Jobs
Interviews

830 Endpoint Security Jobs - Page 13

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

7.0 - 10.0 years

6 - 10 Lacs

Bengaluru

Work from Office

About the Opportunity Step into the forefront of the cybersecurity industry in a rapidly evolving environment where innovation in threat detection and endpoint protection is paramount. This role is tailored for high-performing professionals in the security engineering sector who thrive on managing advanced security solutions and ensuring resilient protection across critical infrastructures. Operating within a dynamic, on-site work culture in India, you will be challenged to refine and enhance security procedures using advanced SentinelOne EDR strategies. Role & Responsibilities Lead the deployment, configuration, and optimization of SentinelOne EDR solutions to secure endpoints across diverse environments. Monitor, analyze, and respond to security incidents, leveraging threat intelligence to rapidly mitigate risks and vulnerabilities. Collaborate with cross-functional teams to integrate EDR solutions with broader security infrastructure (including SIEM systems) and refine incident response protocols. Develop and implement security architecture strategies to ensure best practices and regulatory compliance across services. Mentor and guide junior team members by sharing expert knowledge on endpoint protection and evolving threat landscapes. Continuously assess and enhance security measures, participating in post-incident reviews and process improvements. Skills & Qualifications Must-Have: Strong hands-on experience with SentinelOne EDR administration, configuration, and troubleshooting in high-security environments. Must-Have: Proven expertise in endpoint security, incident response, and threat mitigation using advanced security tools. Must-Have: In-depth understanding of security best practices across Windows, Linux, and other operating systems. Preferred: Experience integrating EDR solutions with SIEM platforms and automating security incident workflows. Preferred: Familiarity with cybersecurity compliance frameworks such as NIST and ISO 27001. Preferred: Excellent analytical, communication, and leadership skills with a collaborative working style. Benefits & Culture Highlights Work on-site in a dynamic and innovative cybersecurity environment where vigilance and excellence are rewarded. Engage with cutting-edge security technologies and contribute to strengthening organizational cybersecurity frameworks. Collaborative, growth-oriented culture that values mentorship, continuous learning, and proactive problem solving. If you are an experienced security engineering professional passionate about leveraging SentinelOne EDR to transform endpoint security, we invite you to apply and become an integral part of our fast-paced, mission-driven team.

Posted 1 month ago

Apply

5.0 - 10.0 years

4 - 9 Lacs

Hyderabad, Chennai, Bengaluru

Work from Office

We are looking for an experienced and results-driven Key Account Manager to lead sales and business development efforts for IT Infrastructure, Cybersecurity Solutions, (SaaS/strong background in B2B software and security sales.

Posted 1 month ago

Apply

6.0 - 10.0 years

15 - 25 Lacs

Bengaluru

Work from Office

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you a tech-savvy problem-solver with a passion for ensuring optimal network performance? If so, look no further – Kyndryl is seeking a Network Support Specialist who will be the go-to expert for installing, maintaining, and troubleshooting computer networks. As our Network Support Specialist, you'll be working in a complex, multi-vendor environment, and will use your analytical skills to identify and resolve network issues, make configuration changes, and implement security policies. This role requires someone who can think on their feet, test and apply corrective actions (including emergency changes), and participate in change reviews as needed. And with the ever-changing nature of technology, you'll be constantly learning and growing in your role. You will work alongside a talented team of experts to plan and execute routine network changes, troubleshoot and solve network issues and outages, and maintain excellent communication with our end customers, project managers, and service engineers. You’ll be responsible for maintaining network components, monitoring network performance, and maintaining network security. You will also be providing user support for network-related issues, ensuring that our customers receive the highest level of support possible. If you're ready to take on a fast-paced and rewarding role in the world of network support, apply to join the Kyndryl team today! Responsibility are Implement and maintain VPNs, IPSec tunnels, and SSL VPNs using Palo Alto and FortiGate technologies.Proficiency in routing protocols BGP, OSPF Configure proxy and network access control (NAC) solutions.Hands-on experience with FortiManager, and FortiAnalyzerCreate and Perform firmware upgrades, patches, and routine maintenance on firewalls.cIntegrate firewall solutions with SIEM, IDS/IPS, endpoint protection, and cloud security tools.Monitor network performance and security systems, responding to security incidents and conducting root cause analysis.Investigate and respond to security breaches, malware infections, and intrusion attempts. Implement network virtualization, micro-segmentation, distributed fire walling (DFW) .Troubleshoot and optimize NSX networking components, including VXLAN, Overlay, Edge Services Gateway (ESG), and Distributed Logical Routers (DLR) and Configure NSX Security Policies, NAT, VPN, Load Balancing, and Firewall rules Expertise in NSX-T components such as Transport Zones, Edge Nodes, and T0/T1 Gateways. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career, from Junior Administrator to Architect. We have training and up skilling programs that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. One of the benefits of Kyndryl is that we work with customers in a variety of industries, from banking to retail. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others Required Technical and Professional Experience : Total 10+ years of experience. Experience in cybersecurity, SOC, or security engineering roles. Hands-on experience with WAF, IBM DAM, IBM GDE, Force point Proxy, DLP , Email Gateway. Strong knowledge of network security, endpoint security Qualification: BSc. B.E./B. Tech, M.E. /M. Tech Preferred Technical and Professional Experience : Experience with DAM solutions such as IBM Guardium Ability to monitor and audit database activities for unauthorized access and suspicious activities Experience with Thales CipherTrust Understanding of key management solutions (KMS) and Hardware Security Modules (HSMs) Certifications : PCNSE, NSE4 ,WAF, Network Virtualization (VCTA-NV) , Force point DLP, Web Security Administrator Certification , CEH , CompTIA Security+ Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 1 month ago

Apply

5.0 - 9.0 years

12 - 17 Lacs

Noida

Work from Office

":" Understanding of variouscybersecurity threats and solutions Knowledge of security productsand services offered by our company Ability to translate complextechnical concepts into easy-to-understand explanations for clients Understanding the clientsbusiness landscape and security posture Identifying opportunities andrecommending appropriate solutions Demonstrating proof-of-concepts(POCs) to showcase the value of their offerings Working with the sales team toidentify potential customer needs and challenges Participating in customermeetings and presentations to showcase how our companys solutions canaddress those needs Creating technical proposals andquotes Requirements Excellent communication andpresentation skills Strong analytical andproblem-solving abilities Ability to build trust andrapport with clients Up to date industry knowledge Professional appearance Technologies to be known, SIEM/SOAR Mail Security Firewall Endpoint security DLP SASE Benefits Flexible Work Environment (leave benefits, remote options) Health & Accident Insurance Coverage Remuneration above par with industry standards for

Posted 1 month ago

Apply

5.0 - 10.0 years

25 - 30 Lacs

Bengaluru

Work from Office

Jul 21, 2025 Location: Bengaluru Designation: Assistant Manager Entity: Deloitte Touche Tohmatsu India LLP Your potential, unleashed. India s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realize your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks Your work profile As Assistant Manager in our Cyber Team you ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: - Key Responsibilities: 24/7 general shift and provide on call support for critical issues Deploy, configure, and maintain Endpoint Detection and Response (EDR) platforms. Create and deploy EDR agent packages using centralized solutions such as SCCM Policy Development: Develop and enforce security policies and procedures for endpoint protection. Ensure endpoints are up to date with the latest security patches and software updates. Configure EDR policies to align with organizational security requirements. Customize detection rules to enhance threat detection capabilities. Provide regular updates to management on the status of endpoint security. Conduct training sessions for employees on best practices for endpoint security. Raise awareness about emerging threats and how to avoid them. Stay updated on the latest trends and advancements in endpoint security. Evaluate and recommend new EDR tools and technologies. Participate in threat intelligence sharing to enhance the organization s security posture. Work closely with IT teams to ensure seamless integration of EDR solutions with existing infrastructure. Troubleshoot any agent related issues along with IT team Collaborate with the Security Operations Center (SOC) and other security teams to improve overall threat detection and response capabilities. Support any internal and external audit and provide necessary logs/reports within the agreed timeline Close all the identified vulnerabilities within the defined timeline Liaise with vendors and service providers to manage and optimize EDR solutions. Create Agent installation SOPs for various operating systems which can be followed by IT team for manual installation of agents Create and maintain knowledgebase capturing the known issues and the solutions Desired qualifications Excellent problem-solving and analytical skills. Strong communication and documentation skills. The L2 ENDPOINT Specialist shall have minimum 5 years of experience in Endpoint Detection and Response (EDR) platforms. possess at least one of the following certifications, a) Security+ b) ECSA c) GCFA d) GCFE e) CISSP f) Any SIEM Certification Location and way of working Base location: Bangalore Professional is required to work from client location. Your role as a Assistant Manager We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society. In addition to living our purpose, Senior Executive across our organization must strive to be: Inspiring - Leading with integrity to build inclusion and motivation Committed to creating purpose - Creating a sense of vision and purpose Agile - Achieving high-quality results through collaboration and Team unity Skilled at building diverse capability - Developing diverse capabilities for the future Persuasive / Influencing - Persuading and influencing stakeholders Collaborating - Partnering to build new solutions Delivering value - Showing commercial acumen Committed to expanding business - Leveraging new business opportunities Analytical Acumen - Leveraging data to recommend impactful approach and solutions through the power of analysis and visualization Effective communication Must be well abled to have well-structured and well-articulated conversations to achieve win-win possibilities Engagement Management / Delivery Excellence - Effectively managing engagement(s) to ensure timely and proactive execution as well as course correction for the success of engagement(s) Managing change - Responding to changing environment with resilience Managing Quality & Risk - Delivering high quality results and mitigating risks with utmost integrity and precision Strategic Thinking & Problem Solving - Applying strategic mindset to solve business issues and complex problems Tech Savvy - Leveraging ethical technology practices to deliver high impact for clients and for Deloitte Empathetic leadership and inclusivity - creating a safe and thriving environment where everyones valued for who they are, use empathy to understand others to adapt our behaviours and attitudes to become more inclusive. How you ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report . Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone s welcome entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you re applying to. Check out recruiting tips from Deloitte professionals. *Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices.

Posted 1 month ago

Apply

3.0 - 5.0 years

11 - 15 Lacs

Mumbai

Work from Office

Jul 18, 2025 Location: Mumbai Designation: Consultant Entity: Deloitte Touche Tohmatsu India LLP Your potential, unleashed. India s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realise your potential amongst cutting edge leaders, and organisations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks Job Summary: We are seeking an experienced Red Team Specialist with a strong background in offensive security and hands-on experience in conducting Red Team engagements across various vectors. The ideal candidate will be responsible for simulating sophisticated cyber-attacks to test and enhance our clients detection and response capabilities, especially within the BFSI sector. Key Responsibilities: Plan and execute Red Team engagements simulating realistic threat actor scenarios (external, internal, and physical). Conduct assumed breach assessments , initial access simulations , lateral movement , and exfiltration exercises . Leverage MITRE ATT&CK framework to design threat scenarios and map findings. Exploit misconfigurations and vulnerabilities in Active Directory , cloud environments, and enterprise infrastructure. Use and integrate CART/BAS tools like Cymulate, Pycus, or similar platforms to automate and validate security posture. Work with Blue Teams to measure detection, prevention, and response capabilities post-engagement. Develop comprehensive reports with actionable remediation recommendations. Conduct threat emulation based on industry-specific APT groups relevant to the BFSI sector. Stay updated on emerging threats, attack techniques, and countermeasures. Support internal and client-facing security awareness , purple teaming , and tabletop exercises . Required Skills & Experience: Minimum 5 years of hands-on experience in offensive security / red teaming roles. Proficient in TTPs for Red Team operations , including phishing, C2 infrastructure, evasion techniques, privilege escalation, and data exfiltration. In-depth understanding of Windows internals , Active Directory attacks (Kerberoasting, Pass-the-Hash/Ticket, ACL abuse, DCShadow, etc.). Solid understanding of network protocols , cloud platforms , and endpoint security bypass techniques . Familiarity with attack simulation tools , custom scripting, and open-source frameworks (Cobalt Strike, Metasploit, Empire, Covenant, etc.). Experience in physical security assessments , badge cloning, RFID/NFC exploitation, and social engineering (preferred). Strong knowledge of MITRE ATT&CK , NIST , and equivalent frameworks. Ability to document findings, map them to risk frameworks, and present to both technical and executive stakeholders. Preferred Qualifications: OSCP, CRTP, or similar offensive security certifications. Prior experience in BFSI sector engagements . Understanding of compliance and regulatory requirements in financial institutions (e.g., RBI, SEBI, ISO 27001). Additional Expectations: Excellent analytical and problem-solving skills. Strong communication skills for stakeholder management and post-engagement debriefs. Ability to work in high-pressure environments and coordinate with cross-functional teams. Experience: 3 to 5 Years Location: Mumbai (Full-Time | Work From Office) Certifications: OSCP, CRTP, or equivalent

Posted 1 month ago

Apply

8.0 - 10.0 years

10 - 12 Lacs

Bengaluru

Work from Office

Number of Openings 1 ECMS ID in sourcing stage 533255 Assignment Duration 12 months Total Yrs. of Experience 8-10 Yrs Relevant Yrs. of experience 4+ Detailed JD (Roles and Responsibilities) Manage post-deployment operations and support Handle and resolve Work Order (WO) tickets and day-to-day operational tasks. Troubleshoot issues related to PAM/EPM functionality and performance. Update, test, and validate new software packages and coordinate agent deployments. Maintain comprehensive documentation including job aids, manuals, and update logs. Introduce and implement new features and improvements to enhance user experience. Contribute to the long-term roadmap and strategy for endpoint privilege management. Evaluate potential replacement tools Support integration and remediation efforts for dependent projects. Lead MVP configuration and deployment for Native Entra ID devices. Conduct pre-deployment testing, validation, and manage PROD deployments. Collaborate with downstream projects to resolve blockers and dependencies. Coordinate with the vendor for SaaS environment updates, patching, and DR scenarios. Maintain accurate records of configurations, maintenance, and user documentation. Stay informed on new features and capabilities of the platform. Participate in tool evaluation for potential replacement post-contract. Mandatory skills Proven experience with BeyondTrust PAM and EPM solutions , especially Windows and Cloud endpoints. Strong understanding of endpoint security , privilege management , and SaaS-based security tools . Experience with Windows environments , Entra ID (formerly Azure AD) , and native device management . Hands-on experience in deployment, troubleshooting, and operational support . Excellent documentation, communication, and stakeholder coordination skills. Ability to work independently and collaboratively across teams and vendors. Desired/ Secondary skills Experience in transitioning tools from legacy systems (e. g. , PowerBroker for Windows). Familiarity with ITIL processes , ticketing systems , and change management . Knowledge of disaster recovery planning and compliance requirements . Prior involvement in tool evaluation and roadmap planning . Domain Cyber Security Max Vendor Rate in Per Day (Currency in relevance to work location) INR 12000 Work Location given in ECMS ID Hyderabad WFO/WFH/Hybrid WFO Hybrid BG Check (Before OR After onboarding) Pre onboarding Is there any working in shifts from standard Daylight (to avoid confusions post onboarding) YES/ NO PST timing - 5 days a week (as required)

Posted 1 month ago

Apply

7.0 - 12.0 years

20 - 25 Lacs

Chennai

Work from Office

Dear Cybersecurity Professionals, We are thrilled to invite you to our upcoming AI in Cybersecurity User Group activity , happening on 26th July in Chennai . This is an excellent opportunity to connect, learn, and exchange insights on how AI is revolutionizing the cybersecurity landscape. Highlights of the event: Expert talks on AI-driven cybersecurity solutions Real-world case studies and practical insights Networking with industry peers and thought leaders Interactive sessions to discuss challenges & best practices Please note: Seats are strictly limited , and registrations will be accepted on a first-come, first-served basis. Date: 26th July 2025 Time: 10:30 AM 12:30 PM Location: Chennai (venue details will be shared upon confirmation) If youre interested in joining, please reply to this email or register through below link at the earliest to secure your spot. https://forms.cloud.microsoft/r/Qc57BKrBmQ Looking forward to your participation in building a vibrant AI in cybersecurity community!

Posted 1 month ago

Apply

4.0 - 8.0 years

0 Lacs

noida, uttar pradesh

On-site

Excited to contribute to and help manage impactful projects within the Microsoft Solutions vertical Eager to join a team of tech enthusiasts, with a strong focus on timely and precise delivery Keen to join Crayon India, recognized as a Great Place to Work Practical Information: Location: Delhi NCR, Noida, Gurgaon, Bangalore, India | Reports to: Associate Director Microsoft Business | Visa Requirements: Valid working visa for India | Language Requirements: Professional level English and Hindi written and verbal | Work Arrangement: Hybrid | Learn more: crayon.com/in As our new Technical Project Manager Modern Workplace M365, you will bring expertise in one or more business and management practices and be accountable for driving projects from inception to closure with a positive and agile mindset. You will serve as a subject matter expert and mentor, guiding team members through your experience Key Responsibilities Will Include Serving as technical project manager for Modern Workplace M365 and Azure services, leading multiple programs and projects end-to-end using an established project management framework (PRINCE2, PMP, Agile) Creating, tracking, monitoring activities, milestones and timelines for managed projects, following up, managing punctuality and compliance with agreed deadlines Preparing, creating and reporting regular status and financial reports for managed projects, ensuring that these are on track and prioritized correctly within the portfolio, which will include managing dependencies to and from other projects Overseeing activities of Risk Administrator, gathering stakeholder input, ranking the top project risks in terms of total impact, establishing contingency plans, and identifying trigger events then initiating mitigating action Your Competencies 4+ years of experience as a Project Manager Office 365/Azure Deployment 5+ years of experience with customer interaction in consultant technical delivery Knowledge of Microsoft M365 Licensing knowledge is must, as well as current knowledge on Office 365 changes and new Microsoft releases for Office 365 and related products, and expertise on Azure Infra/PaaS services as an architect Implementation and Cloud Architect skillset, with good knowledge of mail migration approach, endpoint security, Azure migration projects, Server Operations for designing solutions About You You have the ability to present and guide CXOs in making informed decisions for optimized Managed Backup and Disaster Recovery services proposals You are results-orientated with strong verbal and written communication and presentation skills You have demonstrated aptitude for learning new technologies and staying current with Microsoft solutions What's on Offer Medical & Insurance Internet & Mobile benefits Traveling expenses Certifications 50% Apply to join an award-winning company! When filling vacancies, we prioritize equally qualified candidates who bring diverse backgrounds and experiences, helping to enrich our team dynamics and foster a vibrant, inclusive work environment. If you require any assistance or reasonable accommodation during the application process, please let us know. Why Crayon We believe in the power of technology to drive the greater good. Crayon is a global, people-first, vendor-agnostic company headquartered in Oslo, with more than 4,000 colleagues in 46 countries. We deliver first-class solutions to support customers build their commercial and technical foundation for a successful and secure cloud-first, digital transformation journey. Our Culture & Values We consider ourselves to be one big community. Our core values of Integrity, Quality, Pace and Agility were written over 20 years ago based on our Nordic heritage and still hold true to our global environment. We are committed to fostering an equitable work environment where everyone can reach their full potential. Our inclusive culture celebrates and values individual differences, ensuring all voices are heard and respected. Our Big Ambitions: We have set big and bold ambitions for our ESG strategy revolving around championing diversity, transitioning towards a greener, net zero GHG emissions and becoming a leader in ESG Product development.,

Posted 1 month ago

Apply

10.0 - 15.0 years

0 Lacs

maharashtra

On-site

As an Onsite Technical Project Manager with 10 to 15 years of experience, you will be the subject matter expert responsible for all designated sites. Your key responsibilities will include managing the performance of the NGFW (Palo Alto & Check Point), email, and endpoint security team. You will collaborate with the respective OEM and their SME to ensure seamless operations. Your role will involve maintaining and enhancing mechanisms for risk assessment by proposing effective solutions and sharing feedback with other internal security teams. It is essential for you to strictly adhere to all policies and procedures of the Bank while maintaining effective communication and support among various security teams within the organization. The ideal candidate for this position should hold an engineering degree in Computer Science or related fields associated with Information and Communication Technology. Additionally, possessing advanced level certifications such as GIAC, (ISC), EC-Council, Offensive Security, or OEM-specific Certifications would be advantageous. Desired skills for this role include effectively managing the performance of the NGFW, email, and endpoint security team, collaborating with OEMs and their SMEs, constantly enhancing risk assessment mechanisms, ensuring compliance with organizational policies, and fostering seamless coordination among different security teams within the Bank.,

Posted 1 month ago

Apply

5.0 - 9.0 years

0 Lacs

haryana

On-site

As a Security Incident Analyst L3 at our client site in Gurugram, you will play a crucial role in incident response, threat analysis, and security operations. Your responsibilities include leading the response to high-severity incidents, conducting advanced threat analysis, administering security tools, and mentoring junior SOC analysts. This position requires a minimum of 5 years of experience in a Security Operations Center (SOC) or Incident Response role, along with expertise in SIEM administration, network security, and incident detection. A strong knowledge of security tools such as SIEM platforms (QRadar, Splunk), EDR tools (CrowdStrike, Carbon Black), and IDS/IPS is essential. Additionally, you should have experience in correlating threat intelligence with incidents and recommending preventive measures. A bachelor's degree in Computer Science, Cybersecurity, or a related discipline is required. If you are proactive, technically proficient, and enjoy tackling complex security challenges, we encourage you to apply by sending your updated resume to recruitment@nurturehrm.com. This is a full-time position located in Gurugram with a competitive compensation package ranging from 12 to 13 LPA.,

Posted 1 month ago

Apply

2.0 - 3.0 years

4 - 8 Lacs

Gurugram

Work from Office

Ensure that all SOC (Security Operations Center) tickets are handled and resolved within SLAs (Service Level Agreements). Perform detailed analysis of threats and security events, using sound analytical skills, knowledge, and experience, with a clear narrative to support conclusions. Maintain records of security events investigated, detailed notes of security incident resolution, and incident response activities, utilizing ticketing systems. Make situational incident response recommendations based on best practice security policies that address the clients business need. Research and stay up to date with current security vulnerabilities, attacks, threat actors, security advisories and the MITRE Attack Framework. Manage, maintain, and monitor security alerting systems from remote communications sites to ensure company compliance. Create and run search queries in SIEM tool to help with identifying and troubleshooting security issues. Utilize tools (e.g., Wireshark, Nmap, PCap, etc.) to identify and map devices on the network. Open, track and close trouble tickets. Answer incoming hot line calls and monitor various e-mail accounts and act according to SOC procedures and processes. Interface with client through email, phone calls, and meetings or Aspire field personnel to mitigate security incidents. Assist with the preparation of SOC reports, research papers, and blog posts. Investigate and provide technical analysis of various security incidents and possible compromise of systems. Works as Tier I/L1 support and will work directly with Tier II/L2 and TIER III/L3 and NOC Engineers for issue resolution. Provide direct communication to affected users and companies on security incidents and maintenance activities. Maintain customer technical information within defined documentation standards. Obtain/maintain technical/professional certifications applicable to position or as directed. Communicate with customers, peers, team, and managers regarding incident and change management. Provide emergency on-call support on a rotating schedule. Perform other duties as assigned. Technical Skills Strong troubleshooting and problem-solving skills. Excellent communication and interpersonal skills. Ability to work independently and as part of a team. Strong organizational and time management skills. Willingness to work after hours and provide on-call support. Nice-to-have skills Qualifications Bachelors degree in computer science, Information Technology, or a related field. Experience of 2 to 3 years relevant experience. 1+ year of professional work experience in cyber security field 1+ year of experience with Security Event / Alert Management, Incident Response, and Change Management Processes 1+ year of experience handling security events related to Malware Detection and Analysis, Indicators of Compromise (IOC), Email Phishing, Endpoint Detection and Response (EDR) Knowledge of Runbooks, Playbooks and following Standard Operating Procedures Possession of an Industry Certification (Security+, CySA+, Cisco Cyber-Ops Associate, NSE4, or similar) 1+ years of experience in Security Management. SIEM and Log Management (MS Sentinel , IBM QRadar ,Splunk, OSSIM, FortiSIEM, LogRhythm, etc.) Experience with Firewalls (Palo Alto Networks, Cisco Firepower Manager) Experience with Endpoint Security (Cisco Secure Endpoint, CrowdStrike Falcon, Carbon Black, Microsoft Advanced Threat Protection) Experience with Network Traffic Analytics (Cisco Stealthwatch Cloud, Darktrace) Experience with DNS Security (Cisco Umbrella, Forcepoint) 2+ years of experience with Ticket Management Tools (e.g., ConnectWise, ServiceNow)

Posted 1 month ago

Apply

4.0 - 9.0 years

9 - 11 Lacs

Chennai

Work from Office

Hi All, Movate ( Formerly known as CSSCorp ) is hiring for Senior Endpoint Security Engineer Role. Job Responsibilities: Provide Technical Support to customers and partners Provide technical services include writing scripts, troubleshooting and best practices to customers Manage support cases to ensure issues are recorded, tracked, resolved, and follow-ups are completed in a timely manner Provide fault isolation and root cause analysis for technical issues Publish Technical Support Bulletins and other technical documentation in the Knowledge Base Review of technical documentation for training materials, technical marketing collateral, manuals, troubleshooting guides, etc. Travel to customer sites in the event of a critical situation to expedite resolution as required Provide on-call support 24x7 on an as needed basis Provide configurations, troubleshooting and best practices to customers. Work with our Engineering team and influence the operability of the product. Participate in regular weekend on-call rotation and provide after-hours support on an as-needed basis. Able to effectively communicate to all levels and stakeholders - internally and externally on complex technical issues Desired Skills 3+ years of related experience. Provide configurations, troubleshooting and best practices to customers. Required experience with supporting EndPoint software products. Required strong experience with Windows OS, Linux OS and macOS based applications (Installation, troubleshooting, Debugging). Experience with Android OS based applications (Installation, troubleshooting, Debugging). Strong experience with MS environment (SCCM, GPO, AD, MSSQL, IIS). Experience with EndPoint security software is a plus (Antivirus, DLP, IPS, NAC). Knowledge of SIEM, vulnerability management tools and firewalls. Experience understanding malware, exploits, operating system structure and behavior. Experience with batch scripting and Python is a plus Strong ability to independently troubleshoot, reproduce issues and identify feasible workarounds in broad, complex, and unique environments with mixed applications and protocols required. Knowledge of Cloud infrastructure a plus Knowledge of VDI (VMWare Horizon, Citrix XenApp and XenDesktop) is a plus BS/MS or equivalent experience require

Posted 1 month ago

Apply

8.0 - 13.0 years

20 - 25 Lacs

Bengaluru

Work from Office

Lead endpoint compliance team - 10-15 members Own developing, implementing, and maintaining endpoint security policies, procedures, and controls to meet regulatory requirements and industry standards.

Posted 1 month ago

Apply

14.0 - 24.0 years

40 - 60 Lacs

Gurugram

Work from Office

Overview: We are looking for an experienced Security Delivery Manager to lead and oversee Security Operations. The ideal candidate will bring strong delivery management capabilities, excellent client-facing communication, and a track record of managing cross-functional teams in high-paced environments. Key Responsibilities: Serve as the primary point of contact for the Security Support Operations across on prem and cloud. Own end-to-end service delivery across functional and technical streams, ensuring adherence to SLAs and KPIs. Lead cross-functional teams of M365, Azure Cloud, End point security, Certificate Management, Threat and Vulnerability management to deliver high-quality support and continuous improvements. Manage the full incident lifecyclemonitoring, prioritization, root cause analysis, and resolution—with proactive trend analysis. Govern the Change Request (CR) process: from scoping and estimation to approvals, implementation, and closure. Collaborate with cross functional teams on Security, access controls, and landscape optimization. Define and enforce SOPs, escalation processes, and communication protocols for critical and high-impact issues. Oversee L1, L2, and L3 support delivery with 24x7 coverage through effective coordination between onshore and offshore teams. Drive ITIL-based processes for incident, problem, change, and release management. Monitor service performance via KPIs, SLAs, and dashboards, and lead continuous service improvement initiatives. Conduct regular service review meetings with stakeholders and ensure high levels of client satisfaction. Manage the pipeline for change requests in line with governance protocols. Provide regular status updates and executive reporting. Required Skills & Qualifications: 14+ years of IT experience with at least 6–8 years in Security Operations. Strong experience managing large-scale Security Operations, having good understanding of SOC compliance, AI Driven security automations and Compliance Governance Require very good understanding of Azure Security Center, Azure AD, Cloud App Security, Mimecast, McAfee, Symantec, M365 Exposure to Gytpol and SafeBreach is added advantage Expert level knowledge on Microsoft 365 Security Suite (Defender, Sentinel, Purview) Experience with SIEM, SOAR, and EDR/XDR platforms. Should have experience overseeing vulnerability scans and coordinate remediation effort, Compliance audits and Certificate management Excellent communication, stakeholder engagement, and escalation management skills. Experience working in hybrid onshore-offshore delivery models. Preferred Certifications: Microsoft Certified: Security Operations Analyst Associate (SC-200) Certified Ethical Hacker (CEH) GIAC Certified Incident Handler (GCIH) CompTIA Security+ / CySA+ CISSP or equivalent (preferred)

Posted 1 month ago

Apply

2.0 - 6.0 years

0 Lacs

karnataka

On-site

Zyeta is an integrated workspace design and build services firm specializing in delivering exceptional workspace interiors by leveraging the latest design thinking, workforce experience, and environmental concepts. With a unique blend of people, process, and technology, we aim to provide unparalleled value to our clientele. We have successfully transformed raw spaces into award-winning, next-generation offices, data centers, and more for a diverse international client base, including global enterprises and early-stage companies across India. We are currently seeking a skilled System Administrator with hands-on experience in managing and maintaining the Zoho Workplace Suite. The ideal candidate will be responsible for supporting day-to-day IT infrastructure operations, ensuring seamless access, security, and performance of our systems and tools, particularly within the Zoho ecosystem. As a System Administrator for Zoho Workplace Suite, your responsibilities will include: - Administering user accounts, provisioning, and deprovisioning within the Zoho Workspace Suite - Monitoring system performance and resolving issues promptly to ensure optimal uptime - Integrating Zoho applications with third-party tools to enhance capabilities and automate workflows - Implementing robust endpoint security policies and managing antivirus solutions - Overseeing network operations, providing server support, and ensuring smooth maintenance - Developing and maintaining comprehensive documentation for infrastructure setup, workflows, and SOPs - Collaborating with cross-functional teams to drive business growth and efficiency - Implementing secure data backup processes and disaster recovery protocols To be successful in this role, we expect you to have: - 2 to 4 years of relevant experience as a System Administrator - A Bachelor's degree in IT, Computer Science, or related field - Proven experience in managing the Zoho Workspace Suite - Familiarity with cloud-based SaaS tools and platforms - Zoho certifications (Admin or Specialist) are a plus In return, we offer: - Engaging work culture with freedom and responsibility - Innovative work environment that encourages creativity in all aspects of the business - Opportunities for growth, learning, and inspiration - A collaborative and supportive team culture that recognizes and values your strengths and expertise If you are passionate about system administration and have experience with the Zoho Workplace Suite, we invite you to join our team in Bangalore and contribute to our mission of creating exceptional workspaces.,

Posted 1 month ago

Apply

7.0 - 12.0 years

20 - 32 Lacs

Hyderabad

Work from Office

Key Responsibilities: Endpoint Security Solution Management: This includes deploying, configuring, and managing various endpoint security solutions, such as antivirus/anti-malware, endpoint detection and response (EDR), application control, and host-based intrusion detection/prevention systems. Tanium Platform Expertise: A deep understanding and hands-on experience with the Tanium platform is essential, including its capabilities for endpoint visibility, security management, and incident response. Troubleshooting and Incident Response: The role involves troubleshooting issues related to endpoint security solutions, investigating security incidents, and working towards their resolution. Configuration and Policy Management: This includes creating, maintaining, and updating endpoint configuration baselines, ensuring they align with organizational security policies and best practices. Collaboration and Communication: The role requires close collaboration with IT security teams, system administrators, and other stakeholders to ensure a coordinated approach to endpoint security. Compliance: Ensuring that endpoint security practices and configurations comply with relevant industry standards and regulatory requirements. Documentation: Maintaining comprehensive documentation of all endpoint security-related activities, configurations, and procedures. Threat Detection and Response: This involves developing, implementing, and maintaining detection mechanisms to identify and respond to potential threats on endpoints. Vulnerability Management: Utilizing tools like Tanium to assess the patch status of endpoints, identify vulnerabilities, and remediate them effectively. Required Skills: Endpoint Security Knowledge: A strong understanding of endpoint security principles, technologies, and best practices. Tanium Platform Proficiency: Hands-on experience with the Tanium platform, including its core functionalities and modules. Troubleshooting and Problem-Solving: The ability to effectively troubleshoot and resolve endpoint security-related issues. Scripting and Automation: Experience with scripting languages (e.g., PowerShell, Python) to automate tasks related to endpoint management and security. Operating System Knowledge: Familiarity with standard operating systems like Windows, Linux, and MacOS. Communication and Collaboration: Excellent communication and collaboration skills to work effectively with various teams and stakeholders. Cloud Security: Knowledge of cloud-based endpoint security solutions and their integration with on-premise systems. Security Certifications: Relevant security certifications (e.g., CompTIA Security+, CISSP) can be beneficial.

Posted 1 month ago

Apply

10.0 - 20.0 years

2 - 3 Lacs

Mumbai Suburban

Work from Office

Responsibilities: Collaborate with cross-functional teams on roadmap planning, development & execution Lead product strategy, roadmap, timeline management & execution Ensure customer satisfaction through timely and planned delivery & quality products

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

hyderabad, telangana

On-site

The Associate Technical Security Specialist plays a critical role in supporting cybersecurity operations by implementing technical security controls, monitoring security events, and ensuring compliance with company contractual and regulatory obligations. This role focuses on operational information security tasks, responding to information security incidents, and continuously improving information security processes to protect the managed information and technical assets. Key Responsibilities Information Security Operations & Incident Response: Monitor information security alerts and logs using XDR and other security tools. Investigate potential information security incidents, escalate critical issues, and support information security incident response processes. Endpoint, Cloud, and Network Security: Assist in managing security controls for endpoints, cloud services, and network environments. Support security hardening initiatives to reduce risks. Email Security Gateway & Anti-Phishing: Manage and optimize email security solutions to prevent phishing, malware, and spam attacks. Work on email filtering policies, domain security (DMARC, DKIM, SPF), and respond to email-based threats. Vulnerability & Patch Management: Perform routine security assessments to identify vulnerabilities and misconfigurations. Work with IT teams to prioritize and implement security patches and updates. Threat Intelligence & Risk Mitigation: Analyze emerging threats and recommend proactive security measures. Assist in conducting risk assessments and security reviews of new technologies and processes. Compliance & Security Governance: Assist in maintaining security policies and ensuring compliance with contractual regulatory requirements (ISO 27001, GDPR, HIPAA, etc.). Support audits and security assessments. Security Awareness & Training: Promote cybersecurity awareness by assisting with security training sessions and phishing simulations. Support internal teams with security best practices. Functional Competencies (Technical knowledge/Skills) - Strong understanding of cybersecurity frameworks (ISO 27001, NIST, CIS Controls). - Experience with XDR, firewalls, endpoint security, and cloud security solutions. - Familiarity with Email Security Gateways (Proofpoint, Mimecast, etc.) and anti-phishing technologies. - Basic knowledge of penetration testing and vulnerability scanning tools. - Hands-on experience with IAM and access control mechanisms. - Understanding of regulatory and compliance requirements in cybersecurity. - Strong analytical skills with attention to detail. - Good communication and collaboration skills to work across teams. Experience, Education, and Certifications - 3-5 years of experience in cybersecurity operations or security administration. - Bachelors degree in Cybersecurity, Information Technology, or a related field. - Certifications such as CompTIA Security+, CEH, or equivalent preferred. - Experience working with email security solutions and incident response processes. - Knowledge of cloud security in AWS, Azure, or GCP is an advantage. Note: This role has working shifts from 02:00 PM IST - 11:00 PM IST.,

Posted 1 month ago

Apply

8.0 - 12.0 years

0 Lacs

karnataka

On-site

As a Principal Engineer, IT & Cloud Security, you will bring specialized expertise in Cloud Security and Risk Governance. Your role involves leading strategic security initiatives and ensuring best practices implementation across the organization. Your analytical mindset, ability to lead complex projects, and deep understanding of enterprise security frameworks will be crucial. You will drive security improvements independently, offering strategic recommendations to address internal and external business challenges. As a thought leader in security, you will collaborate with cross-functional teams to enhance the company's security posture, influencing technology, processes, and risk management. Your responsibilities include facilitating technical discussions with external vendors, ensuring accountability for performance, and optimizing security tools organization-wide. Your insights will significantly impact security strategy, operational excellence, and risk mitigation on a global scale. Reporting to the Director, Digital Security Engineering, you will guide a Cloud Security Analyst position and lead cross-functional teams on security initiatives and projects with moderate resource requirements, risk, and complexity. Key Responsibilities: - Drive the company's Cloud Security strategy in alignment with industry best practices. - Enhance the risk governance framework for Cloud Security, defining KPIs and reporting metrics. - Assess, analyze, and mitigate complex security risks independently. - Lead security-related projects with cross-functional teams, ensuring effective collaboration. - Manage and evaluate external security vendors for licensing, service quality, and accountability. - Provide strategic guidance to business and IT teams, identifying innovative solutions for business challenges. - Communicate complex security concepts to stakeholders and negotiate best practices adoption. - Ensure effective operation and maintenance of security tools, identifying improvement opportunities. Requirements: - Bachelor's degree or equivalent qualification. - 8+ years of Cyber Security experience, preferably in a global organization. - Expertise in Risk Governance and Cloud Security, including AWS, Azure, or GCP. - Knowledge of Endpoint Security, Application Security, and Network Security. - CISSP certification required. - Experience managing external security vendors and influencing leadership decisions. - Project leadership experience with cross-functional teams. - Excellent communication skills for technical and non-technical stakeholders. - Strong problem-solving and prioritization skills. Nice to Have: - Additional security certifications (e.g., CISM, CCSP, ISO 27001 LI, OSCP). - Hands-on expertise with Cisco and CrowdStrike security solutions. - Experience in enterprise security architecture and cloud-native security solutions. Eligibility: - Willingness to travel up to 5%, domestic only or domestic and international travel. Benefits: - Flexible work environment with remote work options. - Employee discounts on Harman and Samsung products. - Extensive training opportunities through HARMAN University. - Competitive wellness benefits. - Tuition Reimbursement. - Access to HARMAN Campus Fitness Center and Cafeteria. - Inclusive and diverse work environment encouraging professional and personal development.,

Posted 1 month ago

Apply

4.0 - 8.0 years

0 Lacs

haryana

On-site

You will provide tier two operational support, leading team efforts in resolution of incidents and outages for information security technology and its dependencies on Public and Private Cloud computing environments, shared platforms, and operating systems for more than three of the following technologies: Malware Analysis, SIEM (Splunk), Software-defined (Cloud) Network Security, Endpoint Security Protection, and Data Loss Prevention. You will ensure the team's adherence to SOPs, training, and performance monitoring for team members, and continuous process improvement for efficiency, including automation, wherever applicable. You will conduct recurring assessments of all the key SOC workflows to highlight process deficiencies as well as improvement opportunities for staff. Additionally, you will partner with other technology teams in handling and responding to internal customer issues, conducting problem analysis, providing solutions for service level improvements, and ensuring timely remediation of security issues in accordance with corporate policies and standards. You will execute daily security technology administration functions, perform Root Cause Analysis (RCA) on applicable technology, validate the quality of dashboards and alerts, and suggest updates to reflect new threats and changes in the monitored environment. Furthermore, you will support the Security Operations team in its efforts on various technology projects and operational initiatives, work as a part of a team to ensure that Guardian customers" data, technology platforms, and infrastructure are available and safeguarded from cyber threats. You will follow ITIL practices regarding incident, problem, and change management, stay up to date with emerging cyber threats, industry best practices, and applicable regulatory requirements. Required Qualifications: - Being curious and having a desire to analyze anomalies - Desire and passion to learn and grow in Cybersecurity - Customer-focused demeanor - Minimum 4-6 years of proven experience in building and operating security controls in at least two of the following domains: Network/Perimeter Security, Enterprise Endpoint Security, DLP and Secure Data Transmission, Storage, and Access, Identity and Access Management / User Behavior Analytics - Understanding of security architecture, operating, and troubleshooting principles of Microsoft Windows and Linux operating systems - Strong experience in SIEM management, Endpoint security, Security incident handling, Data Loss Prevention, Threat intelligence, Team management, Documentation, Collaboration, and Continuous improvement - Bachelor's degree in computer science or a related field, along with relevant certifications such as CISSP, CISM, or CEH - Strong leadership skills, analytical skills, attention to detail, and the ability to work well under pressure - Ability to effectively work in a team and as an independent contributor on select projects Preferred Qualifications: - Recognized Security Industry and Public Cloud IaaS certifications - Familiarity with security industry standards and best practices - Familiarity with ITIL; experience with incident, problem, change, and risk management Location: This position can be based in Gurgaon.,

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

kolkata, west bengal

On-site

The role is based in Bengaluru, Kolkata and is a part of Grant Thornton, a global organization with 62,000 people across 135 countries. Grant Thornton LLP is the U.S. member firm of Grant Thornton International Ltd. with revenues exceeding $1.87 billion. Grant Thornton operates 58 offices in the U.S., with 623 partners and over 10,000 employees in the United States and in Bangalore and Kolkata, India. GT INDUS, the in-house offshore center for GT US, based in Bangalore, consists of over 2000 professionals in Tax, Audit, Advisory, Client Services, and Enabling functions. The culture at GT INDUS is focused on empowered people, bold leadership, and distinctive client service. It offers a transparent, competitive, and excellence-driven environment with opportunities for significant contributions and growth. The professionals at GT INDUS are actively involved in community service initiatives. The Cyber Risk Advisory practice at Grant Thornton provides risk management consulting and advisory services to clients. This role involves engagement planning, directing, and completion of Security Framework assessment, GRC Management, Third Party Risk Assessment, and Information Security architectural design. The responsibilities include working on audit engagements from beginning to end, developing and supervising other engagement staff, and assisting in client management and practice development activities. The ideal candidate should have a working knowledge of cybersecurity industry best practices, project management experience, and the ability to communicate security technology issues effectively to clients at all levels. Desired skills for this position include supporting engagement management, fieldwork documentation, training team members, attending professional development sessions, and staying updated on cybersecurity trends and risks. The candidate should hold a Bachelor's and/or Masters degree in Information Technology, Computer Science, or a related field. Preferred certifications include Certified Ethical Hacker (CeH v9 & above), CISSP, OSCP. Grant Thornton INDUS offers various benefits to full-time employees including insurance benefits, wellness programs, parental support, mobility benefits, retirement benefits, and a hybrid work model. Grant Thornton INDUS comprises GT U.S. Shared Services Center India Pvt Ltd and Grant Thornton U.S. Knowledge and Capability Center India Pvt Ltd, supporting the operations of Grant Thornton LLP. Established in 2012, Grant Thornton INDUS employs professionals across disciplines to seamlessly support U.S. engagement teams, increase access to talent, and improve operational efficiencies. The culture at Grant Thornton INDUS is driven by empowered people, bold leadership, and distinctive client service, emphasizing transparency, competitiveness, and excellence.,

Posted 1 month ago

Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

As a Senior Security Services Architect at NTT DATA, you will be utilizing your advanced expertise to design competitive, secure, multi-year Managed Services solutions in the security technology domain. Your role will involve close collaboration with clients, sales, and delivery teams to co-create value and drive digital transformation outcomes. You will have the opportunity to innovate and customize solutions for cutting-edge global organizations, ensuring alignment with both business and technology requirements. Your responsibilities will include orchestrating the development of secure, multi-year service solutions, integrating technology and service design within the security domain. Working across multiple teams, you will design, test, and validate new features and delivery models to enhance Managed Service offerings, thereby staying competitive and mitigating risks. Engaging with clients, you will map their requirements, lead end-to-end solution development, and support sales teams in presenting architecture solutions. Your expertise in security will be crucial in driving discussions around cost savings and growth opportunities to ensure solutions meet client needs and market conditions. A key aspect of your role will be to ensure that service design deliverables align with commercial models by working closely with technical, service, and costing stakeholders. You will guide the transition to service delivery teams, ensuring a seamless handover and maintaining high levels of client satisfaction throughout the project lifecycle. In addition to designing solutions, you will provide coaching and mentorship to team members, sharing knowledge of emerging trends and best practices in security. Vendor management and accurate recording of service costs will also be under your responsibility to promote a collaborative and innovative team environment. To excel in this role, you should possess: - Advanced proficiency in Security Managed Services, covering network security, cloud security, endpoint security, IAM, and data protection. - Strong understanding of Managed Services service and delivery models, including cloud, global, and distributed models. - Up-to-date knowledge of emerging technology trends, Managed Services integration, and security. - Strong analytical abilities for assessing and analyzing data and input effectively. - Effective communication skills to articulate potential improvements and value to stakeholders, including senior decision-makers. - Experience in facilitating workshops with clients and internal teams to discover requirements and present solutions. - Ability to collaborate within a team, especially in a matrixed organization. - A Bachelor's degree in information technology/systems or a related field. Workplace type: Hybrid Working About NTT DATA: NTT DATA is a trusted global innovator of business and technology services, with a commitment to helping clients innovate, optimize, and transform for long-term success. With a focus on investing in research and development, NTT DATA aims to support organizations and society in confidently moving into the digital future. As a Global Top Employer, NTT DATA has diverse experts in over 50 countries and a robust partner ecosystem. The services offered include business and technology consulting, data and artificial intelligence solutions, industry-specific services, as well as application, infrastructure, and connectivity development, implementation, and management. NTT DATA is also a leading provider of digital and AI infrastructure globally, part of the NTT Group, and headquartered in Tokyo. Equal Opportunity Employer,

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SailPoint Identity Mgmt and Governance. Experience: 8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: F5 Load Balancers. Experience: 8-10 Years.

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies