBangalore RMZ-ECO WORLDposted onPosted Yesterday time left to applyEnd DateJune 14, 2025 (28 days left to apply) job requisition idR177746 , India Job Family Group: Information Technology (IT) Worker Type: Regular Posting Start Date: May 15, 2025 Business unit: Projects and Technology Experience Level Experienced Professionals About The Role Whats the role As a Cyber Threat Prevention Advisor in the CyberDefence SecOps team, you'll join the Vulnerability team to manage and oversee vulnerability processes, ensuring they are trackable and measurable with robust tool support. Your team will lead the implementation of these processes within ServiceNow Security Operations (SecOps), establishing standard workflows and integrating them with IT service management processes executed by Line of Defence 1 within IRM. This role leverages market-standard tools and practices to streamline the architecture by reducing dependency on Collective. What youll be doing Asset Discovery: Set-up and lead adequate discovery of new Shell IT assets in Shell's legacy IT network, RES & Portfolio companies, Cloud environments and PCD and Retail environments. Ensure visibility in new areas such as Internet of Things and Cloud and investigate possibilities to keep track of IT assets. Automated Vulnerability Scanning: Maintain a portfolio of tools for automated vulnerability scanning with a focus on Business-Critical systems and systems that are available from the public Internet. Set-up regular scanning and make results available for further analytics in IRM investigation platform. Take appropriate action on vulnerabilities where required. Security Posture Reporting: Use the results from asset discovery, vulnerability scanning, penetration testing and attack simulation to provide an overview of vulnerabilities in Shell IT landscapes for different stakeholders including IRM LT and IDSO LT. Create specific reports for Business, Business Critical applications, IDSO service lines, External perimeters etc. Act as a Subject Matter Expert on implications of a vulnerability in an IT system and establishing the priority of applying security patches. Help creating prioritized overviews of Cyber vulnerabilities and putting these in a context of IT services and Business applications. Take mitigating actions coming out of identified threats or vulnerabilities either directly by the team or agree the actions with other parties in Shell. What you bring Bachelors degree in Computer Science, Information Technology, or related field 5-8 years of total experience in IT Security including at least 3-4 years of experience in Vulnerability Assessment Proficient in analysing network traffic using tools such as tcpdump or wireshark Strong experience in using open-source scanning tools such as nmap, nessus, metasploit and/or commercial tools such as Rapid7 or Qualys Knowledge in integrating Vulnerability Management into modern CI/CD Pipelines with 'shift-left' strategy Understanding of Network Security, Cloud Security, Endpoint Security, Application Security Understanding Cyber Threat Landscape and analyzing Threats from various sources. Assess new threats, rate threat per Shell ratings and collaborate with Threat team on new threat criticality Understanding of CVE id / CVSS score and metrics Familiar with application of Cybersecurity Benchmarks, NIST controls, PCI controls Lead security research proposals and Proof Of Concepts for Emerging Technologies and assessing Fit-For-Purpose Tools. Understanding of Cloud Security Posture Management (CSPM) Expertise in operating Application security tools like Rapid7 Appspider, Netsparker Knowledge on CI/CD pipeline able to understand the integration of security tools and guide the developers Understanding of Application security design and providing guidance to developers on secure design. Good understating of SAST/DAST concepts and process Knowledge of Mobile DAST scanning and vulnerabilities and remediation consultation Knowledge of Splunk, SecOps VR, basic querying and creating dashboards Additional Skills (Good to have): PCI-DSS Compliance Scan. SecOps VR Module in ServiceNow. Linux environment experience. Azure/AWS Cloud Console. Wiz.io tool knowledge. Advanced Splunk skills. What we offer You bring your skills and experience to Shell and in return you work with talented, committed people on one of the most important challenges facing our planet. Youll have the opportunity to develop the skills you need to grow in an environment where we value honesty, integrity, and respect for one another. Youll be able to balance your priorities as you become the best version of yourself. Progress as a person as we work on the energy transition together. Continuously grow the transferable skills you need to get ahead. Work at the forefront of technology, trends, and practices. Collaborate with experienced colleagues with unique expertise. Achieve your balance in a values-led culture that encourages you to be the best version of yourself. Benefit from flexible working hours, and the possibility of remote/mobile working. Perform at your best with a competitive starting salary and annual performance related salary increase our pay and benefits packages are considered to be among the best in the world. Take advantage of paid parental leave, including for non-birthing parents. Join an organisation working to become one of the most diverse and inclusive in the world. We strongly encourage applicants of all genders, ages, ethnicities, cultures, abilities, sexual orientation, and life experiences to apply. Grow as you progress through diverse career opportunities in national and international teams. Gain access to a wide range of training and development programmes. We'd like you to know that Shell has a > click here . - Shell in India Shell is a diversified energy company in India with 13,000 employees, and presence in Integrated Gas, Downstream, Power, Renewable and Upstream. Additionally, we have deep capabilities in R&D, digitalisation, and business operations. Our global strategy, Powering Progress, is designed to generate value for our shareholders, customers, and the wider society, and focuses on creating more value with less emissions. The strategy supports our purpose of providing more and cleaner energy solutions, with the aim of profitably transforming Shell into a net-zero emissions energy business by 2050. As India moves towards its target of net-zero emissions by 2070, Shell India aims to play a leading role in securing vital energy for today, while investing in, and helping to build, the energy system of the future through strategic investments in the country. Our Lubricants business serves over 50,000 consumers through a strong network of over 200 distributors, and operates an end-to-end value chain that spans conceptualization, development, and production at a world-class blending plant at Taloja. Through our 350-plus retail stations, we offer an integrated mobility experience including fuels, cafes, and convenience stores, with a prominent network of EV recharging facilities. Shell owns and operates a LNG re-gasification terminal at Hazira, Surat, with a capacity of 5 MTPA and a LNG truck-loading unit that plays a crucial role in helping meet Indias growing demand for gas across sectors. In 2022, Shell acquired Sprng Energy in a $1.55 billion deal to build an integrated energy transition business in the country. Sprng is a leading renewable energy company in India which develops and manages solar, wind, and hybrid power generation facilities and infrastructure. Our three capability centres across Bangalore and Chennai serve as a technology and innovation powerhouse for Shell globally, working as a delivery engine for core technical, digital, and finance processespioneering digital innovation and cutting-edge technologies across the energy sector. We also have strong academic partnerships and collaborations with leading universities and technology institutes to accelerate decarbonization efforts within the energy sector. We are committed to positively contributing to the communities in which we operate through programmes on STEM Education, Skilling, and Livelihood across India. We nurture and invest in startups developing initiatives focused on accelerating energy innovation through programs such as Shell E4 and Shell Eco-marathon. We also have strategic investments in new energy companies such as Husk Power, d.light, Orb Energy, and Cleantech Solar. DISCLAIMER: Please noteWe occasionally amend or withdraw Shell jobs and reserve the right to do so at any time, including prior to the advertised closing date. Before applying, you are advised to read our data protection policy. This policy describes the processing that may be associated with your personal data and informs you that your personal data may be transferred to Shell/Shell Group companies around the world. The Shell Group and its approved recruitment consultants will never ask you for a fee to process or consider your application for a career with Shell. Anyone who demands such a fee is not an authorised Shell representative and you are strongly advised to refuse any such demand. Shell is an Equal Opportunity Employer.

Posted 1 month ago

Apply

6 - 10 years

12 - 17 Lacs

Gurugram

Work from Office

Naukri logo

Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

6 - 10 years

12 - 17 Lacs

Pune

Work from Office

Naukri logo

Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

3 - 8 years

5 - 10 Lacs

Gurugram

Work from Office

Naukri logo

Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Endpoint Protection Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Job Summary :We are seeking a skilled Beyond Trust Endpoint Privilege Management (EPM) Specialist to join our IT security team. The ideal candidate will be responsible for implementing, managing, and optimizing Beyond Trust EPM solutions on Windows 10 and Windows 11 environments. This role focuses on enhancing security by managing and controlling administrative privileges on endpoints, reducing attack surfaces, and ensuring compliance with security policies.Key Responsibilities: Implementation and Configuration:oDeploy and configure Beyond Trust EPM solutions on Windows 10 and Windows 11 systems.oCustomize EPM policies to meet organizational security requirements and best practices.oIntegrate Beyond Trust EPM with existing IT infrastructure and security tools. Privilege Management:oDevelop and enforce policies for least privilege access on endpoints.oMonitor and manage user and application privileges to prevent unauthorized access.oCreate and maintain whitelists and blacklists for applications and processes. Security and Compliance:oEnsure endpoint security compliance with organizational policies and regulatory requirements.oConduct regular audits of privileged access and generate compliance reports.oCollaborate with security and compliance teams to address findings and improve security posture. Monitoring and Reporting:oSet up and maintain monitoring and alerting systems for privileged access activities.oAnalyze and respond to security incidents related to privileged access.oGenerate regular reports on EPM activities, incidents, and compliance status. User Training and Support:oProvide training and support to end-users and IT staff on EPM policies and procedures.oAssist in troubleshooting and resolving issues related to EPM solutions.oDevelop and update documentation and training materials. Continuous Improvement:oStay up to date with the latest security threats, trends, and technologies.oRecommend and implement improvements to EPM policies and configurations.oParticipate in security assessments and risk management activities. Qualifications: Education:oBachelor's degree in information technology, Computer Science, Cybersecurity, or related field. Relevant certifications and experience may be considered in lieu of a degree. Experience:oProven experience in implementing and managing Beyond Trust EPM solutions.oStrong knowledge of Windows 10 and Windows 11 operating systems.oExperience with endpoint security and privilege management. Skills and Competencies:oDeep understanding of least privilege access principles and practices.oProficiency in configuring and managing EPM policies and rules.oFamiliarity with Active Directory, Group Policy, and other endpoint management tools.oExcellent troubleshooting and problem-solving skills.oStrong communication and interpersonal skills.oAbility to work independently and as part of a team. Certifications:oRelevant certifications such as Beyond Trust Certified Engineer (BTCE), Certified Information Qualifications 15 years full time education

Posted 1 month ago

Apply

3 - 6 years

9 - 13 Lacs

Mumbai

Work from Office

Naukri logo

Senior Cyber Security Analyst - IND005A Company Worley Primary Location IND-MM-Mumbai Other Locations IND-KR-Bangalore, IND-AP-Hyderabad, IND-MM-Pune, IND-MM-Navi Mumbai Job Cyber Security Schedule Full-time Employment Type Employee Job Level Experienced Job Posting Apr 21, 2025 Unposting Date May 21, 2025 Reporting Manager Title Manager We deliver the worlds most complex projects Work as part of a collaborative and inclusive team Enjoy a varied & challenging role Building on our past. Ready for the future Worley is a global professional services company of energy, chemicals and resources experts headquartered in Australia. Right now, were bridging two worlds as we accelerate to more sustainable energy sources, while helping our customers provide the energy, chemicals and resources that society needs now. We partner with our customers to deliver projects and create value over the life of their portfolio of assets. We solve complex problems by finding integrated data-centric solutions from the first stages of consulting and engineering to installation and commissioning, to the last stages of decommissioning and remediation. Join us and help drive innovation and sustainability in our projects. The Role As a Senior Cyber Security Analyst with Worley, you will work closely with our existing team to deliver projects for our clients while continuing to develop your skills and experience etc. We are seeking a Senior Cyber Security Analyst -a Subject Matter Expert (SME)- to join our Information Security team. The ideal candidate will be responsible for designing, implementing, monitoring, reacting, and reporting on information security events within the DLP scope. Additionally, the role includes managing security tools and IT systems with a special focus on DLP enablement. DLP Strategy & Policy Design Serve as a Subject Matter Expert (SME)for DLP solutions, technologies, and best practices. Design, implement, and optimize DLP policiesto detect and prevent unauthorized access, sharing, and data exfiltration. Define and maintain DLP governance frameworks, aligning with regulatory requirements Identify sensitive data requiring protection across endpoints, cloud, email, and network. Implementation & Configuration Deploy and configure DLP controlsto monitor, alert, and block potential data leaks. Define and enforce DLP rules for structured & unstructured data, including Personally Identifiable Information (PII), Intellectual Property (IP), and financial data. Integrate DLP solutions with other security tools. Monitoring& Continuous Improvement Monitor and analyzeDLP alerts and incidents, identifying trends and areas for improvement. Ensuring DLP alerts and incidentsget routed to monitoring/response processes in accordance with defined internal procedures Perform regular tuning and updatesto enhance detection accuracy and reduce false positives. Develop automated response actionsto mitigate risks and ensure business continuity. Compliance & Stakeholder Collaboration Ensure compliance with data protection regulations and industry security standards. Collaborate with cross-functional teams to resolve complex technical issues and to align DLP policies with business needs. Provide guidance and training to employees on DLP policies, security best practices, and insider threat awareness. Reporting & Documentation: Define and generate DLP metric supporting the reporting needs across the organization Document DLP configurations, policies, and operational procedures. Provide technical recommendationsto enhance data security strategies. About You To be considered for this role it is envisaged you will possess the following attributes: Ability to balance security measures with business needs A proactive approach to identifying and mitigating data loss risks before they become security incidents Proven experience with DLP solutions (e.g., Microsoft Purview, Symantec, Forcepoint, McAfee/Trellix, Digital Guardian, Zscaler). Strong knowledge of DLP policies, rules, content inspection techniques, and data classification models. Experience working with cloud-based DLP (e.g., CASB, SaaS security, O365 DLP, Google Workspace DLP) Understanding of network security, endpoint security, and encryption techniques. Familiarity with SIEM, SOC workflows, and incident response processes. Moving forward together We want our people to be energized and empowered to drive sustainable impact. So, our focus is on a values-inspired culture that unlocks brilliance through belonging, connection and innovation. Were building a diverse, inclusive and respectful workplace. Creating a space where everyone feels they belong, can be themselves, and are heard. And we're not just talking about it; we're doing it. We're reskilling our people, leveraging transferable skills, and supporting the transition of our workforce to become experts in today's low carbon energy infrastructure and technology. Whatever your ambition, theres a path for you here. And theres no barrier to your potential career success. Join us to broaden your horizons, explore diverse opportunities, and be part of delivering sustainable change. Worley takes personal data protection seriously and respects EU and local data protection laws. You can read our full Recruitment Privacy Notice Please noteIf you are being represented by a recruitment agency you will not be considered, to be considered you will need to apply directly to Worley.

Posted 1 month ago

Apply

8 - 10 years

12 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Microsoft Threat Protection. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

8 - 12 years

13 - 18 Lacs

Bengaluru

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to design the organisation??s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP??s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client??s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Security Information Event Management. Experience>10 YEARS. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

8 - 12 years

12 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

8 - 12 years

12 - 17 Lacs

Pune

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

8 - 10 years

12 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: PKI - Certificate Management. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

8 - 10 years

12 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Symantec DLP. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

8 - 12 years

13 - 18 Lacs

Mumbai

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to design the organisation??s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP??s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client??s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Cloud Security Posture Management. Experience>10 YEARS. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

8 - 10 years

12 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: SailPoint Identity Now. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

8 - 10 years

12 - 17 Lacs

Hyderabad

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Cloud Security Posture Management. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

3 - 8 years

11 - 13 Lacs

Pune

Work from Office

Naukri logo

Knowledge of operating systems, system administration, and application security. Proficiency in security tools and technologies Experience with incident response methodologies. Strong knowledge of IT security protocols, data privacy standards Required Candidate profile Certified Information Systems Security Professional (CISSP) Vulnerability Scanner/Nessus, CrowdStrike, Cisco Meraki, Forcepoint One. Experience with cloud security and network security.

Posted 1 month ago

Apply

5 - 10 years

4 - 9 Lacs

Nagpur

Work from Office

Naukri logo

Job Title: Lead Engineer Email Gateway Experience: 5 to 6 Years Location: Nagpur Education: Bachelor of Engineering (BE) Bachelor of Technology (BTech) Master of Technology (M.Tech) Industry Type: IT Services & Consulting / Cybersecurity Employment Type: Full Time, Permanent Role Category: IT Infrastructure Services / Security Job Description: We are hiring a Lead Engineer Email Gateway to manage and secure enterprise email infrastructure. The role involves hands-on operational support, enhancement of email security measures, and collaboration with vendors to ensure robust and secure email services. Key Responsibilities: Act as the primary contact for operational ticket resolution for email security issues Manage and maintain Trend Micro Email Gateway (DDEI and IMSVA) Daily monitoring of mail services, patch management, and server performance Perform email threat analysis : phishing, spoofing, spam, malware Conduct patching, upgrades, and implementation of email gateways Monitor SPF, DKIM, DMARC configurations for email authentication Troubleshoot mail delivery issues and prepare Root Cause Analysis (RCA) Ensure proper documentation and support during audits Work with vendors to resolve escalations and system improvements Basic networking and DNS records knowledge is a must Required Skills: Strong knowledge of email authentication protocols : SPF, DKIM, DMARC Experience in patching, upgrading, and implementing secure email gateways Knowledge of spam, phishing, and spoofing mitigation Hands-on experience with Trend Micro Email Security Solutions Familiarity with DNS records , networking basics RCA preparation and ticket management Desired Candidate Profile: 5+ years of experience in email infrastructure or email security roles Strong communication and troubleshooting skills Team player with ability to handle pressure and time-sensitive tasks Experience working in enterprise environments and with vendor support Interested cadidates fill the details below and share on Anurag.Yadav@softenger.com Updated Resume : Total Experience : Relevant Experience : Current CTC : Expected CTC : Notice Period : Are you willing to relocate to Nagpur location:

Posted 1 month ago

Apply

3 - 8 years

19 - 22 Lacs

Bengaluru

Work from Office

Naukri logo

Job location - Mumbai Kalwa OR Pune A Snapshot of Your Day As an OT Senior Engineer (f-m-d) you will develop features for highly complex systems in the energy sector industry and the system according to requirement specifications. How You'll Make an Impact Develop features for highly complex systems in the energy sector industry. Develop system according to requirement specifications. Assume responsibility for the development from the initial idea to documentation, testing until site implementation. Continuous improvement and optimization of the product performance Maintaining and continuous improvement of internal software and tools Summarize and present development results to stakeholders. Self-dependent design and development of IT/OT solutions Planning, design, configuration, administration, and support of high available IT/OT infrastructures with corresponding databases and backup systems Act as an Expert as inside of an international team for projects. Write, execute, and document manual test cases, detailed test reports and describe potential improvements / required modifications. You work in an international development team. We don"™t need superheroes, just super minds . Deep knowledge in Microsoft Windows Server OS (Active Directory, DNS, GPO, Certification Authority, WSUS, MS Defender, Remote Desk Services) Deep knowledge in network architecture (SCALANCE switches portfolio, another vendors portfolio is an advantage) Deep knowledge in firewalling (Windows internal firewall, Fortigate, PaloAlto) Experience with tools such as Powershell. Experience in working using agile methodology. Experience in cyber security architecture and design according OT requirements (e.g, ISO27001, ISA99, IEC62443). Experience in architecture, designing concepts and development of OT solutions (specially for critical infrastructures) Knowledge in VMWare Virtualization is an advantage. Knowledge in Veeam Backup is an advantage. Basic knowledge in PCS 7 is an advantage. Basic knowledge in industrial communication protocolsModbus, OPC, serial communication (e.g., RS4857 is an advantage) Readiness for occasional worldwide traveling (e.g., Engineering, Consulting, Commissioning) University degree in Engineering or Information Technology related or similar education, preferably with a focus on information management solutions. Expert communication skills in English.

Posted 1 month ago

Apply

5 - 6 years

11 - 15 Lacs

Thane

Work from Office

Naukri logo

OT Cybersecurity Engineer for Digital Industries Customer Services, India About Siemens Accelerating transformation for industries For us, it all starts and ends with our customers. Maximizing value for them is what drives us! Combining the real world of automation with the digital world of information technology opens up completely new possibilities for our customers in all industries, empowering them to make better decisions and enable them to accelerate their transformation to become a Digital Enterprise. With our unique portfolio, we can make a decisive contribution to sustainable industrial innovation transforming the everyday and creating a better tomorrow for societies and people around the world. Cybersecurity for Industry We give Cybersecurity for Industry the highest priority in successful digitalization, so we place it at the center of our development of innovative products, solutions, and services. We rely on the multilayer Defense in Depth concept strengthened by Zero Trust principles. This ensures reliable and always up-to-date protection on all levels, thanks to three pillars plant security, network security, and system integrity including Industrial Cybersecurity Services. At Digital Industries we create and implement digital manufacturing concepts for our vertical customer based on the Digital Enterprise software suite, TIA, MindSphere, Industrial Edge and Industrial cybersecurity offerings from Digital Industries. Are you passionate about safeguarding critical infrastructure and ensuring the security of industrial control systems? Join our team as a Cybersecurity Engineer and play a pivotal role in protecting our ICS and SIS systems, networks, and information. About The Role Key Responsibilities: Security MeasuresEngineer, implement, and monitor robust security measures to protect ICS and SIS systems, related networks, and sensitive information. System Security RequirementsIdentify and define system security requirements to ensure comprehensive protection. Security ArchitectureDesign and develop detailed cybersecurity architectures and designs, adhering to industry-standard blueprints and best practices. Implementing Backup Solutions and ManagementImplement and manage system backup technologies like Acronis, Veritas, Veeam and other providers, overseeing installation and deployment. Threat Detection and Vulnerability monitoringImplement solution like Claroty or Nozomi at ICS for the customers. Installing remediation to risk score for the customer. Endpoint SecurityDeploy and manage endpoint security and application control solutions from providers like McAfee, as well as SIEM solutions such as McAfee, Splunk, and Q-radar etc. Network SecurityImplement and manage network-based firewalls (e.g., Siemens, Fortinet, Palo Alto, CISCO), network troubleshooting, and intrusion detection products. Network ManagementInstall and manage network management solutions like SiNEC NMS, SolarWinds, WhatsUp Gold etc. Firmware UpdatesConduct firmware updates for various automation control systems, switches, and firewalls. Domain Controller ConfigurationConfigure and deploy domain controller settings and policies to defined computer groups as per approved list for ICS. Host-Based SecurityImplement host-based security technologies, including antivirus, data leakage prevention, host IPS, whitelisting, and anomaly detection. Installation and TestingPerform installation, configuration, and testing activities at both factory and customer sites, with experience in Factory Acceptance Testing (FAT) and Site Acceptance Testing (SAT). DocumentationPrepare comprehensive system documentation, including functional design specifications, backup systems documentation, firewall configurations, network diagrams, system architectures, asset inventory, FAT and SAT procedures, and operation & maintenance manuals. Experience 5 to 6 years of experience in working for OT Security systems design, implementation and consulting with at least some experience in industrial automation systems design. Proven experience in cybersecurity, particularly in ICS. Strong understanding of cybersecurity principles and best practices. Proficiency in managing backup technologies, endpoint security, SIEM solutions, and network-based firewalls. Hands-on experience with network management solutions and firmware updates. Ability to configure domain controllers and implement host-based security technologies. Excellent documentation skills and experience with FAT and SAT procedures. Education o Bachelor"™s degree in engineering (Electrical Engineering, Computer Engineering, or related field). A degree in Cybersecurity is preferred. o Valid certification in OT security (e.g., CISSP, GICSP, OSCP) would be additional advantage. Business Travel You will be in the delivery and implementation team and hence should be willing to travel and experience various manufacturing sites across India

Posted 1 month ago

Apply

6 - 8 years

7 - 8 Lacs

Hyderabad

Work from Office

Naukri logo

Diverse Lynx is looking for Network Security Engineer to join our dynamic team and embark on a rewarding career journey Maintaining LAN, WLAN and architecture of the server as per the business policy Reporting the security analysis of findings Maintaining the regulatory systems about ISMS policy (Information System Management Systems) Developing the security authentication protocolMaintaining server and switches Maintaining & implementation of the SOP for Network security Knowledge of performing routing protocols (MPLS, HAIPE/IP, QOS and WAN) Monitoring of web security gateways, perimeter security, network access controls, endpoint security

Posted 1 month ago

Apply

5 - 9 years

4 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

Understand the existing security controls (including Endpoint Detection & Response, anti-malware and incident response) Engage with other IT teams including Network Engineering, Data Center, Service Desk to ensure a consistent approach for organizational support across the enterprise Understand the current state of the technology components in the IT stack ranging from networking, storage, compute (virtualization, containers), applications & security mgmt Establish non-production and production environments for testing and hosting the applications Adhere to the Scaled Agile Framework methodologies and tools that exists in the environment Participate in daily stand-up of Compliance & Security release train and contribute to bi-weekly sprints Learn System Engineering concepts to analyze existing environment and find more efficient ways Identify ways of doing things with full automation, AI and ML which needs knowing/learning the concepts of these technologies. Endpoint Security

Posted 1 month ago

Apply

2 - 5 years

11 - 16 Lacs

Sahibzada Ajit Singh Nagar

Work from Office

Naukri logo

About Zscaler Serving thousands of enterprise customers around the world including 40% of Fortune 500 companies, Zscaler (NASDAQ: ZS) was founded in 2007 with a mission to make the cloud a safe place to do business and a more enjoyable experience for enterprise users. As the operator of the world’s largest security cloud, Zscaler accelerates digital transformation so enterprises can be more agile, efficient, resilient, and secure. The pioneering, AI-powered Zscaler Zero Trust Exchange™ platform, which is found in our SASE and SSE offerings, protects thousands of enterprise customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Named a Best Workplace in Technology by Fortune and others, Zscaler fosters an inclusive and supportive culture that is home to some of the brightest minds in the industry. If you thrive in an environment that is fast-paced and collaborative, and you are passionate about building and innovating for the greater good, come make your next move with Zscaler. At Zscaler, our Customer Success Organization is a global, customer-focused team dedicated to delivering high-impact experiences and identifying innovative solutions. We leverage valuable data and research to provide expert, hands-on support starting from the implementation phase and beyond, ensuring customers achieve their goals and leverage our technology to its fullest potential. Together, we create a customer-centric culture that fosters success, adoption, and continuous growth. We're looking for an experienced DLP Engineer to join our Customer Success team. Reporting to the Product Support Manager, you'll be responsible for: Providing Level II technical support for DLP solutions, including incident resolution, troubleshooting, and root cause analysis Assisting customers with DLP-related issues via phone, email, and remote sessions, ensuring timely and effective resolution Managing and prioritizing support cases, ensuring SLAs are met and customer satisfaction is maintained while resolving the customers’ issues Maintaining detailed documentation of support activities, including case notes, troubleshooting steps, and resolutions Contributing to the development and maintenance of a knowledge base, including creating and updating technical articles and FAQs What We're Looking for (Minimum Qualifications) Bachelor’s degree in Computer Science, Information Technology, or a related field, or equivalent work experience Minimum of 3-5 years of experience in technical support, with at least 2 years focused on DLP/CASB solutions Proficiency in DLP technologies and tools (e.g., Symantec DLP, McAfee DLP, Forcepoint DLP, etc.) What Will Make You Stand Out (Preferred Qualifications) Relevant certifications (CompTIA Security+, DLP vendor certifications) are a plus #LI-HYBRID #LI-RR1 At Zscaler, we are committed to building a team that reflects the communities we serve and the customers we work with. We foster an inclusive environment that values all backgrounds and perspectives, emphasizing collaboration and belonging. Join us in our mission to make doing business seamless and secure. Our Benefits program is one of the most important ways we support our employees. Zscaler proudly offers comprehensive and inclusive benefits to meet the diverse needs of our employees and their families throughout their life stages, including: Various health plans Time off plans for vacation and sick time Parental leave options Retirement options Education reimbursement In-office perks, and more! By applying for this role, you adhere to applicable laws, regulations, and Zscaler policies, including those related to security and privacy standards and guidelines. Zscaler is committed to providing equal employment opportunities to all individuals. We strive to create a workplace where employees are treated with respect and have the chance to succeed. All qualified applicants will be considered for employment without regard to race, color, religion, sex (including pregnancy or related medical conditions), age, national origin, sexual orientation, gender identity or expression, genetic information, disability status, protected veteran status, or any other characteristic protected by federal, state, or local laws. See more information by clicking on the Know Your Rights: Workplace Discrimination is Illegal link. Pay Transparency Zscaler complies with all applicable federal, state, and local pay transparency rules. Zscaler is committed to providing reasonable support (called accommodations or adjustments) in our recruiting processes for candidates who are differently abled, have long term conditions, mental health conditions or sincerely held religious beliefs, or who are neurodivergent or require pregnancy-related support.

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies