Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
10.0 - 15.0 years
13 - 18 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Entra ID.Experience: 10 YEARS.
Posted 3 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
hyderabad
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Azure Cloud Workload Security.Experience: 8-10 Years.
Posted 3 weeks ago
10.0 - 14.0 years
13 - 18 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Saviynt.Experience: 10 YEARS.
Posted 3 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Threat Protection.Experience: 8-10 Years.
Posted 3 weeks ago
0.0 - 2.0 years
42 - 60 Lacs
chennai
Work from Office
Responsibilities: * Lead cybersecurity projects from planning to delivery. * Ensure compliance with industry standards and regulatory requirements. Field sales you will work one technical person for the sales.
Posted 3 weeks ago
8.0 - 13.0 years
24 - 48 Lacs
noida
Work from Office
Responsibilities: * Implement DLP solutions using Digital Guardian and Symantec DLP tools. * Configure network security measures and log analysis for data protection. Health insurance
Posted 3 weeks ago
10.0 - 12.0 years
10 - 16 Lacs
noida, greater noida, delhi / ncr
Work from Office
JOB DESCRIPTION Incumbent is responsible for automation and continuous upgradation of the processes in the company and for providing all sorts of IT related support to the employees. The job responsibilities include: 1. SAP Development & implementation a. SAP implementation, Development, Customization, Reports, Forms according to company requirement b. Monitoring the verification of all entries done in SAP 2. Server and IT Infrastructure Management a. Windows Server Backup b. User Administration (Setup & Maintaining User Credentials) c. Ensuring hardware repair at the time of hardware failure d. Monitor Server Performance e. Perform or supervise backups on premises and on cloud f. Manage directories and anti-virus protections. Train network users, answer questions, resolve problems, and communicate changes in software and operations. g. Maintaining uninterrupted MPLS connectivity for all the offices. h. Regular cross checking of server data for each department i. Monitor routine maintenance on the LAN and WAN infrastructure j. Ensure all asset changes related to IT are accurately secured and maintained k. Ensure adequate documentation is maintained on all key systems for administration and Disaster recovery purposes l. Monitor RAID Server configuration and its functionality. m. Raise requirement of all the IT related equipment to the Stores Department by providing their desired configuration and if required also negotiate with the vendors along with Purchase department 3 . Domain and Web Site Maintenance a. Regular updation of Events on TAK Website b. Ensure all the updation are done correctly and in time as desired by the Company c. Taking care of domain expiry and renewal of the websites 4. Keeping record and maintenance of Digital Signature for group of companies a. Keep track of all the DSC registrations b. Ensuring the time-to-time renewal of all DSCs 5 . Monitoring of Office Automation Equipment a. CCTV, ACS, Internet and Modem Connection b. Proper functionality of EPBX software in all locations. c. Centralize view of all the cameras at Nehru place office d. Keeping track of Fax my way for E-Fax for all the companies e. Regular updation and backup of Bio-Metric Database f. Collecting the log data from each location of bio-metric machine and send the same to the HR department on monthly basis g. Ensure proper functioning of all office automation equipment like Fax, Printers, and Photocopier etc. h. Ensure proper power backup of all the IT equipment in the office. 6. Network Management a. Monitor network communication b. Ensure proper functioning of MPLS for the accessing group companies data. c. Ensure availability of data of all the supporting companies. d. Check regularly and ensure proper functioning of all the network devices like Modem, Routers, Switches, Hub. e. Maintaining monthly backup copy of all Computers on server. 7. Firewall or Information Security Management (Intrusion Detection System) a. Setup security policies for users as per the IT Policy. b. Ensure proper functioning of the Firewall (Cyberoam) c. Manage user credential for the Firewall System d. Monitoring of Network to check whether unauthorized websites and web pages are getting accessed or not 8. Providing IT related support at the time of onboarding of a new employee and at time of exit a. Updation of data in HRMS software at the time of joining b. Biometric id, CARE Id, server id and leave portal id for the new employee c. CARE Training to employee d. Allocation the PC, Laptop to employee as per the policy e. Monitoring all the available software to the new employee as desired f. Responsible for IT related exit formalities of the employees g. Manage Auto Mailers of Birthdays/ Marriage Anniversary and Festivals thru HRMS h. Updation of changes required in HR Module 9. Human Resource Management System (HRMS) Software Development & Implementation 10. E-tendering a. Obtaining digital signature for e-tender & renewal of the same b. Ensure accurate and timely submission of all the E-Tender c. Maintain complete user details for all the vendor registration done against all the E-Tenders d. Ensure timely renewal of all the vendor registration using DSC e. Ensure all the required software or supporting files are available in the PC from where the E-bidding is being done. (Like: - DSC Certificate in Browser, Java Runtime Files, E-Token Setup, and Browser Security Certificates etc.) 11. Other Activities a. Manage Bulk Email Services with access to individual who requires it for various purposes b. Manage Bulk SMS Services c. Maintain Email & Control Panel of various other group companies d. Making contact database for Opto-Electronics database For more information visit our company website: https://tak-technologies.com/
Posted 3 weeks ago
10.0 - 15.0 years
15 - 25 Lacs
ahmedabad
Work from Office
Job Overview: As an IT Infrastructure Manager at RYSUN LABS, you will be responsible for overseeing the design, implementation, and maintenance of our IT infrastructure. The ideal candidate will have strong expertise in cloud technologies, particularly AWS or Azure, and extensive experience in cloud deployment and managing CI/CD pipelines. You will work closely with cross-functional teams to ensure the reliability, security, and scalability of our infrastructure to support the company's growth and strategic objectives. Responsibilities: Lead the design, implementation, and management of our IT infrastructure, including on-premises and cloud environments. Manage and optimize cloud services on AWS or Azure, ensuring cost-effectiveness, performance, and scalability. Develop and implement CI/CD pipelines to automate deployment processes and streamline software delivery. Collaborate with development teams to integrate infrastructure-as-code practices and ensure alignment with DevOps principles. Oversee system monitoring, alerting, and troubleshooting to maintain high availability and performance. Implement best practices for security, compliance, and data protection across the infrastructure. Lead and mentor a team of infrastructure engineers, providing guidance and support for their professional development. Evaluate emerging technologies and trends to drive innovation and continuous improvement in our infrastructure capabilities. Qualifications: Bachelor's degree in Computer Science, Information Technology, or related field; Master's degree preferred. Minimum of 8 years of experience in IT infrastructure roles. Strong expertise in cloud technologies, with hands-on experience in AWS or Azure. Proven track record of successfully deploying and managing cloud-based infrastructure at scale. Experience implementing and managing CI/CD pipelines using tools like Jenkins, GitLab CI/CD, or Azure DevOps. Solid understanding of infrastructure-as-code concepts and tools such as Terraform or AWS CloudFormation. Deep knowledge of networking, security, and data management principles. Strong leadership and communication skills, with the ability to collaborate effectively across teams and departments. Certifications such as AWS Certified Solutions Architect or Microsoft Certified: Azure Solutions Architect is a plus.
Posted 3 weeks ago
2.0 - 3.0 years
6 - 9 Lacs
gurugram
Work from Office
Ensure that all SOC (Security Operations Center) tickets are handled and resolved within SLAs (Service Level Agreements). Perform detailed analysis of threats and security events, using sound analytical skills, knowledge, and experience, with a clear narrative to support conclusions. Maintain records of security events investigated, detailed notes of security incident resolution, and incident response activities, utilizing ticketing systems. Make situational incident response recommendations based on best practice security policies that address the clients business need. Research and stay up to date with current security vulnerabilities, attacks, threat actors, security advisories and the MITRE Attack Framework. Manage, maintain, and monitor security alerting systems from remote communications sites to ensure company compliance. Create and run search queries in SIEM tool to help with identifying and troubleshooting security issues. Utilize tools (e.g., Wireshark, Nmap, PCap, etc.) to identify and map devices on the network. Open, track and close trouble tickets. Answer incoming hot line calls and monitor various e-mail accounts and act according to SOC procedures and processes. Interface with client through email, phone calls, and meetings or Aspire field personnel to mitigate security incidents. Assist with the preparation of SOC reports, research papers, and blog posts. Investigate and provide technical analysis of various security incidents and possible compromise of systems. Works as Tier I/L1 support and will work directly with Tier II/L2 and TIER III/L3 and NOC Engineers for issue resolution. Provide direct communication to affected users and companies on security incidents and maintenance activities. Maintain customer technical information within defined documentation standards. Obtain/maintain technical/professional certifications applicable to position or as directed. Communicate with customers, peers, team, and managers regarding incident and change management. Provide emergency on-call support on a rotating schedule. Perform other duties as assigned. Technical Skills Strong troubleshooting and problem-solving skills. Excellent communication and interpersonal skills. Ability to work independently and as part of a team. Strong organizational and time management skills. Willingness to work after hours and provide on-call support. Nice-to-have skills Qualifications Bachelors degree in computer science, Information Technology, or a related field. Experience of 2 to 3 years relevant experience. 1+ year of professional work experience in cyber security field 1+ year of experience with Security Event / Alert Management, Incident Response, and Change Management Processes 1+ year of experience handling security events related to Malware Detection and Analysis, Indicators of Compromise (IOC), Email Phishing, Endpoint Detection and Response (EDR) Knowledge of Runbooks, Playbooks and following Standard Operating Procedures Possession of an Industry Certification (Security+, CySA+, Cisco Cyber-Ops Associate, NSE4, or similar) 1+ years of experience in Security Management. SIEM and Log Management (MS Sentinel , IBM QRadar ,Splunk, OSSIM, FortiSIEM, LogRhythm, etc.) Experience with Firewalls (Palo Alto Networks, Cisco Firepower Manager) Experience with Endpoint Security (Cisco Secure Endpoint, CrowdStrike Falcon, Carbon Black, Microsoft Advanced Threat Protection) Experience with Network Traffic Analytics (Cisco Stealthwatch Cloud, Darktrace) Experience with DNS Security (Cisco Umbrella, Forcepoint) 2+ years of experience with Ticket Management Tools (e.g., ConnectWise, ServiceNow)
Posted 3 weeks ago
8.0 - 10.0 years
8 - 13 Lacs
pune
Work from Office
Tech Consultant-DLP Total 6-`10 years of experience with 5+ years in Symantec DLP Good working experience with data protection/security controls such as data scanning, data leakage protection/prevention. Has good understanding of risk assessments and ISO 27001 and incident response Good communication skills and stakeholder management. Has 5+ years of experience with data protection controls. An experienced security specialist with deep understanding of DLP/Data at rest scanning, incident handling and alert handling on DLP. Has very good insight to the working of DLP. Is a certified cyber security professional, with a minimum of ISO 27001 or CISM, CRISC. Has good understanding of Security Governance Mandatory Skills: Data Loss Prevention - Vontu. Experience: 8-10 Years.
Posted 3 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk. Experience: 8-10 Years.
Posted 3 weeks ago
6.0 - 11.0 years
20 - 35 Lacs
hyderabad
Hybrid
Please find below JD:- Job Title: Lead IT Security Engineer - Zscaler 3 days hybrid - Hyderabad Both side cabs Job Type: FT Summary: We are seeking a dedicated and skilled Lead IT Security Engineer to join our team. The ideal candidate will have a strong background in network security, cloud technologies, and hands-on experience with Zscaler products. As a Lead Zscaler Security Engineer, you will be responsible for providing technical support and ensuring the smooth operation of Zscaler solutions. Your Primary Responsibilities: Provide technical support for Zscaler products (ZIA, ZPA, ZDX), including troubleshooting and resolving issues. Monitor and maintain the health and performance of Zscaler solutions. Collaborate with support teams to understand their technical needs and provide effective solutions. Assist in the deployment and configuration of Zscaler products. Conduct root cause analysis for recurring issues and implement preventive measures. Document technical issues and solutions for knowledge sharing and future reference. Stay up to date with the latest Zscaler features, updates, and industry trends. Work closely with the engineering and product teams to escalate and resolve complex issues. **NOTE: The Responsibilities of this role are not limited to the details above. ** Qualifications : Bachelor\s degree and/or equivalent experience Minimum 5 years of Cybersecurity related experience Must Haves: Hands-on experience with Zscaler products (ZIA, ZPA, ZDX). Strong understanding of networking protocols and security best practices. Strong communication and interpersonal skills, including the ability to build relationships with key stakeholders. Strong critical thinking and problem-solving skills to resolve problems effectively and creatively while maintaining a high level of flexibility, professionalism, and integrity. Ability to work independently and manage multiple tasks simultaneously. Experience in managing Data Protection Technologies: Endpoint & Web DLP, CASB Network Security: Secure Web Gateways, Secure Access Secure Edge (SASE), Firewalls, IDS/IPS technologies
Posted 3 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
hyderabad
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Security Information Event Management.Experience: 8-10 Years.
Posted 3 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Data Security Consulting.Experience: 8-10 Years.
Posted 3 weeks ago
8.0 - 13.0 years
20 - 25 Lacs
bengaluru
Work from Office
Educational Requirements Bachelor of Engineering Service Line Strategic Technology Group Responsibilities This role focuses on our strategic clients who are embarking on digital initiatives. The roles require you to work closely with sales and delivery teams to drive solutions for large and complex programs, identify technology big bets, develop solution propositions around them, prototype and take them to market. This role requires to network and collaborate with CDO as well as Digital and business leaders of client organizations, develop viewpoints on industry and digital technology trends influencing enterprises. Preferred Skills: Technology->Java->Core Java->Java Socket Programming Technology->Mobile Testing->Device Clouds->AWS Device Cloud Technology->Infrastructure Security->Secure Mail Gateway->Forcepoint Email Security Gateway
Posted 3 weeks ago
3.0 - 7.0 years
0 Lacs
chennai, tamil nadu
On-site
As a Cybersecurity Analyst at KONE Cybersecurity, you will play a crucial role in safeguarding KONE IT, IoT, and OT infrastructure from various criminal activities. You will be part of the dedicated Cybersecurity team within the KONE Technology & Innovation unit, focusing on ensuring the security of KONE's products, solutions, and applications used across the business lines. We are currently seeking a dynamic individual to join us as a Cybersecurity Operations Analyst. In this role, you will be responsible for conducting L2 activities for Security Incidents at KONE, responding to escalated incidents from the L1 team. Your primary tasks will include monitoring SOC capabilities, enhancing efficiency, and maintaining a secure environment. The team's mission involves identifying potential threats, analyzing their severity, collaborating with the Cybersecurity Incident Management and Response Team, and implementing containment, mitigation, and remediation strategies. Furthermore, you will be expected to contribute ideas to enhance monitoring and detection capabilities continuously. Key Responsibilities: - Investigate and analyze the root cause of Security Incidents, conduct triage, Incident Management, and timely remediation without impacting KONE operations. - Lead the L1 Operations team towards achieving the set OKRs by the Cybersecurity Operations Manager. - Proactively devise strategies to minimize risks associated with Security Incidents, introduce improvements, and automate processes to reduce manual tasks. - Assist in creating operational documents such as use cases, play/run books, and training materials related to incident response, ensuring regular updates. - Collaborate daily with the SOC team, internal stakeholders, and support teams to address Security Investigations and lead major Security Incidents at KONE. - Contribute to the development of metrics, reporting, review incident progress with the Operations Manager. - Communicate potential threats, suspicious activities, malware findings, etc., to the Security SOC provider and serve as a contact point for KONE Cybersecurity issues. - Enhance operational efficiency by improving processes across multiple detection sets. - Manage Cybersecurity incidents, provide remediation advice, support incident response activities, and escalate issues as necessary. - Collaborate with multi-vendor organizations, adapt to diverse cultures, and identify monitoring gaps across IT, IoT, and OT to drive new Security onboarding processes with internal teams. Qualifications: - Bachelor's or Master's degree in IT (Computer Science)/Engineering or equivalent practical experience. - Certifications in Cybersecurity such as COMPTIA+, SC 200, or other specialized security certifications are advantageous. - Minimum of 3 years" experience in Cybersecurity SOC, Incident Management, and Operations Domain. - Profound knowledge of Network Security, Endpoint security, and familiarity with the Microsoft security landscape. - Familiarity with ITIL processes, excellent verbal and communication skills, and a commitment to staying updated on industry best practices. - Strong problem-solving and analytical abilities, ability to work well in a team, and adaptability to tight deadlines. Join us at KONE, where we foster an innovative and collaborative work environment that values each individual's contributions. We prioritize employee engagement, encourage knowledge sharing, and uphold sustainability practices. Our ethical business standards promote mutual trust and recognition of good performance. By offering diverse experiences and growth opportunities, we aim to support your career and personal development while promoting a healthy work-life balance. To explore more about career opportunities at KONE, visit www.kone.com/careers.,
Posted 3 weeks ago
5.0 - 9.0 years
0 Lacs
indore, madhya pradesh
On-site
You are a skilled Lead Cyber Security Engineer with a minimum of 5 years of experience who will join our team. You possess a strong understanding of information security principles and practices and are adept at implementing and managing security measures for both on-premise and cloud-based systems. In this role, you will be responsible for various tasks including: - Regularly updating server security patches for enhanced protection. - Assessing and mitigating vulnerabilities for on-premise and cloud solutions. - Responding to cybersecurity incidents and managing DEFCON alerts effectively. - Implementing measures to secure servers through server hardening techniques. - Managing SSO, Federated Identity Solutions, remote access, and PAM for optimal Identity and Access Management. - Ensuring endpoint security and reviewing VPN ACLs to maintain network security. - Securing databases and managing access, as well as assessing web/mobile app security for Database and Application Security. - Conducting penetration testing to identify vulnerabilities and improve overall security measures. - Utilizing SIEM tools, HIDS, and NIDS effectively. - Conducting compliance reporting, research, and patching based on CIS controls, and preparing security RFPs. Additionally, you will lead and mentor a team of Engineers in executing large-scale projects, ensuring quality and timely delivery. You will facilitate team collaboration and knowledge-sharing for smooth communication and continuous improvement of processes. Conducting regular performance evaluations and providing constructive feedback to help team members grow professionally will be part of your responsibilities. You will also coordinate and lead regular team meetings to discuss project status, challenges, and solutions effectively. Required Skills: - Bachelor's degree in Computer Science, Information Technology, or a related field. - Minimum of 5 years of experience in cybersecurity engineering or a similar role. - Proficiency in server security patching and vulnerability assessments. - Strong understanding of cybersecurity principles, including malware analysis and incident handling. - Experience with server hardening, endpoint security, Linux security on RHEL and Ubuntu, SSO, federated identity solutions, PAM, remote access security, VPN ACLs, database security, application security, penetration testing, SIEM tools, compliance reporting, and patch management based on CIS controls. - Excellent problem-solving skills and attention to detail. - Strong communication and teamwork abilities. Preferred Certifications: - CISSP (Certified Information Systems Security Professional) - CEH (Certified Ethical Hacker) - CISM (Certified Information Security Manager) - CompTIA Security+ Personality Attributes: - Self-managed and proactive. - Manages time well, punctual, and completes tasks on time. - Embraces challenges, adapts to culture & technology, and can work extra hours when needed. - Focused on execution and growth, takes initiative, and understands KRAs/KPIs. - Prioritizes vision above all and aligns with it. - Takes responsibility for tasks, role, workplace, and ethics. Imagine yourself working as a Lead Cyber Security Engineer at DigiValet, where the company promotes a friendly working environment, breaking the cliche office hierarchy system.,
Posted 1 month ago
2.0 - 6.0 years
0 Lacs
thiruvananthapuram, kerala
On-site
You are required to join our team as a Cybersecurity Engineer with a minimum of 2 years of work experience. As a Cybersecurity Engineer, you will utilize your analytical skills and detailed understanding of cybersecurity methodologies to identify and address threats and vulnerabilities present in our systems and software. Your primary responsibility will involve developing and implementing effective security solutions to safeguard our organization. Your key responsibilities will include planning, implementing, managing, monitoring, and upgrading security measures to protect the organization's data, systems, and networks. You will be tasked with troubleshooting security and network issues, testing and identifying vulnerabilities, and responding promptly to any security breaches. Additionally, you will collaborate with IT and engineering teams to ensure secure software and infrastructure development, conduct routine penetration testing, and maintain comprehensive documentation related to security policies and incident reports. To excel in this role, you must possess expertise in Firewalls, Endpoint Security, and VSX, along with proficiency in programming languages such as Python, C, C#, and C++. A good understanding of protocols from various layers of the OSI model, hands-on experience in threat and vulnerability management, and familiarity with OWASP Top 10 vulnerabilities are also required. Furthermore, you should have experience with API standards, SQL and NoSQL databases like DynamoDB, and CI/CD practices and tools such as Git and Gitlab. Knowledge of AWS will be an added advantage. The ideal candidate should hold a Bachelor's or Master's degree in Computer Engineering, Electronics & Electrical, Electrical & Communication, or a related field. The position is based in Technopark, Thiruvananthapuram and requires the ability to work effectively under pressure in a fast-paced environment. Keeping abreast of emerging threats and trends in cybersecurity, along with a great awareness of hacking techniques, will be crucial for success in this role.,
Posted 1 month ago
10.0 - 15.0 years
0 - 0 Lacs
bangalore, chennai, pune
On-site
As a Hiring Partner for many IT organizations we are Hiring Azure RBAC Sr. Manager , this is direct full time and on the payroll of hiring organization as their full time employee. Interested candidate can share word format resume,ctc,notice period and location details to : info@unimorphtech.com Role : Azure RBAC Sr. Manager Experience : 10-15 Yrs Location : Chennai|Bangalore|Pune|Mumabi # Key Highlights : Developing technical, strategic & operational documents leveraging Azure cloud security. POC for Azure security migration Azure multi-factor authentication,RBAC,Active Directory Group Policies Develop and maintain security for Cloud Architecture. Governance of Cloud Security i.e. Identify and mitigate security issues, misconfigurations, and vulnerabilities. best cloud security practices. designing and implementing security solutions around Azure cloud. Certification : Azure Security Engineer Certification and or Azure Solution Architect Certification. Enterprise Cloud Technology Security Engineering. # Roles and Responsibilities : Responsible for developing technical, strategic & operational documents leveraging Azure cloud security resources. Conduct POCs for various Azure security migration & manage services use cases. Ensure to meet the customer requirements for Azure cloud security design & implementation for foundation readiness, cloud migration & manage services. Expert in managing Active Directory Group Policies (hardening), Azure Active Directory, implementing multi-factor authentication (MFA / PIM), and configuring role-based access control (RBAC) Define and maintain standards aligned to ensure NIST and CIS compliance. Engage in system design, engineering, and maintenance to provide technical security guidance across infra programs and initiatives. Develop and maintain security context in reference architecture and its prototypes. Identify and mitigate security issues, misconfigurations, and vulnerabilities related to cloud and corporate infrastructure and applications. Partner with security engineering, observability, and vulnerability management to define logging, alerting, patching, backup, and recovery capabilities and detect, prioritize, remediate issues and threats across infrastructure assets. Participate in threat identification, security incident response, lead incidents, and perform post-incident reviews with engineering teams. Develop, evangelize, and monitor the adoption of best cloud security practices. Partner with Enterprise Architecture and Security to recommend and guide investments to realize best in class security posture. # Experience : Required Skill: Expertise in Microsoft Azure Security. 4+ years of experience in Microsoft Azure Cloud Security services and features to provide a secure production environment. Must have 4+ years' experience in designing, executing and supporting IT cloud solutions for large multinational corporations at a Global or Regional level. Should have a bachelors degree in computer science,information technology, electronics, or telecommunications. Good to have Azure Security Engineer Certification and or Azure Solution Architect Certification or equivalent Effective communication skills (written and verbal) to properly articulate complicated cloud reports to management and other IT development partners. Excellent knowledge of cloud computing technologies and current computing trends. Experience in designing and implementing security solutions for enterprise systems and applications. Knowledge of security assessments and vulnerability testing. Strong collaboration and communication skills. Ability to stay up-to-date with the latest security trends and technologies. Positive attitude and a strong commitment to delivering quality work. Experience with Azure implementation at enterprise level Exposure to multiple diverse technologies and processing environments Knowledge of all components of a technical architecture Knowledge of business process re-engineering principles and processes Strong understanding of network architecture and application development methodologies Strong interest and curiosity in leveraging the latest in tech to solve customer problems. Experience in communicating with end users, technical & business teams to collect requirements, describe product features, and technical designs. Experience meeting goals in a fast-paced environment with rapidly changing needs
Posted 1 month ago
5.0 - 9.0 years
0 Lacs
navi mumbai, maharashtra
On-site
Job Description: As a cybersecurity professional at SNS India, you will be responsible for understanding various cybersecurity threats and solutions. Your role will involve having knowledge of the security products and services offered by our company. You should be able to effectively translate complex technical concepts into easy-to-understand explanations for clients. Understanding the client's business landscape and security posture will be crucial in identifying opportunities and recommending appropriate solutions. In this role, you will demonstrate proof-of-concepts (POCs) to showcase the value of our offerings. Collaborating with the sales team, you will identify potential customer needs and challenges. Your participation in customer meetings and presentations will be essential to showcase how our solutions can address those needs. Additionally, you will be responsible for creating technical proposals and quotes to support our clients" cybersecurity requirements. Requirements: - Excellent communication and presentation skills - Strong analytical and problem-solving abilities - Ability to build trust and rapport with clients - Up-to-date industry knowledge - Professional appearance Technologies to be known: - Firewall - Endpoint security - DLP - SASE - SSO/MFA - WAF - SOAR - SIEM Join us at SNS India, a leading cybersecurity company dedicated to providing information and network security solutions. Visit www.snsin.com to learn more about our mission and services.,
Posted 1 month ago
2.0 - 6.0 years
0 Lacs
noida, uttar pradesh
On-site
You are a dynamic and results-driven Cybersecurity Sales Executive with at least 2+ years of experience in IT security sales. Your main role will be to promote and sell security solutions such as firewalls, antivirus software, VAPT services, and other advanced cybersecurity tools. It is essential that you possess a strong understanding of the latest threat landscapes and protection technologies. Your key responsibilities will include identifying and developing new business opportunities within the cybersecurity domain, promoting and selling various security products and services, building and maintaining strong relationships with clients, partners, and vendors, understanding client requirements to propose customized security solutions, achieving sales targets to contribute to the growth of the cybersecurity business, collaborating with technical teams to deliver demos, presentations, and proof-of-concept activities, and staying updated with the latest trends and developments in the cybersecurity industry. To excel in this role, you should hold a Bachelor's degree in IT, Computer Science, or a related field (preferred) along with a minimum of 2 years of experience in cybersecurity or IT security product sales. Additionally, you should have good knowledge of firewalls, antivirus solutions, VAPT processes, and other security tools. Strong communication, negotiation, and presentation skills are crucial, and you should demonstrate the ability to work independently and achieve sales goals effectively. If you are passionate about cybersecurity sales and possess the required qualifications and skills, we look forward to receiving your application. Yogendra Joshi Senior HR,
Posted 1 month ago
3.0 - 7.0 years
0 Lacs
ahmedabad, gujarat
On-site
You are an Infrastructure Security Engineer responsible for safeguarding the digital infrastructure of the organization. Your role involves working within various security domains such as cloud security, vulnerability management, endpoint protection, and security operations. In the realm of AWS Cloud Security, you will be tasked with designing, implementing, and upholding security controls within AWS environments. This includes managing IAM policies, security groups, NACLs, VPC configurations, as well as overseeing AWS security services like CloudTrail, GuardDuty, Security Hub, Config, and Inspector. Additionally, you will implement Infrastructure as Code (IaC) security best practices using tools such as CloudFormation, Terraform, or CDK, conduct security assessments, and ensure compliance with industry standards. Regarding Vulnerability Management, your responsibilities will involve leading vulnerability assessment programs, developing and maintaining vulnerability and patch management policies, coordinating with IT and development teams to address security vulnerabilities, and generating reports on vulnerability metrics and risk exposure. You will also conduct penetration testing and security assessments. In terms of Patch Management, you will design and implement automated patch management strategies across various environments, work with system administrators to deploy critical security patches, maintain patch testing procedures, monitor patch compliance, and develop incident response plans for patch-related issues. For Endpoint Security, you will deploy and manage endpoint detection and response solutions, configure security policies, investigate and respond to security incidents, implement mobile device management and security policies, as well as conduct forensic analysis when necessary. To qualify for this role, you should possess a Bachelor's degree in computer science, Information Security, or a related field, along with a minimum of 5+ years of information security experience and 3+ years of experience in AWS cloud security. Technical skills required include expertise in AWS security services, vulnerability scanners, patching tools, EDR/XDR platforms, SIEM/SOAR, and strong knowledge of Windows and Linux security. Preferred certifications include AWS Certified Security - Specialty, CISSP, GCIH, and CEH. Key competencies for this role include analytical skills, effective communication, project management capabilities, ability to work in fast-paced environments, understanding of regulatory compliance requirements, risk assessment frameworks, and security governance. You will report to the Engineering Manager Cyber Security and collaborate closely with IT Operations and Development Teams.,
Posted 1 month ago
3.0 - 7.0 years
0 Lacs
pune, maharashtra
On-site
You are an experienced professional sought by the Security Operations Centre for the SOC Lead position in Pune (Baner). You should possess expertise in SIEM setup, operational knowledge, and cloud environments. The ideal candidate is highly motivated, inquisitive, and adept at problem-solving. A must-have is knowledge of Incident response and SOAR methodologies. Your primary responsibilities include security event monitoring, management, and response. You must have experience with Open Source SIEM Tools, implementation, and at least one Security Information and Event Management (SIEM) solution. Generating reports, dashboards, and metrics for SOC operations, along with presenting to Senior Management, is part of the role. It is essential to have a deep understanding of security threats, attack methods, and the current threat landscape. Proficiency in identifying common attacks and their SIEM signatures is required. Hands-on experience in security monitoring, Incident Response (IR), security tools configuration, and remediation is crucial. Excellent troubleshooting and analytical skills are a must, along with the ability to propose security solutions in business terms. You should be capable of multitasking in a fast-paced environment and have knowledge of containers, orchestration technologies, log parsing, network protocols, and AWS Services for security detection and mitigation. Understanding Operating Systems, Web Servers, databases, and Security devices (firewall/NIDS/NIPS) logs and formats is necessary. With an experience range of 3 - 7 years in IT Infrastructure and Security, you must have prior experience in Cybersecurity & SOC/SIEM, preferably in the Banking and Financial domain. Expertise in Endpoint Security, Network Security, SIEM, SOC Advanced security tools, SOAR platform, Vulnerability Management, SIEM, and building Threat Modeling practice is expected. Strong communication skills are essential for this role. The role offers an opportunity to work with a modern cloud-native security stack, learn and develop in an innovative FinTech environment, receive mentorship and training on advanced threat detection and response practices, be part of a team culture focused on collaboration and technical excellence, and receive a competitive salary and shift allowances.,
Posted 1 month ago
4.0 - 8.0 years
0 Lacs
maharashtra
On-site
You are a Cloud-first IT Administrator with foundational Information Security (InfoSec) skills responsible for managing and securing a modern, distributed IT environment. Your role involves overseeing cloud-native infrastructure, end-user devices, identity and access management, and maintaining InfoSec hygiene through an automation-first, tools-based approach. As the Cloud-based IT Admin, you will manage Identity & Access Management using platforms like Google Workspace Admin, Azure AD, or Okta. You will implement and enforce Single Sign-On (SSO) and Multi-Factor Authentication (MFA) policies. Additionally, you will handle SaaS platforms such as Google Workspace, Microsoft 365, Slack, Zoom, Notion, Jira, and others. Managing Mobile Device Management (MDM) tools like Hexnode, Intune, JAMF, Comodo across all endpoints is also part of your responsibilities. You will enforce security policies like device encryption, patching, antivirus, screen lock, and remote wipe. Automation of account provisioning and deprovisioning for onboarding/offboarding processes will also be under your purview. Furthermore, managing asset inventory for both cloud and physical devices, setting up VPNs, Zero Trust Access models, and basic networking & firewall rules are essential tasks. In terms of InfoSec, you will conduct regular user access reviews, implement least privilege principles, run vulnerability scans, implement Data Loss Prevention (DLP) policies, monitor phishing protection, and set up endpoint monitoring tools like CrowdStrike, SentinelOne. Basic compliance tracking for ISO 27001 and SOC2 readiness and conducting InfoSec awareness training for employees are also part of your role. As an AWS & Cloud Infra (Basic Admin), you will monitor AWS usage, identify cost-saving opportunities, manage AWS IAM users, policies, roles, and basic AWS services like EC2, S3, RDS, CloudWatch, CloudTrail. Collaboration with the DevOps team to ensure secure cloud configurations is also expected. Experience with AI-driven IT/InfoSec tools is preferred. This includes familiarity with platforms like Hexnode AI, Kandji AI, Saviynt, CloudZero, Abnormal Security, Tenable, Moveworks, among others. A willingness to adopt an AI-first approach to IT and InfoSec automation is desired. Mandatory requirements for this role include 4+ years of experience in Cloud-based IT Admin roles. Hands-on experience with Google Workspace, Azure AD, Okta, MDM platforms, cloud networking & firewalls, AWS IAM, and basic cloud services is necessary. Basic knowledge of InfoSec principles such as endpoint security, DLP, and email security is also essential for this position.,
Posted 1 month ago
3.0 - 7.0 years
0 Lacs
vadodara, gujarat
On-site
The primary responsibility of this role will be to monitor security events and alerts utilizing Security Information and Event Management (SIEM) tools, Intrusion Detection/Prevention Systems (IDS/IPS), and other security monitoring platforms. You will be responsible for investigating and analyzing security incidents to identify the root cause, impact, and recommended remediation actions. Additionally, you will conduct in-depth analysis of security logs, network traffic, and other relevant data sources to detect and respond to potential threats. As part of your duties, you will be expected to perform real-time incident response activities, including containment, eradication, and recovery, following established procedures and guidelines. Collaboration with the SOC analysts will be essential, providing guidance and support in investigating and escalating security incidents. It will also be crucial to stay informed about the latest security threats, vulnerabilities, and industry best practices to enhance incident detection and response capabilities. You will play a key role in the development and implementation of SOC processes and procedures, including incident response plans, playbooks, and escalation protocols. Timely and accurate reporting on security incidents, including trend analysis and pattern identification to support proactive security measures, will be a significant part of your responsibilities. Furthermore, you will be involved in monitoring and maintaining endpoint security solutions to detect and prevent malware threats. Investigating and responding to malware incidents, delivering detailed reports, scheduling and managing phishing simulation campaigns to raise employee awareness, and analyzing campaign results to identify users at risk and recommend targeted training programs will all fall under your purview. Additionally, you will assist in coordinating Vulnerability Assessment and Penetration Testing (VAPT) with internal teams and external vendors, tracking vulnerabilities, ensuring timely remediation, and documenting progress. You will also be responsible for conducting Proof of Concept (POC) evaluations for various security solutions to assess their effectiveness and suitability, documenting POC findings, and preparing recommendation reports for stakeholders. Lastly, your role will involve contributing to the design and delivery of cybersecurity awareness programs to educate employees on security best practices.,
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |