Jobs
Interviews

830 Endpoint Security Jobs - Page 18

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 8.0 years

4 - 9 Lacs

Mumbai, Navi Mumbai

Work from Office

Skills required for MS Defender: L2 MS Defender for Endpoints (EDR/ATP),Other Monitoring Tools Office 365,Active Directory, Microsoft Intune, Anti-Virus, Trend Micro

Posted 2 months ago

Apply

5.0 - 8.0 years

5 - 8 Lacs

Bengaluru

Work from Office

Job Description: Key Responsibilities: Mobile Device Management (MDM) - Intune (Primary Focus): - Configure, deploy, and manage iOS and Android devices using Microsoft Intune. - Create and maintain compliance policies, configuration profiles, app protection policies, and conditional access. - Manage mobile application deployment, updates, and lifecycle using Intune and Apple/Google enterprise tools. - Integrate with Apple Business Manager (ABM) and Android Enterprise for seamless device provisioning. - Monitor and troubleshoot device enrollment, policy application, and user access issues. - Endpoint Management - SCCM & Windows Intune (Secondary): - Support Windows 10/11 device management using Intune and SCCM. - Assist in co-management scenarios between SCCM and Intune. - Deploy and manage Windows updates, software packages, and compliance baselines. -Maintain SCCM infrastructure, including distribution points, collections, and reporting. Optional/Preferred: - Manage Samsung Knox EFOTA for firmware updates and policy enforcement on Samsung Android devices. - Automate tasks using PowerShell or Graph API for Intune and SCCM. - Collaborate with security teams to ensure endpoint compliance, data protection, and zero-trust policies. Required Skills & Qualifications: - 5-8 years of hands-on experience with Microsoft Intune and MDM for iOS and Android. - Strong understanding of mobile security, compliance frameworks, and conditional access. - Experience with SCCM for Windows device management and software deployment. - Familiarity with Apple Business Manager, Android Enterprise, and Knox Mobile Enrollment. - Good understanding of Azure AD, Endpoint Security, and Microsoft 365 ecosystem. - Strong troubleshooting documentation, and communication skills. Nice to Have: - Experience with Samsung Knox EFOTA. - Microsoft certifications (e. g. , MD-102, MS-102, SC-300). - Experience with PowerShell scripting or Graph API for automation At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We re committed to fostering an inclusive environment where everyone can thrive. Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .

Posted 2 months ago

Apply

5.0 - 9.0 years

0 Lacs

haryana

On-site

As a Support & Network Administrator, you will be responsible for managing and maintaining IT infrastructure to ensure seamless network operations and user support. With over 5 years of experience in the IT field, you will play a crucial role in the IT department. In terms of Network & Server Management, you will oversee the monitoring and maintenance of LAN, WAN, and VPN networks. This includes configuring network devices such as routers, switches, and firewalls, ensuring network security through firewalls and access controls, and troubleshooting connectivity issues to optimize performance. Additionally, you will be in charge of managing and backing up company servers. Your role will also involve providing Desktop/Laptop & IT Support, where you will offer technical assistance for Windows/macOS/Linux desktops and laptops. This includes installing, configuring, and updating hardware, software, and operating systems, resolving hardware/software issues promptly, and maintaining endpoint security with antivirus and patch management. Furthermore, you will assist employees with IT-related problems and maintain IT documentation for reference. In managing Wi-Fi & Telephone Services, you will oversee corporate Wi-Fi networks to guarantee secure and reliable connections. You will troubleshoot Wi-Fi connectivity problems, improve performance, and manage telephone systems, including VoIP and PBX configurations. Collaboration with service providers for internet and telecom-related matters will also be part of your responsibilities. This full-time permanent position offers benefits such as health insurance and Provident Fund, with a day shift schedule. As part of the application process, you will be required to share your relevant experience in the IT field, current CTC, expected CTC, and confirm your willingness to work in Gurgaon. The work location is in person, requiring your presence on-site to fulfill your duties effectively.,

Posted 2 months ago

Apply

7.0 - 10.0 years

7 - 10 Lacs

Noida

Work from Office

Job Title: Sr. Office 365 Support Specialist Business Function/Sub Function: IT Infra & Operation Location: Noida, India Position Overview: We are looking for a highly accomplished IT Infrastructure, Operations, and ITSM Specialist to join the GEDU IT Infra & Operations Team at our Noida office. This role requires a dynamic professional with expertise in IT infrastructure, operations, network support, and IT service management, along with hands-on experience in Microsoft Azure, Office 365, and endpoint security solutions. The ideal candidate should have a strong technical background, proven leadership skills, and a user-centric approach. They will be responsible for leading IT support teams, ensuring the stability and security of IT infrastructure, and driving operational excellence. Working across multiple time zones as per business needs, they will collaborate with product managers, architects, and R&D teams to enhance IT services and align technology strategies with business objectives. This role demands a proactive mindset, the ability to manage critical IT projects, and a focus on continuous improvement, automation, and security compliance. If you are passionate about delivering seamless IT experiences, driving innovation, and building robust IT operations, we encourage you to apply. Key Responsibilities: IT Operations Management Oversee the design, implementation, and maintenance of IT infrastructure, including cloud, on-premises and hybrid environments. Manage Azure Active Directory, Entra ID, Office 365, and endpoint security solutions to ensure seamless IT operations. Monitor system performance, availability, and security to proactively address potential risks and minimize downtime. Ensure effective backup, disaster recovery, and business continuity planning for IT services. IT Service Management (ITSM) & Support Lead incident, problem, change, and service request management in alignment with ITIL best practices. Establish and enforce ITSM processes and SLAs to ensure prompt and effective resolution of IT issues. Maintain and update ITSM documentation, including SOPs, knowledge base articles, and system documentation. Collaborate with cross-functional teams to enhance service efficiency and user experience. Security, Compliance & Identity Management Implement and manage security baselines, compliance policies, and endpoint security solutions (e.g., Microsoft Defender, Purview). Oversee Multi-Factor Authentication (MFA), Single Sign-On (SSO), and Privileged Identity Management (PIM) for enhanced security. Ensure compliance with global security standards and regulatory requirements. Manage Zero Trust principles and enforce security hardening practices. Team Leadership & Vendor Management Lead and mentor a team of IT support engineers, ensuring high performance and continuous skill development. Manage relationships with third-party vendors and service providers, ensuring SLA adherence and prompt resolution of escalations. Drive collaborative problem-solving and knowledge sharing across the IT team. Automation & Process Optimization Develop and automate IT workflows using PowerShell scripting and Microsoft Graph API. Continuously optimize IT processes and drive innovation to improve operational efficiency. Identify opportunities to reduce manual effort and enhance self-service capabilities. Project & Stakeholder Management Manage IT infrastructure projects, upgrades, and migrations based on business requirements. Collaborate with business leaders, product managers, and R&D teams to align IT strategies with organizational goals. Provide regular reports and insights on IT performance, risks, and improvement plans. Qualifications: Bachelors degree in computer science, Information Technology, Engineering, or a related field. Masters degree in IT Management or related disciplines is a plus. Professional Certifications (Preferred but not mandatory): Microsoft Certifications : Microsoft Certified: Azure Administrator Associate (AZ-104) Microsoft Certified: Identity and Access Administrator (SC-300) Microsoft 365 Certified: Modern Desktop Administrator Associate IT Service Management (ITSM) & Security Certifications : ITIL v4 Foundation (or higher) for ITSM best practices CompTIA Security+ or CISSP for security management Networking Certifications : Cisco CCNA/CCNP, Aruba, or Arista networking certifications are a plus Work Experience: 7 to 10 years of experience in Office 365 Administrator, Operations, ITSM, and Cloud Administration. Hands-on experience in Microsoft Azure, Office 365, Entra ID, Intune, and Endpoint Security. Strong knowledge of ITIL processes, service management tools, automation, and PowerShell scripting. Proven experience in leading IT support teams, managing IT projects, and collaborating with cross-functional teams. Key Skills & Competencies: Deep expertise in cloud, hybrid IT environments, and IT service management. Strong problem-solving skills and the ability to troubleshoot complex technical issues. Excellent communication, leadership, and stakeholder management skills. Ability to work across different time zones as per business needs. Strong analytical mindset, with a focus on continuous improvement and automation.

Posted 2 months ago

Apply

5.0 - 10.0 years

1 - 2 Lacs

Thane

Work from Office

Role & responsibilities We are seeking a skilled and proactive IT Administrator to join our global IT operations team. This role is based in India and will support our international offices in Asia and Africa, and the parent company in Germany. The ideal candidate will be responsible for maintaining and improving IT infrastructure across these locations and must be open to frequent international travel. Provide day-to-day IT support for users across multiple international offices. Maintain and troubleshoot network infrastructure, servers, and endpoint devices. Coordinate with local and global teams to ensure system reliability and security. Manage software deployments, updates, and license compliance. Support onboarding/offboarding processes and user access management. Travel to supported countries and the parent company in Germany for on-site support and project implementation Proven experience as an IT Administrator or similar role. Strong knowledge of Windows systems, networking, and Azure cloud services. Excellent troubleshooting and communication skills. Ability to work independently and manage multiple priorities across time zones. Willingness and ability to travel internationally on a regular basis. Fluency in English (spoken and written). Preferred candidate profile Bachelors degree in information technology /computer science, Computer applications and specialized in network, cloud data Experience working in multicultural and international environments. Familiarity with cybersecurity best practices. Certifications such Microsoft Certified: Azure Administrator, or simila

Posted 2 months ago

Apply

5.0 - 10.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Job Details: The Staff Cyber Security Engineer in the Information & Cyber Security job family are highly experienced professionals who contribute to designing, implementing, and managing advanced security solutions. They work on complex security projects, provide technical leadership and mentorship to team members, and help ensure the organizations security posture is robust. The Staff Cyber Security Engineer collaborates with senior stakeholders to define security strategies and drive continuous improvement in security practices. Essential Duties and Responsibilities: Advanced Security Architecture: Contribute to designing and implementing advanced security architectures to protect the organizations digital assets and infrastructure. Security Audits: Conduct advanced security audits and assessments to ensure compliance with industry standards and regulatory requirements. Vulnerability Management: Oversee and manage advanced vulnerability assessments and testing, ensuring timely remediation of identified security weaknesses. Threat Intelligence: Analyze and disseminate advanced threat intelligence to inform security strategies and decision-making. Cross-Functional Collaboration: Collaborate with IT and other departments to integrate advanced security measures into various aspects of the organizations operations. Training and Awareness: Develop and deliver advanced training and awareness programs to educate employees on security best practices related to their subject matter expertise. Continuous Improvement: Drive continuous improvement in security measures by staying updated on the latest trends, technologies, and threats. Documentation: Ensure accurate and comprehensive documentation of security incidents, system configurations, and security policies. Compliance: Ensure compliance with relevant security standards, regulations, and frameworks. Risk Management: Conduct advanced risk assessments to identify potential security threats and vulnerabilities and develop mitigation strategies. Policy Development: Contribute to and enforce advanced security policies and procedures to ensure a secure operating environment. Perform other assigned job-related duties that align with our organizations vision, mission, and values and fall within your scope of practice. Qualifications: Education: Bachelor s, Masters Degree, or a significant amount of relevant experience. Computer Science, Information Technology, Cybersecurity, or a related field is preferred. Preferred Certification(s): Any relevant IT or Cyber Security Certification. Experience: 7+ years of relevant and practical experience. Special Skills: Required: Mastery in multiple advanced cybersecurity disciplines (e.g., network security, application security, endpoint security); Comprehensive knowledge of security frameworks (e.g., NIST, ISO 27001); Advanced technical writing and diagramming skills. Preferred: Extensive familiarity with a broad range of advanced cybersecurity tools and technologies; Significant experience with advanced security incident response and vulnerability management; Advanced proficiency in scripting and automation for security tasks. Soft Skills: Technical Leadership: Providing expert guidance on complex security solutions. Strategic Thinking: Aligning security measures with long-term business goals. Communication: Effectively conveying advanced security concepts to diverse audiences. Mentorship: Guiding and developing junior team members. Collaboration: Working with senior stakeholders to define security strategies. Analytical Skills: Conducting advanced risk assessments and threat analysis. Relocation Assistance Eligible: No Work Shift: Tyson is an Equal Opportunity Employer. All qualified applicants will be considered without regard to race, national origin, color, religion, age, genetics, sex, sexual orientation, gender identity, disability or veteran status.

Posted 2 months ago

Apply

4.0 - 9.0 years

6 - 8 Lacs

Ambattur

Work from Office

Greetings from Datamark!!! Position: Information Security Analyst Experience : 4 Yrs+ of Experience Location : Ambattur Position Overview: The Information Security Analyst is responsible for the administration of the organizations information and data security policies and practices of the overall internal security audit program to ensure that the Company is protected in terms of security, compliance and confidentiality. Primary Responsibilities: Coordinates and assists with security activities for the enterprise Operate, maintain, and validate vulnerability scanning of Infrastructure, Applications, and APIs Review daily threat intelligence. Ensures compliance to security standards for assigned sites Schedules and administers internal security audits for Client and Physical Site Audits Follows up on remediation plans Support the management and maintenance of security tools with an emphasis on Security Information and Event Monitoring (SIEM) tools. Assist with the review of technical deployments for risk prior to deployment across the campus. Recommends risk mitigation solutions based on audit findings Maintains Security and Compliance Metrics monthly Assists in the development and delivery of IT risk and security awareness and compliance training programs Willingness to travel to DATAMARK global sites as necessary Other duties as assigned Minimum Qualifications: Education Requirements: Bachelors degree in Computer Science or related field, experience in lieu of degree can be considered Field Experience: At least four years of experience in Information Security Position Experience: At least four years of experience in an Information Security Analyst position, or similar position Demonstrated experience with traditional vulnerability analysis: identify, categorize, prioritize, track, and validate remediation of known vulnerabilities by accountable IT teams Other Qualifications: Certification in IT Security required Knowledge in Information Security policies and practices Knowledge of third-party auditing and risk assessment methodologies Experience in an IT Security related environment preferred Required Skills: Extremely organized and detail oriented. Capable of holding team members accountable to timely delivery of audit evidences. Practices and methods of IT strategy, enterprise architecture and security architecture Excellent analytical and problem-solving abilities to identify and remediate security risks Team-work mentality to develop security solutions in collaboration with other IT professionals. If you are interested please share your updated resume to jagadish.jayavel@datamark.net or contact us Whatsapp -9500681139

Posted 2 months ago

Apply

4.0 - 8.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Vulnerability Identification & Assessment: Manage and oversee vulnerability scanning tools (Qualys, Tenable, Rapid7, etc.). Analyze vulnerability data from multiple sources and assess the impact on business operations. Perform risk assessments and categorize vulnerabilities based on severity and exploitability. Remediation & Risk Mitigation:Collaborate with IT and development teams to ensure timely remediation of identified vulnerabilities. Prioritize vulnerabilities based on risk to the business and potential exploitability. Track remediation efforts and ensure proper closure of security gaps. Process & Policy Development:Define and maintain vulnerability management policies, standards, and procedures. Establish workflows for vulnerability detection, reporting, remediation, and validation. Ensure compliance with security frameworks such as NIST, CIS, ISO 27001, and regulatory standards like GDPR, HIPAA, and PCI-DSS. Security Monitoring & Threat Intelligence Integration:Work with threat intelligence teams to understand emerging threats and vulnerabilities. Ensure vulnerability management aligns with incident response and threat-hunting processes. Continuously enhance detection mechanisms to improve vulnerability discovery and response. Compliance & Audit Readiness:Ensure that vulnerability management practices align with regulatory and compliance requirements. Maintain records of assessments, remediation efforts, and compliance reports for audits. Support internal and external audits related to vulnerability management. Reporting & Metrics: Develop and present vulnerability status reports to security leadership and executive teams. Track key performance indicators (KPIs) related to vulnerability remediation SLAs and risk reduction Provide insights on security posture improvements based on trend analysis. Security Awareness & Collaboration:Conduct training sessions to educate teams on vulnerability risks and remediation best practices. Work closely with DevSecOps, SOC, and infrastructure teams to integrate security best practices into the development lifecycle Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Vulnerability Management Preferred technical and professional experience Qualys

Posted 2 months ago

Apply

6.0 - 7.0 years

11 - 13 Lacs

Hyderabad

Work from Office

Some careers shine brighter than others. If you re looking for a career that will help you stand out, join HSBC and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further. HSBC is one of the largest banking and financial services organisations in the world, with operations in 64 countries and territories. We aim to be where the growth is, enabling businesses to thrive and economies to prosper, and, ultimately, helping people to fulfil their hopes and realise their ambitions. We are currently seeking an experienced professional to join our team in the role of Lead DevSecOps Engineer In this role, you will: Collaborating with various layers of Linux management teams and across Cybersecurity and other IT teams to develop solutions that protect the organization. Design and drive the implementation of service offerings, capability uplifts, and process improvements to protect the bank for a continuously changing threat landscape. Providing thought leadership, consultation and subject matter expertise to the organization on Cybersecurity/Endpoint Security/Antimalware issues. Reviewing, analyzing and documenting the current baseline and developing the target technology posture. Performing gap analysis of the current baseline against the target architecture. Reviewing, designing and re-engineering domain processes with new technologies and solutions to improve domain performance. Providing centralized, global cybersecurity services to the organization and reducing associated costs Operating a first line of defense to ensure compliance with IT requirements. Implementing and maintaining an effective engagement model across all regions, global businesses, and global functions. Researching, engaging, and managing third party vendors where relevant to support functional objectives. Providing thought leadership to the function and broader Cybersecurity organization, driving transformational change and capability uplift across the bank. Requirements To be successful in this role, you should meet the following requirements: 5+ years hand on experience with Linux, preferably with some experience in information security, focused on endpoint security and antimalware controls and solutions. Exposure to CrowdStrike or similar endpoint protection tooling beneficial. Exposure to cloud infrastructure and tools including AWS, Azure, GIT, Ansible, Puppet, Jenkins. Demonstrated ability automating common information security tasks in scripting environments/languages such as python, perl, or similar would be advantageous. Demonstrable experience as both an individual contributor and lead implementing and managing endpoint/antimalware security solutions. Experience working cross-functionally to achieve desired outcomes and goals, including working with subject matter experts and leads for other domains/controls to implement security solutions that effectively reduce risk. Experience working with business partners to understand and evaluate cybersecurity requirements and ensuring security solutions best meet those requirements while reducing risk for the organization. Detailed understanding of current security risks, vulnerabilities, and mitigations for common desktop and server operating systems, as well as knowledge of security best practices and common controls/security products. Broad understanding of common network, application, and cloud security controls. Detailed knowledge of networking, operating system, and application development fundamentals, particularly with regard to security of and threats to associated technologies, solutions, and products. Extensive experience with securing endpoints, and supporting, and integrating security products in large networks/environments. Demonstrated ability to perform complex troubleshooting and problem analysis as well as mitigation in large environments and at scale. Extensive experience in evaluating and selecting security products given business/technology needs and goals, including requirements gathering, testing, and working with multiple vendors. Excellent communication and interpersonal skills, with demonstrated experience in interacting with technical leaders and various layers of management. Demonstrated experience in mentoring and offering guidance to team members. Ability to build connections and work collaboratively within and across teams and boundaries. Willingness to continuously learn and share knowledge with other.

Posted 2 months ago

Apply

4.0 - 9.0 years

0 Lacs

Bengaluru

Work from Office

Role & responsibilities DriverKit System Extensions creation, entitlement mgmt, lifecycle (activate, deactivate, upgrade) Endpoint Security (ES) framework proc/file I/O, exec, mmap, socket events & high-throughput filtering Installer & On-boarding UI (SwiftUI/AppKit) wizard for System-Extension approval, FDA/Screen-Recording, menu-bar item Interactive Notifications (User Notifications) UNUserNotificationCenter, custom actions, APNs tokens, category/action callbacks Privileged helper & update flow SMAppService / SMJobBless, authorization services, delta updates, rollback XNU & user-land internals AMFI/SIP, sandbox profiles, TCC/privacy DBs Language expertise C/C++17+, Objective-C, Swift interop, dispatch/blocks Memory & concurrency ARC vs manual, GCD, pthreads, atomics/locks Mach & XPC IPC design secure messaging between agent, helper, and system-extension File-system monitoring – FSEvents, APFS snapshots/clones, extended attributes for tagging Code signing / notarization – Developer ID certs, hardened runtime, entitlements, secure-boot chain Packaging & deployment – notarized PKG, system-extension activation via MDM, PPPC/TCC profiles Debugging & telemetry – lldb, Instruments, dtrace, sysdiagnose triage Interested Candidate can share their resumes to swagatika.nayak@insemitech.com

Posted 2 months ago

Apply

4.0 - 8.0 years

7 - 17 Lacs

Pune

Work from Office

Aboud the Role We are seeking a highly skilled Security Consultant to join our Cisco Secure Access Helpdesk team. The ideal candidate will have a strong foundation in network security, with hands-on experience in deploying and managing security solutions to ensure secure network access and data protection. This role requires expertise in Zscaler SASE solutions , Cisco Umbrella , VPN deployments , Cisco AnyConnect , and Cisco routing and firewall configurations , Prisma Key Responsibilities Zscaler SASE Solution Deployment & Management Deploy, configure, and manage Zscaler Secure Access Service Edge (SASE) solutions. Ensure seamless and secure access to applications and services while optimizing network performance. Cisco Umbrella Implementation & Maintenance Deploy and manage Cisco Umbrella to provide secure web access and advanced threat protection. Monitor security policies and proactively address vulnerabilities. VPN Solution Deployment & Management Design, implement, and manage VPN solutions for secure remote user access. Ensure proper encryption, authentication, and secure tunnelling mechanisms. Configure and manage Cisco AnyConnect VPN deployments. Security Solutions Implementation Lead the implementation of various network security solutions , ensuring alignment with industry best practices and organizational requirements. Conduct regular security assessments and implement enhancements as needed. Cisco Routing & Firewall Configuration Deploy, configure, and maintain Cisco routers and firewalls to secure the network infrastructure. Optimize firewall rules, routing policies, and security settings for maximum efficiency. Basic Qualifications 3-5 years of experience in security, network security, IT infrastructure. Hands-on experience in deploying and managing network security solutions in enterprise environments. Cisco Umbrella implementation and policy enforcement. VPN solutions (SSL/IPSec) design, deployment, and troubleshooting. Cisco AnyConnect configuration and management Cisco routing and firewall deployment (Cisco ASA, Firepower, or similar). Hand on Experience on Prisma Technology Strong understanding of network protocols & services TCP/IP, DNS, DHCP, HTTP/HTTPS, VPN tunnelling protocols, etc. Familiarity with security monitoring & threat prevention SIEM solutions, IDS/IPS, endpoint security, and cloud security principles. Experience with network management & monitoring tools to ensure network security and performance. Preferred Qualifications ZScaler SASE solutions deployment and management. CCNA Security, CCNP Security, or equivalent industry certifications. Strong analytical and troubleshooting abilities to diagnose and resolve security issues effectively. Excellent verbal and written communication skills, with the ability to explain technical concepts to non-technical stakeholders. Ability to collaborate effectively with cross-functional teams and work in a fast-paced environment.

Posted 2 months ago

Apply

5.0 - 10.0 years

15 - 24 Lacs

Pune

Work from Office

About the Role We are seeking an experienced Security/Senior Security Consultant with strong expertise in Cisco technologies, network design, and implementation. The role involves configuring and troubleshooting routing protocols (BGP, OSPF, IS-IS, VRF, VXLAN), switching (L2/L3, VLANs, SVIs), wireless systems, and managing Cisco ISE for access control. Experience with Cisco SD-Access and DNAC is a plus. The candidate will conduct security assessments, implement security policies, and ensure compliance with industry standards. A B.E./B.Tech or related degree, along with certifications like CCNP, CISSP, or PCNSE, is preferred Key Responsibilities Understand Network design and Implementation & Troubleshooting - Strong understanding & Troubleshooting skills of Routing - BGP, IS-IS, OSPF, VRF, VXLAN, Static routing & Switching – LAN, SVIs, VLANs, L2/L3 Switch, Wireless WLC/APs. Strong understanding of TCP/IP models Design, implement, and manage Cisco ISE for network access control and identity-based security policies. Cisco SD-Access & Catalyst Center (DNAC)– Support DNAC automation, SD-Access fabric deployment, and troubleshooting, including greenfield/brownfield deployments, fabric builds, and endpoint onboarding. Conduct security assessments and provide recommendations to improve network security posture. Collaborate with IT teams to design security architectures that align with business needs and regulatory requirements. Document security policies, procedures, and configurations for compliance and operational efficiency. Basic Qualifications Education: B.E./B.Tech or master’s degree in computer science, or a related field. Proven experience in network security consulting, design, and implementation. Deep knowledge & hands-on expertise on Cisco Routing & Switching (CCNP preferred). Strong understanding & hands-on expertise on Cisco Catalyst Switches & Routers, Wireless Controllers (WLCs), Access Points (APs). Hands-on expertise with Cisco ISE (preferred), Cisco SD-Access & Catalyst Center (DNAC) (optional). Understanding of zero-trust architecture, micro-segmentation, and endpoint security. Excellent troubleshooting, analytical, and problem-solving skills. Strong communication and client-facing skills. Certifications such as CCNP Enterprise and or Security, CISSP, PCNSE, or equivalent are preferred. FTD, Palo Alto Firewall, Tetration, and StealthWatch, familiarity with industry standards and frameworks such as ISO 27001, NIST, CIS Controls, and GDPR, will be added advantage. (Not Mandatory) Preferred Qualifications Excellent communication and leadership skills. Strong analytical and problem-solving abilities. Ability to manage and mentor teams effectively.

Posted 2 months ago

Apply

4.0 - 8.0 years

12 - 20 Lacs

Pune

Work from Office

About the Role We are seeking a highly skilled and experienced Security Consultant to join our team. The ideal candidate will have expertise in designing, implementing, and managing advanced security solutions, with hands-on experience in Cisco ISE, FTD, Palo Alto Firewall, Cisco Secure Workload (Tetration), and Secure Network Analytics (StealthWatch). The role requires a deep understanding of network security, threat mitigation, and compliance frameworks. Key Responsibilities Design, implement, and manage Cisco ISE for network access control and identity-based security policies. Deploy, configure, and optimize Cisco Firepower Threat Defense (FTD) solutions to enhance perimeter security. Manage and maintain Palo Alto Firewalls, including policy creation, threat prevention, and logging. Cisco SD-Access & Catalyst Center (DNAC) Experience – Supports DNAC automation, SD-Access fabric deployment, and troubleshooting, including greenfield/brownfield deployments, fabric builds, and endpoint onboarding. Implement and optimize Cisco Secure Workload (Tetration) for workload protection, micro-segmentation, and policy enforcement. Utilize Cisco Secure Network Analytics (StealthWatch) for network traffic analysis, anomaly detection, and threat response. Conduct security assessments and provide recommendations to improve network security posture. Collaborate with IT teams to design security architectures that align with business needs and regulatory requirements. Perform incident detection, response, and forensic analysis to mitigate security threats. Document security policies, procedures, and configurations for compliance and operational efficiency. Basic Qualifications B. Tech / B.E. in computers or master’s degree in computer science. Hands-on expertise with Cisco ISE, Cisco SD-Access & Catalyst Center (DNAC). Proven experience in network security consulting, design, and implementation. Hands-on expertise with Cisco ISE/DNAC, FTD, Palo Alto Firewall, Tetration, and StealthWatch. Strong knowledge of firewall policies, VPNs, IDS/IPS, and threat intelligence. Understanding of zero-trust architecture, micro-segmentation, and endpoint security. Preferred Qualifications Excellent troubleshooting, analytical, and problem-solving skills. Strong communication and client-facing skills. Certifications such as CISSP, CCNP Security, PCNSE, or equivalent are preferred. Familiarity with industry standards and frameworks such as ISO 27001, NIST, CIS Controls, and GDPR will be added advantage . Excellent communication and leadership skills. Strong analytical and problem-solving abilities.

Posted 2 months ago

Apply

6.0 - 10.0 years

15 - 25 Lacs

Bengaluru

Work from Office

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you a tech-savvy problem-solver with a passion for ensuring optimal network performance? If so, look no further – Kyndryl is seeking a Network Support Specialist who will be the go-to expert for installing, maintaining, and troubleshooting computer networks. As our Network Support Specialist, you'll be working in a complex, multi-vendor environment, and will use your analytical skills to identify and resolve network issues, make configuration changes, and implement security policies. This role requires someone who can think on their feet, test and apply corrective actions (including emergency changes), and participate in change reviews as needed. And with the ever-changing nature of technology, you'll be constantly learning and growing in your role. You will work alongside a talented team of experts to plan and execute routine network changes, troubleshoot and solve network issues and outages, and maintain excellent communication with our end customers, project managers, and service engineers. You’ll be responsible for maintaining network components, monitoring network performance, and maintaining network security. You will also be providing user support for network-related issues, ensuring that our customers receive the highest level of support possible. If you're ready to take on a fast-paced and rewarding role in the world of network support, apply to join the Kyndryl team today! Roles & Responsibilities: Perform firmware upgrades, patches, and routine maintenance on firewalls. Integrate firewall solutions with SIEM, IDS/IPS, endpoint protection, and cloud security tools. Monitor network performance and security systems, responding to security incidents and conducting root cause analysis. Investigate and respond to security breaches, malware infections, and intrusion attempts & Major incident handling. Configure, and manage enterprise antivirus solutions (such as TrendMicro, CrowdStrike, or similar) & Configure and manage EDR and XDR solutions. Monitor and analyze security alerts, logs, and reports for malware infections and security incidents. Implement real-time protection, signature updates, behavioral analysis, and heuristic scanning techniques & install and uninstall endpoint security solutions. Implement network virtualization, micro-segmentation, distributed firewalling (DFW). Troubleshoot and optimize NSX networking components, including VXLAN, Overlay, Edge Services Gateway (ESG), and Distributed Logical Routers (DLR). Configure NSX Security Policies, NAT, VPN, Load Balancing, and Firewall rules. Configure, and manage Web Application Firewalls (WAF) in on-premises and cloud environments, configure, and manage NAC for wired, wireless, and VPN network access control. Create and fine-tune security policies, custom rules, and signatures to critical signature. Monitor and analyze WAF logs, alerts, and traffic to detect and mitigate web-based attacks. Design and implement .1X authentication, MAB (MAC Authentication Bypass), posture assessment, and profiling policies. Understanding of PKI, certificate-based authentication, endpoint profiling, and device posture assessment. Monitor, analyze, and respond to NAC logs, security alerts, and compliance reports Configure, and manage Arcon PAM solutions to secure privileged accounts and sensitive data across the organization. Troubleshoot and resolve PAM issues, including access failures, session disruptions, and integration problems User onboarding to PAM and giving required access to systems. Monitor and analyze PAM-related logs, access requests, and activity reports to detect potential security incidents or policy violations Implement and optimize web filtering policies, SSL decryption, and content inspection Monitor and analyze proxy logs, user activities, and internet traffic for security threats and policy violations Troubleshoot proxy performance issues, website access problems, and SSL-related errors, configure, and manage Data Loss Prevention (DLP) solutions Develop and enforce data security policies to detect and prevent unauthorized data transfers. Configure DLP rules, keyword detection, fingerprinting, and machine learning-based policies. Monitor and analyze DLP alerts, incidents, and logs for potential data breaches or policy violations. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Skills and Experience: Experience in cybersecurity, SOC, or security engineering roles. Total experience of 10+ years. Strong knowledge of network security, endpoint security Hands-on experience with WAF, IBM DAM, IBM GDE, Forcepoint Proxy, DLP, Email Gateway. Hands-on experience with FortiManager, Thales CipherTrust and FortiAnalyzerCreate and exp with DAM solutions such as IBM Guardium. BSc. B.E./B. Tech, M.E. /M. Tech . Ability to monitor and audit database activities for unauthorized access and suspicious activities. Understanding of key management solutions (KMS) and Hardware Security Modules (HSMs) & WAF Signature analysis. Hands-on experience with SDWAN, PaloAlto , FortiGate and Checkpoint. Expertise in NSX-T components such as Transport Zones, Edge Nodes, and T0/T1 Gateways. Implement and maintain VPNs, IPSec tunnels, and SSL VPNs using Palo Alto and FortiGate technologies. Proficiency in routing protocols BGP, OSPF, Configure proxy and network access control (NAC) solutions. Preferred Skills and Experience : Network Virtualization (VCTA-NV) , Forcepoint DLP, Web Security Administrator Certification , CEH , CompTIA Security+. PCNSE, NSE4 ,WAF Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 2 months ago

Apply

1.0 - 5.0 years

3 - 7 Lacs

Gurugram

Work from Office

Required Skills Behavioral | Aptitude | Communication Technology | Hardware and Networking | Installation, configuration, maintainance and repair Technology | Audio, Video support | Installation and configuration Technology | Windows Operating System | Installation, configuration and management Technology | End Point Security | Antivirus management, data encryption, DLP, desktop firewall, VPN, AD policies Education Qualification : Any Graduate Certification Mandatory / Desirable : Technology | Microsoft 365 Certified | Modern Desktop Administrator Associate 1) Field Services Support Engineers primary responsibility is to provide support to an organization s IT systems to help them meet their business goals, this is done by ensuring that all computers and networks operate efficiently with high uptime. 2) As a desktop engineer, you may need to assemble and install client desktop computers and assist the end-user in securing their hardware. 3) This role also involves hands & feet support for various IT support teams to perform activities related to periodic maintenance to handling individual systems hardware, software, and network queries 4) To support daily technical support activities for computers & all other end point devices. Update the support ticket with the progress, to set up and test desktop computer peripherals. 5) To perform the system changes adhered to organizational policies. 6) Conduct remote desktop troubleshooting to end user issues. Maintain technical documentation in association with other functional departments 7) Technical Skills a. Windows Operating System: b. Ability to Install and troubleshoot different versions of Windows OS independently. E.g. Windows XP. Windows 7, Windows 10 and Windows 11 c. Understanding of desktop applications and how do they work, installation & uninstallation. d. Understanding of domain setup & ability to add / remove computers to domain. update Group policies. carry out Disk management, Disk Encryption, Wireless configuration. check utilization and availability, ability to perform start up and shut down services by following SOP. deploy gold images on multiple desktops using SOP, Ability to install and configure client applications independently 8) In addition to above, support and perform below activities. a. Exchange and Mobility Clients b. Printer management c. Backup and Recovery d. Audio, Video support e. End Point Security/Patch Management f. Hardware and Networking

Posted 2 months ago

Apply

7.0 - 12.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Applications from people with disabilities are explicitly welcome.

Posted 2 months ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Mumbai

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Akamai WAF. Experience8-10 Years.

Posted 2 months ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Forgerock Access Manager. Experience8-10 Years.

Posted 2 months ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: SailPoint Identity Mgmt and Governance. Experience8-10 Years.

Posted 2 months ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Coimbatore

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.

Posted 2 months ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Mumbai

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Cloud Security Posture Management. Experience8-10 Years.

Posted 2 months ago

Apply

12.0 - 16.0 years

35 - 50 Lacs

Chennai

Work from Office

Job Summary As an Infra. Architect you will be responsible for designing and implementing robust infrastructure solutions using Microsoft technologies. You will collaborate with cross-functional teams to ensure seamless integration and security of systems. Your expertise in Microsoft Purview Microsoft Defender Suite and Azure AD Identity Protection will be crucial in enhancing the companys infrastructure capabilities. Responsibilities Design and implement infrastructure solutions leveraging Microsoft technologies to meet business needs. Collaborate with cross-functional teams to ensure seamless integration of systems and applications. Provide expertise in Microsoft Purview to enhance data governance and compliance across the organization. Utilize Microsoft Defender Suite to strengthen the security posture of the companys infrastructure. Implement Azure AD Identity Protection to safeguard user identities and access management. Configure Always on VPN to ensure secure remote access for employees. Deploy App Locker to control application execution and enhance endpoint security. Utilize Microsoft Defender ATP to detect investigate and respond to advanced threats. Manage Microsoft Entra ID to streamline identity and access management processes. Enhance Microsoft 365 Security to protect organizational data and communications. Oversee the hybrid work model implementation ensuring seamless connectivity and security. Provide technical guidance and support to IT teams to resolve complex infrastructure issues. Contribute to the continuous improvement of infrastructure processes and practices. Qualifications Possess a deep understanding of Microsoft Purview and its application in data governance. Demonstrate expertise in Microsoft Defender Suite for comprehensive security management. Have experience with Azure AD Identity Protection to enhance identity security. Be proficient in configuring Always on VPN for secure remote access. Show capability in deploying App Locker for application control. Be skilled in using Microsoft Defender ATP for threat detection and response. Have knowledge of Microsoft Entra ID for effective identity management. Certifications Required Microsoft Certified: Azure Solutions Architect Expert Microsoft Certified: Security Compliance and Identity Fundamentals

Posted 2 months ago

Apply

3.0 - 5.0 years

3 - 7 Lacs

Chennai

Work from Office

Key Responsibilities: SCCM Administration & Maintenance: Manage and maintain SCCM/MECM infrastructure, including servers, management point, distribution points, and clients. Perform health checks and routine maintenance of SCCM components. Monitor SCCM logs and troubleshoot issues related to deployments, updates, and configurations. Software & Patch Management: Deploy Windows updates, security patches, and third-party application patches using SCCM. Create and manage deployment packages for applications, drivers, and OS images. Ensure compliance with patching policies and update schedules. OS Deployment & Imaging: Configure and manage Windows OS deployment (OSD) using SCCM Task Sequences. Troubleshoot PXE boot, driver injection, and imaging related issues. Client Health & Troubleshooting: Ensure SCCM client health and remediate issues affecting deployments. Troubleshoot application installation failures, patching issues, and SCCM agent problems. Reporting & Compliance: Generate SCCM reports for software deployments, patch compliance, and inventory. Work with security teams to ensure endpoint compliance and vulnerability management. Technical Skills: Strong experience with SCCM/MECM (Current Branch ,2012, or later versions) administration. Handson experience with Software Deployment, Patch Management, and OSD. Good understanding of Windows Server (2016/2019/2022) and Active Directory. Familiarity with Intune, Azure AD, and Modern Endpoint Management. Shifts: 24*7 rotational shifts Qualifications Bachelors degree in Computer Science, Information Technology, or a related field. Job Location

Posted 2 months ago

Apply

1.0 - 5.0 years

5 - 10 Lacs

Greater Noida

Work from Office

Role Overview: The Cybersecurity Analyst plays a critical role in real-time threat detection , incident triage , and response coordination as part of the 24x7 Security Operations Center. Requirements: Experience in SOC operations or network security. Proficiency in SIEM, endpoint protection tools, firewalls , and basic scripting. Familiar with TCP/IP, networking protocols, and cyber threat landscape. Willingness to work in rotational shifts , including nights and weekends. Certifications like Security+, CEH, or CompTIA CySA+ are a plus.

Posted 2 months ago

Apply

1.0 - 5.0 years

3 - 7 Lacs

Chennai

Work from Office

Required Skills Behavioral | Aptitude | Communication Technology | Hardware and Networking | Installation, configuration, maintainance and repair Technology | Audio, Video support | Installation and configuration Technology | Windows Operating System | Installation, configuration and management Technology | End Point Security | Antivirus management, data encryption, DLP, desktop firewall, VPN, AD policies Education Qualification : Any Graduate Certification Mandatory / Desirable : Technology | Microsoft 365 Certified | Modern Desktop Administrator Associate 1) Field Services Support Engineers? primary responsibility is to provide support to an organization?s IT systems to help them meet their business goals, this is done by ensuring that all computers and networks operate efficiently with high uptime. 2) As a desktop engineer, you may need to assemble and install client desktop computers and assist the end-user in securing their hardware. 3) This role also involves hands & feet support for various IT support teams to perform activities related to periodic maintenance to handling individual systems hardware, software, and network queries 4) To support daily technical support activities for computers & all other end point devices. Update the support ticket with the progress, to set up and test desktop computer peripherals. 5) To perform the system changes adhered to organizational policies. 6) Conduct remote desktop troubleshooting to end user issues. Maintain technical documentation in association with other functional departments 7) Technical Skills a. Windows Operating System: b. Ability to Install and troubleshoot different versions of Windows OS independently. E.g. Windows XP. Windows 7, Windows 10 and Windows 11 c. Understanding of desktop applications and how do they work, installation & uninstallation. d. Understanding of domain setup & ability to add / remove computers to domain. update Group policies. carry out Disk management, Disk Encryption, Wireless configuration. check utilization and availability, ability to perform start up and shut down services by following SOP. deploy gold images on multiple desktops using SOP, Ability to install and configure client applications independently 8) In addition to above, support and perform below activities. a. Exchange and Mobility Clients b. Printer management c. Backup and Recovery d. Audio, Video support e. End Point Security/Patch Management f. Hardware and Networking

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies