Jobs
Interviews

830 Endpoint Security Jobs - Page 14

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 10.0 years

12 - 17 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Fortinet Firewall. Experience: 8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Azure Cloud Workload Security. Experience: 8-10 Years.

Posted 1 month ago

Apply

4.0 - 8.0 years

15 - 17 Lacs

Pune

Hybrid

About Client Hiring for One of the Most Prestigious Multinational Corporations! Job Description Job Title: Endpoint security Engineer Required skills and qualifications : Endpoint MS defender Qualification : Any Graduate or Above Relevant Experience :4+ yrs Location : Pune CTC Range : 15 to 17 LPA (fixed) Notice period : immediate joiners /Currently serving Mode of Interview : Virtual Mode of Work : Hybrid If you are interested share the below: Name as per your pan card: Mobile No: Email ID: Current and perferred location: Current and Expected CTC: Total and Relevent Experience: Official notice period: (if serving/immediate - LWD) Gayatri G Staffing analyst - IT recruiter Black and White Business solutions PVT Ltd Bangalore, Karnataka, INDIA gayatri@blackwhite.in / www.blackwhite.in +91 8067432430

Posted 1 month ago

Apply

0.0 - 4.0 years

5 - 6 Lacs

Mumbai

Work from Office

Level 1 Engineer (L1) Endpoint Security, Mumbai ROLE AND CONTEXT NEED TO DO NEED TO KNOW Purpose: The job holder is responsible to provide frontline support and administration for endpoint security solutions, primarily McAfee ePO, ensuring effective threat detection, incident response, and system health across the organization s IT infrastructure. Main Priorities: Administer and maintain McAfee ePO platform and endpoint policies. Monitor and respond to malware threats and security incidents. Support patch management and system health checks. Provide technical support for Windows OS and endpoint security tools. Key Outputs: Configured and updated antivirus policies and scan schedules. Timely detection and resolution of malware incidents. Regular reports on endpoint security posture and compliance. Updated patch levels and system health status across endpoints. Documented troubleshooting steps and support resolutions. Relationships: Internal Operations External UBI Reportees: Not available Key Performance Metrics: Endpoint coverage and compliance rate. Number of incidents detected and resolved. Timeliness of patch deployment and antivirus updates. System health and performance metrics. Accuracy and completeness of reporting and documentation. Qualifications: Graduate or Diploma in Information Technology, Computer Science, or related field. Skills/ Knowledge: Proficiency in Windows Operating Systems. Hands-on experience with McAfee ePO platform. Basic troubleshooting of endpoint security solutions. Familiarity with enterprise patch management tools. Knowledge of malware detection, policy enforcement, and incident response. Certifications (if any) : Preferred: CEH (Certified Ethical Hacker) Experience (add relevant Exp also) Minimum 2 years in Information Security. Experience in SOC environment preferred, especially with Splunk.

Posted 1 month ago

Apply

3.0 - 6.0 years

6 - 11 Lacs

Pune

Work from Office

Some careers shine brighter than others. If you re looking for a career that will help you stand out, join HSBC and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further. HSBC is one of the largest banking and financial services organisations in the world, with operations in 64 countries and territories. We aim to be where the growth is, enabling businesses to thrive and economies to prosper, and, ultimately, helping people to fulfil their hopes and realise their ambitions. We are currently seeking an experienced professional to join our team in the role of Endpoint Security - Consultant Specialist. In this role, you will: Perform 3rd Line Support of the Endpoint protection products/ technologies. Work with team members, other IT departments and vendors to ensure security products are up to date and compliant. Plan and manage projects to implement new or upgrade existing security services. Interpret security policies to ensure that final designs are compliant. Create centralised global reporting to prove adherence to compliance policies. Manage/Support Vendor Relationships where required. Work in shifts and weekend on call support via team rota. Mandate to take shift and on call in turn with teammates. Requirements 5 Yr+ Experience in Windows Protection tools - Trellix Endpoint Protection, Trellix Agent, Drive Encryption, Device Control, Windows Defender, Microsoft Bitlocker and Zero Day Anti Malware protection. Trellix ePO Configuration and contingency planning. Knowledge of Windows 10/11, Windows Server 2008/2012/2016/2019, Active directory and GPO Proven experience supporting Windows Desktop or Server Operating systems to an intermediate level of technical expertise including good technical design and implementation skills. Proven ability to adapt and learn new technologies quickly. Find logical solutions to problems and manage to resolution. A good understanding of service management techniques, including change management and incident management. Good communication and interpersonal skills. Proven ability to prioritise competing demands. Third Party vendor relationship management A flexible approach to working. Proficient in English language. A strong desire to self-develop.

Posted 1 month ago

Apply

5.0 - 10.0 years

5 - 15 Lacs

Kolkata, Chennai

Work from Office

Position: Presales Engineer (Strong Technical knowledge of Cyber Security Threats, Endpoint Security, EDR / XDR, MDM, ZTUA / ZTNA, DLP, Data Privacy solutions & Network Security solutions). Experience: 5+ Year Job Description Develop a deep understanding of cybersecurity products and solutions offered by Seqrite. Stay updated on industry trends, emerging threats, and advancements in cybersecurity technologies Deliver compelling and persuasive presentations to clients, showcasing the benefits and features of our cybersecurity solutions. Conduct product demonstrations and simulations to illustrate the effectiveness of our solutions. Meet or exceed monthly, quarterly, and annual sales targets and quotas set by the organization by providing full Technical assistance to Sales Team. Initiate and maintain proactive communication with prospective clients. Conduct initial discovery calls to understand client requirements and pain points. Build and maintain strong relationships with potential customers, fostering trust and confidence in our solutions. Collaborate with the sales team to deliver compelling and customized presentations, demonstrating how our solutions meet the specific security requirements of potential clients. Conduct product demonstrations sessions to showcase the effectiveness of our solutions, addressing client concerns and objections. Coordinate and conduct product demonstrations and proof of concepts for potential clients. Manage POC projects from initiation to successful completion, ensuring customer satisfaction. Provide valuable feedback to the organization regarding market trends, client needs, and competitive positioning. Work closely with the sales, marketing, and technical teams to ensure a unified approach to client engagement. Provide feedback from clients to inform product development and improvements. Provide training sessions to clients & Partners for Seqrite solutions. Prepare and maintain detailed records of client interactions and opportunities in the CRM & SharePoint Trackers. Generate reports and analysis to track the progress of presales activities and identify areas for improvement. Analyze competitor solutions and market trends to position our products effectively. Differentiate our offerings by highlighting unique features and benefits. Required Skills: Strong Technical & Communication skills to effectively communicate with Customers & Partners. Strong Technical knowledge of Cyber Security Threats, Endpoint Security, EDR / XDR, MDM, ZTUA / ZTNA, DLP, Data Privacy solutions & Network Security solutions. Focuses on Understanding desired outcomes and showing value for Seqrite Partners & Customers. Develop a deep understanding of our products and services. Provide technical expertise to clients and answer their questions regarding our solutions. Excellent verbal and written communication skills to articulate cybersecurity solutions to clients in a clear and understandable manner. Active listening skills to understand client needs and propose solutions accordingly. Collaborate with the sales team to understand client requirements and objectives. Conduct in-depth consultations with clients to identify cybersecurity challenges and pain points. Willingness to travel as needed to meet with clients and attend industry events. Proficiency in using CRM software to manage leads, opportunities, and customer interactions throughout the sales process. Comfortable with learning and presenting technical information about cybersecurity products and services. Collaborative mindset to work effectively with cross-functional teams, including marketing, product, sales, and technical teams.

Posted 1 month ago

Apply

6.0 - 11.0 years

15 - 20 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats. Do Design and develop enterprise cyber security strategy and architecture Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses Identify risks associated with business processes, operations, information security programs and technology projects Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge Identify security design gaps in existing and proposed architectures and recommend changes or enhancements Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. Provide support during technical deployment, configuration, integration and administration of security technologies Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity Provide solution of RFPs received from clients and ensure overall design assurance Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture Depending on the clients need with particular standards and technology stacks create complete RFPs Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps Evaluate and recommend solutions to integrate with overall technology ecosystem Tracks industry and application trends and relates these to planning current and future IT needs Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers Provide training to employees on issues such as spam and unwanted or malicious emails Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Program Manager/Director Regular reporting & updates Infrastructure (CIS team) For infrastructure support External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively: Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming security technologies (e.g. Firewalls, IPS, DDoS, SIEM, WAF, Endpoint etc.) and understanding of compliance regulatory requirement like PCI DSS, HIPAA, etc.- Expert Systems Thinking - Understanding of the Wipro system (interrelatedness, interdependencies and boundaries) and perform problem solving in a complex environment - Expert Leveraging Technology - In-depth knowledge of and mastery over ecosystem technology that commands expert authority respect - Master Technical Knowledge - Certified Information Systems Security Professional (CISSP), Cloud Architect Certification from AWS and Azure, ToGAF or SABSA certification- Master Competency Levels Foundation Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. Competent Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. Expert Applies the competency in all situations and is serves as a guide to others as well. Master Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. Behavioral Competencies Effective Communication Managing Complexity Client centricity Technology Acumen Innovation Problem Solving approach Collaborative Working Execution Excellence

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: IDAM Security Consulting. Experience: 8-10 Years.

Posted 1 month ago

Apply

1.0 - 5.0 years

3 - 7 Lacs

Chennai

Work from Office

Required Skills Behavioral | Aptitude | Communication Technology | Hardware and Networking | Installation, configuration, maintainance and repair Technology | Audio, Video support | Installation and configuration Technology | Windows Operating System | Installation, configuration and management Technology | End Point Security | Antivirus management, data encryption, DLP, desktop firewall, VPN, AD policies Education Qualification : Any Graduate Certification Mandatory / Desirable : Technology | Microsoft 365 Certified | Modern Desktop Administrator Associate 1) Field Services Support Engineers primary responsibility is to provide support to an organization s IT systems to help them meet their business goals, this is done by ensuring that all computers and networks operate efficiently with high uptime. 2) As a desktop engineer, you may need to assemble and install client desktop computers and assist the end-user in securing their hardware. 3) This role also involves hands feet support for various IT support teams to perform activities related to periodic maintenance to handling individual systems hardware, software, and network queries 4) To support daily technical support activities for computers all other end point devices. Update the support ticket with the progress, to set up and test desktop computer peripherals. 5) To perform the system changes adhered to organizational policies. 6) Conduct remote desktop troubleshooting to end user issues. Maintain technical documentation in association with other functional departments 7) Technical Skills a. Windows Operating System: b. Ability to Install and troubleshoot different versions of Windows OS independently. E.g. Windows XP. Windows 7, Windows 10 and Windows 11 c. Understanding of desktop applications and how do they work, installation uninstallation. d. Understanding of domain setup ability to add / remove computers to domain. update Group policies. carry out Disk management, Disk Encryption, Wireless configuration. check utilization and availability, ability to perform start up and shut down services by following SOP. deploy gold images on multiple desktops using SOP, Ability to install and configure client applications independently 8) In addition to above, support and perform below activities. a. Exchange and Mobility Clients b. Printer management c. Backup and Recovery d. Audio, Video support e. End Point Security/Patch Management f. Hardware and Networking

Posted 1 month ago

Apply

8.0 - 10.0 years

22 - 27 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do : 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Fortinet Firewall Experience : 8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

22 - 27 Lacs

Chennai

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do : 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Checkpoint Firewalls and VPN Experience : 8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

22 - 27 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do : 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: PKI - Certificate Management Experience : 8-10 Years.

Posted 1 month ago

Apply

5.0 - 10.0 years

9 - 13 Lacs

Hyderabad

Work from Office

Roles and responsibilities Assess & mitigate risks associated with DLP solution. Administration of the DLP tools which includes configuring policies and reporting. Monitor and respond to alerts generated from the DLP systems and other technologies. Communicate with stakeholders, data owners to plan, prepare and deploy DLP policies in production. Grow expertise in knowledge of best practices and standards for Data Protection. Monitor the use of the tools and ensure a consistent & continuous process of improvement taking an effect. Work with the DLP technology (troubleshooting, upgrades, identify new added features.) Collaborate with the business to identify improvements in existing technical models geared towards data protection. Identify gaps and weaknesses on current alerting platforms and recommend improvements to ensure evolving capabilities.Identify gaps and weaknesses on Data Loss Prevention platforms. Continually review existing risk scoring models and adjust accordingly to ensure proper focus on significant security events and business needs. Administrate of DLP solution and liaising with GRC & CISO function to configure policies and work on reporting, monitor and respond to different alerts generated from the DLP solution. Demonstrate a good understanding of incident response process and event escalations, repone to DLPs escalations reported by incident response team. Share recommendations to further identify sensitive data and strengthen security controls. Collaborate & partner with legal, compliance team to support customer privacy initiative and continue compliance with different regulations, to mature company data life cycle management with focus on data security. Ability to independently research and solve technical issues and Demonstrated integrity in a professional environment. Qualifications Supporting Information Security Technology At least 5 years of experience in the following: Information Security concepts related to Governance, Risk & Compliance Data Loss Prevention (DLP) Technology Implementation, support and Event Handling and triaging process Administration of the DLP tools which includes configuring policies and reporting. Subject matter expert or lead experience Strong analytical skills to identify complex security issues and respond at the same level with a technical understanding of when to escalate impacting data security events. Possess functional knowledge and administrative experience on Windows and MAC endpoints. Proven effective verbal and written communication skills.

Posted 1 month ago

Apply

8.0 - 10.0 years

10 - 12 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: PKI - Certificate Management. Experience: 8-10 Years. >

Posted 1 month ago

Apply

7.0 - 12.0 years

9 - 17 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails

Posted 1 month ago

Apply

8.0 - 10.0 years

10 - 12 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Threat Protection. Experience: 8-10 Years. >

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: IDAM Security Consulting. Experience: 8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Chennai

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: IDAM Security Consulting. Experience: 8-10 Years.

Posted 1 month ago

Apply

7.0 - 12.0 years

12 - 17 Lacs

Ahmedabad

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: IDAM Security Consulting. Experience: 8-10 Years.

Posted 1 month ago

Apply

1.0 - 4.0 years

7 - 9 Lacs

Hyderabad, Chennai

Work from Office

Role Overview: The Cybersecurity Analyst plays a critical role in real-time threat detection , incident triage , and response coordination as part of the 24x7 Security Operations Center. Location: Chennai and Hyderabad Rotational 24*7 shift Immediate - 10days Joining preffered. Requirements: Execellent Comm skills. Experience in SOC operations or network security. Proficiency in SIEM, endpoint protection tools, firewalls , and basic scripting. Familiar with TCP/IP, networking protocols, and cyber threat landscape. Willingness to work in rotational shifts , including nights and weekends. Certifications like Security+, CEH, or CompTIA CySA+ are a plus.

Posted 2 months ago

Apply

4.0 - 9.0 years

5 - 10 Lacs

Ahmedabad

Work from Office

We are seeking an experienced and proactive Senior Cyber Security Specialist (SOC Analyst L3) to strengthen our Security Operations Center (SOC) capabilities. This role demands deep expertise in threat hunting , incident response , and digital forensics , with a proven ability to operate independently while confidently engaging with clients. The ideal candidate will play a critical role in identifying, analyzing, and mitigating cyber threats to ensure enterprise security posture. Key Responsibilities: Conduct proactive threat hunting across network and endpoint environments using SIEM, EDR, and threat intelligence platforms. Identify and analyze Indicators of Compromise (IOCs) and adversary Tactics, Techniques, and Procedures (TTPs) . Perform incident response activities , including triage, containment, investigation, remediation, and recovery. Execute forensic analysis on compromised Windows and Linux systems to determine root cause and impact. Coordinate with SOC, IT, and business teams during high-severity security events and ensure effective communication. Develop and fine-tune detection rules, correlation logic, and incident response playbooks . Leverage frameworks such as MITRE ATT&CK and integrate threat intelligence to enhance detection and defense capabilities. Generate detailed incident reports, RCA documentation , and post-incident recommendations. Act as a subject matter expert (SME) for security operations and mentor junior analysts. Required Skills & Qualifications: 4 - 6 years of hands-on experience in SOC operations , threat hunting , and incident response . Proven ability to work independently and handle client interactions with professionalism and confidence. Strong knowledge of networking concepts , Windows OS , and Linux OS internals. Proficiency in using SIEM tools (e.g., Splunk, QRadar, Sentinel) and EDR solutions (e.g., CrowdStrike, Carbon Black, Defender). Deep understanding of cyberattack lifecycles , threat vectors, and advanced persistence mechanisms. Solid grasp of MITRE ATT&CK , cyber kill chain , and threat modeling methodologies. Experience in forensic tools and techniques for memory, disk, and network forensics. Excellent analytical , problem-solving , and communication skills (both verbal and written). Certifications: Mandatory: CEH, E|CIH, or equivalent Preferred: GCFA, CHFI, GCIH, or other advanced cybersecurity certification

Posted 2 months ago

Apply

2.0 - 3.0 years

4 - 6 Lacs

Hyderabad, Navi Mumbai

Work from Office

Position: Technical Executive Experience: 1-3 Years Industry: IT / Computer Hardware / Network Security Qualification: B.Tech / M.Tech / MBA (IT) / MCA Company Website: www.satcominfotech.com Job Description: We are looking for a dynamic and technically proficient individual to join our team as a Technical Executive. The ideal candidate will be responsible for supporting our partners and customers through demonstrations, training, and technical implementations across our product portfolio. Key Responsibilities: 1. Conduct Proof of Concepts (POCs), product demonstrations, and implementation for partners and customers. 2. Provide technical training and enablement to partners. 3. Offer technical support to both partners and end customers. 4. Engage in regular meetings with partner sales teams to promote the Satcom product portfolio. 5. Handle and manage sales lead cases effectively. 6. Onboard and enable new partners for business growth. 7. Conduct webinars and technical presentations to support partner sales initiatives. 8. Collaborate closely with cross-functional teams to ensure smooth deployment and support. Technical Requirements: In-depth knowledge and hands-on experience in Network Security / Cyber Security. Practical expertise in configuring and managing Firewalls and Networking devices. Preferred experience with leading security vendors and products. Fluency in local language(s) will be an added advantage. Candidate Preferences: Candidates with exclusive SOC monitoring or help desk roles will not be considered. Applicants from large service-based organizations such as TCS, Wipro, Infosys, etc. are not preferred, as we are seeking candidates with more hands-on and customer-facing experience in cybersecurity.

Posted 2 months ago

Apply

6.0 - 10.0 years

25 - 32 Lacs

Bengaluru

Work from Office

Hiring Cyber Security Specialist-Operational Technology in Automotive Co. Experience of Endpoint tools,Endpoint Security Mgt S/W, SSL Cert knowledge Knowledge of Security technologies,principles & best practices(Proxy, EDR, ATP, DLP, CASB, ZTNA, AM).

Posted 2 months ago

Apply

3.0 - 4.0 years

9 - 10 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

About Us At SentinelOne, we re redefining cybersecurity by pushing the limits of what s possible leveraging AI-powered, data-driven innovation to stay ahead of tomorrow s threats. From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We re looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you re excited about solving complex challenges in bold, innovative ways, we d love to connect with you. What are we looking for SentinelOne is seeking a passionate and dedicated Support Engineer to join our rapidly growing Technical Support organisation. This person will be the key interface between our customers, field engineers and development, and handle customer cases on a variety of platforms, including Windows, Mac, and Linux. What will you do Provide grade A support for our growing Enterprise customers base in the EMEA / APAC region Lead burning escalations from end to end while owning all of the technical and managerial aspects of the issue Investigate thoroughly diving deep into the source code, together with our all-star R&D team to provide a detailed root cause analysis to our customers Work closely with Product management acting as the customers advocate What experience or knowledge should you bring Bachelor degree in a technical field preferred Minimum three years experience in customer support or a customer-facing technical role Proficient in Windows, Mac, and/ or Linux Network/Endpoint Security background Excellent customer-oriented individual, strong problem-solving and troubleshooting skills Excellent written and verbal communication skills in English (other languages are a plus) Independent, responsible result driven team player Why us You will be joining a cutting-edge company where you will tackle extraordinary challenges and work with the very best in the industry. Health Insurance Industry-leading gender-neutral parental leave Paid Company Holidays Paid Sick Time Employee stock purchase program Employee assistance program Gym membership Cell phone/wifi allowance Numerous company-sponsored events, including regular happy hours and team-building events

Posted 2 months ago

Apply

5.0 - 10.0 years

1 Lacs

Chennai, Bengaluru

Hybrid

The Position The Account Manager is responsible for managing client retention cycles and executing account retention and growth plans to exceed targets in assigned accounts and regions. This position will be located in our Bangalore, India . Your responsibilities will include the development and implementation of account retention and expansion plans to secure deployments of our Cybersecurity product. You will build the right relationships inside target accounts, know how to leverage your company resources to the fullest, and negotiate and close retention and growth opportunities. The ideal candidate will have previous work experience as a member of a corporate sales team, a career track record of exceeding sales quotas, and a drive to be a Captain in a collaborative selling environment. Candidates selling into critical infrastructure and data diode sales experience are given a preference. What You Will Be Doing Build and execute account retention plans for assigned accounts to reach gross and net retention goals. Set the pace in a collaborative sales environment. Help to coach and lead team members in the execution of retention plans. Understand each client's current value propositions and be able to speak intimately about their current and future needs and requirements. Develop trusted relationships with clients to protect ongoing revenue streams. Leverage Solution Engineers and Customer Success to drive regular account reviews with clients and provide strategies to maximize ROI. Effectively articulate financial ROI/TCO value and build value throughout the renewal negotiation process. Maintain extensive and accurate account and opportunity level detail in Salesforce CRM, including account retention plans, client engagement activities, sales inhibitors, etc. Leverage all cross-functional resources to achieve your retention quotas: including Executive management, Inside Sales Development, Customer Success, Field and Event Marketing, Sales Operations, and others. Forecast and report revenue projections to management and deliver a predictable pipeline to drive forecast accuracy. Overachieve on annual quota, measured quarterly. What We Need From You High proficiency in English. You have a minimum of 3 years successfully selling Cybersecurity products and solutions to businesses. You have a bachelors degree, preferably in a technical discipline or equivalent experience. You have a successful record of accomplishment managing mid-market accounts. You are comfortable working through structured retention cycles as well as developing and executing tailored account retention plans. You are self-motivated and have a passion to succeed and earn more responsibility. You have an innate passion to learn. We are constantly seeking to better understand each clients security position, needs, and strategies. You are an active listener and have excellent negotiation and presentation skills. You can effectively communicate with both technology-oriented and senior business executives and are comfortable articulating the technical and business value of the MetaDefender & MetaAccess platforms. Ability to set goals, prioritize tasks, and achieve success with minimal oversight. You keep your pipeline accurate, and your forecast updated for management. You possess a fundamental understanding of security threats, solutions, and security tools. You are highly competitive, ramp quickly, are extremely adaptive, and pride yourself on exceeding sales goals You are able to travel as necessary to your assigned accounts, and to Company meetings. Highly ethical and professional personal conduct.

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies