Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
2.0 - 7.0 years
20 - 25 Lacs
Bengaluru
Work from Office
3 The Senior IT Cybersecurity Engineer is responsible for the technical design of IT cybersecurity architectural guidelines and standards, as well as the secure implementation of IT digital technologies across platforms and product lines in Chevron. The primary responsibility is to assure IT solutions are "secure by design", and continuously improving our defenses as threats and technologies change. Key responsibilities: Responsibilities include but are not limited to: Enable digital transformation by ensuring secure-by-design principles are incorporated in the IT digital capabilities across the enterprise. Establish cybersecurity governance for IT technologies across all technology functions Lead security research proposals and proofs of concept for emerging technologies Consult as a subject matter expert on cybersecurity risk assessments for IT technologies Define cybersecurity architectures for IT solutions Serve as a subject matter expert in one or more cybersecurity domains, including, but not limited to, Network Security, Cloud Security, Endpoint Security, Application Security, Data Security, and Identity and Access Management. Required Qualifications: Minimum 2 years related work experience in cybersecurity with increasing levels of responsibility. Technical experience in one or more cybersecurity domains, including, but are not limited to, Network Security, Cloud Security, Endpoint Security, Application Security, Data Security, and Identity and Access Management. General understanding of the cyber threat landscape, including cyber-criminal and cyber-espionage threats. Previous experience administering cybersecurity technologies and/or supporting cybersecurity operations. Preferred Qualifications: Knowledge of industry-accepted cyber security frameworks such as NIST 800-53, MITRE ATTCK, and the Cyber Kill Chain. Experience in conducting and/or leading cybersecurity assessments (risk, vulnerability) and creating a detailed mitigation plan and recommendations to address gaps identified Ability to influence and motivate teams, and work with a variety of disciplines, cultures, and environments. Demonstrated ability to work effectively, and communicate effectively at all levels with operations, design, projects, vendors, peers, etc. Communicates in a clear, concise, understandable manner both orally and in writing. Chevron participates in E-Verify in certain locations as required by law.
Posted 3 months ago
6.0 - 11.0 years
6 - 11 Lacs
Bengaluru
Work from Office
Job_Description":" Key Responsibilities: Lead the deployment, configuration, and administration of Endpoint Management solutions such as Microsoft Endpoint Manager (Intune, SCCM), Manage Engine Endpoint Central, for a large and diverse device fleet (Windows, macOS, iOS). Implement and enforce comprehensive security policies using tools like Trend Micro Vision One, BitLocker, and advanced threat protection solutions to safeguard endpoints and data. Develop and implement Zero Trust security models to ensure robust device and identity security alignment. Automate patch management, software deployment, OS deployment (including Windows 10/11 migrations), and compliance policies across distributed environments. Develop and enforce endpoint hardening policies in adherence to industry benchmarks like CIS and NIST security standards. Conduct vulnerability assessments and develop effective remediation strategies to minimize endpoint risks. Provide Tier 2/3 technical support for complex endpoint-related issues and security incidents, ensuring minimal disruption to business operations. Collaborate closely with cross-functional teams to continuously enhance endpoint security posture, mitigate vulnerabilities, and identify and implement IT security enhancements. Create and maintain technical documentation and provide training for IT teams on endpoint security best practices. Requirements Bachelors degree in Information Technology, Computer Science, or a related field, or equivalent practical experience. 6+ years of experience in endpoint management, IT infrastructure, and security engineering roles. Proven expertise in administering and optimizing Microsoft Endpoint Manager (Manage Engine or Intune or SCCM), including application packaging and OS deployment. Demonstrated experience with Manage Engine Endpoint Central for device management. Strong understanding and practical experience with endpoint security solutions such as Trend Micro Vision One, BitLocker, and advanced threat protection.
Posted 3 months ago
7.0 - 12.0 years
14 - 24 Lacs
Chennai
Work from Office
RESPONSIBILITIES Harden endpoint and server systems through baseline configurations and continuous validation. Manage and monitor PAM and PIM platforms, including session monitoring and access vaulting. Administer antivirus/EDR solutions, ensuring AV coverage, threat response, and policy compliance. Implement DLP controls (non-O365) across USB, endpoint, and file-sharing systems. Coordinate with SOC/MSSP for threat detection, log review, and incident containment. Lead patch management reviews and support monthly compliance validation. Review local admin rights, USB access, and enforce endpoint security controls. Contribute to GRC and audit efforts with evidence and dashboards. Maintain metrics for EDR alerts, patch status, and privilege usage trends REQUIRED SKILLS Strong technical understanding of EDR, AV, and DLP tools. Expertise in endpoint/server configuration and hardening (Windows/Linux). Experience with PAM solutions like CyberArk or BeyondTrust. Familiarity with incident response and threat remediation practices. Ability to collaborate with SOC and MSSP partners.
Posted 3 months ago
4.0 - 9.0 years
10 - 16 Lacs
Bengaluru
Work from Office
Role & responsibilities Understand the existing security controls (including Endpoint Detection & Response, anti-malware and incident response) Engage with other IT teams including Network Engineering, Data Center, Service Desk to ensure a consistent approach for organizational support across the enterprise Understand the current state of the technology components in the IT stack ranging from networking, storage, compute (virtualization, containers), applications & security mgmt Establish non-production and production environments for testing and hosting the applications Adhere to the Scaled Agile Framework methodologies and tools that exists in the environment Participate in daily stand-up of Compliance & Security release train and contribute to bi-weekly sprints Learn System Engineering concepts to analyze existing environment and find more efficient ways Identify ways of doing things with full automation, AI and ML which needs knowing/learning the concepts of these technologies. Maintain regular communication with supervisor and continually update needs & priorities to Preferred candidate profile Hands-on experience in managing CrowdStrike, McAfee and TrendMicro platforms using the console, scripting and automation frameworks Hands-on expertise programming in Python Experience in L1/L2/L3 support and understanding of common corporate IT issues Have a sense of urgency in production issues and be a proactive speaker and listener Hands-on experience in programming with networking stack, TCP/IP stack, compute technologies (virtualization, containerization), storage Knowledge of technical design of the security controls (especially in the Windows OS)
Posted 3 months ago
10.0 - 15.0 years
50 - 55 Lacs
Mumbai, New Delhi, Bengaluru
Work from Office
Join the CrowdStrike mission to stop breaches as a technical expert working with our largest Global System Integrators and Telco partners. Ideal candidates are based close to Bengaluru, Delhi, or Mumbai, and have strong experience in architecting and enabling security solutions with major GSI and Telco partners, transforming how they deliver cybersecurity to their customers. Working closely with our Global Alliance Managers, you'll shape how global partners build and deliver next-generation security services using CrowdStrikes technology. As a Solution Architect, you will be part of the team revolutionizing the cybersecurity landscape through CrowdStrikes AI-Native Security Platform. Working with the worlds leading technology partners, your expertise will directly influence how major global partners protect millions of endpoints and help organizations worldwide secure their customers. What you'll Do: Lead, proactively engage, and build trusted relationships with partners key technical counterparts to achieve technical proficiency and self-sufficiency in service delivery and platform implementation Architect and design security services with partners, leveraging CrowdStrikes Falcon platform capabilities Drive platform adoption strategy, helping partners build comprehensive security offerings Drive technical strategy and growth with assigned Global System Integrators and Telco partners Develop and execute long-term technical plans supporting go-to-market initiatives Build and maintain relationships with partner technical and sales leadership teams across endpoint, cloud, identity and data protection Guide partners in embedding Falcon Platform within their managed services portfolio Design technical solutions that integrate CrowdStrike into partners existing security services Create and deliver technical training programs enabling partners to demo, deploy, and support CrowdStrike solutions Support POC/POV methodologies and provide competitive positioning guidance Participate in quarterly business reviews and technical planning sessions Drive technical partner programs including Falcon Champions Represent CrowdStrike at partner events and conferences Bridge communication between partners and CrowdStrike technical teams Oversee proper usage of partner resources and demo environments What you'll Need: Proven track record in Technical Consulting or Solution Architecture with GSI / MSPs Partners Strong background in endpoint security, cloud security, and zero-trust architectures Experience designing and implementing security solutions at enterprise scale Hands-on experience with major cloud platforms (AWS, Azure, GCP) Working knowledge of SIEM/XDR solutions and security operations Technical expertise in endpoint protection, identity management, and cloud workload security Experience with API integration and basic scripting capabilities Understanding of threat intelligence and incident response methodologies Strong communication and presentation skills, able to engage technical and business audiences Ability to build and maintain technical relationships at all levels Self-motivated with excellent organizational and problem-solving skills Comfortable working autonomously in a fast-paced environment Ability to travel regularly to partner offices, corporate locations, and industry events within India and, occasionally, worldwide Fluent English Industry certifications (CISSP, SANS, etc) preferred Benefits of Working at CrowdStrike: Remote-friendly and flexible work culture Market leader in compensation and equity awards Comprehensive physical and mental we'llness programs Competitive vacation and holidays for recharge Paid parental and adoption leaves Professional development opportunities for all employees regardless of level or role Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections Vibrant office culture with world class amenities Great Place to Work Certified across the globe
Posted 3 months ago
6.0 - 9.0 years
0 - 1 Lacs
Pune, Bengaluru, Mumbai (All Areas)
Hybrid
Role & responsibilities • Design, implement, and manage security solutions for cloud infrastructure, primarily on Google Cloud Platform (GCP), with additional responsibilities for Azure and AWS environments. • Develop and enforce security policies, procedures, and standards to ensure compliance with industry best practices and regulatory requirements. • Conduct security assessments, vulnerability scans, and penetration testing to identify and mitigate risks. • Monitor and respond to security incidents, providing timely and effective resolution. • Collaborate with cross-functional teams to integrate security into the development and deployment processes. • Stay up to date with the latest security trends, threats, and technologies to continuously improve our security posture. • Provide guidance and training to internal teams on cloud security best practices. • Implement and manage identity and access management (IAM) policies and procedures to ensure secure access to cloud resources. • Automate security processes and workflows using tools such as Terraform, Ansible, or similar. • Develop and maintain security documentation, including architecture diagrams, incident response plans, and standard operating procedures. • Perform regular audits and compliance checks to ensure adherence to security policies and regulatory requirements. • Collaborate with third-party vendors and service providers to evaluate and integrate security solutions. • Participate in security incident response drills and tabletop exercises to enhance preparedness and response capabilities. • Analyze and report on security metrics to measure the effectiveness of security controls and identify areas for improvement. Required Experience & skills Bachelors degree in computer science, Information Technology, or a related field. Proven experience as a Cloud Security Engineer or similar role, with a strong focus on Google Cloud Platform (GCP). Working knowledge of Azure and AWS cloud platforms. In-depth understanding of cloud security principles, practices, and technologies. Experience with security tools and technologies such as firewalls, intrusion detection/prevention systems, SIEM, and endpoint protection. Strong analytical and problem-solving skills. Excellent communication and collaboration abilities. Relevant certifications such as Google Professional Cloud Security Engineer, AWS Certified Security Specialty, or Microsoft Certified: Azure Security Engineer Associate are a plus.
Posted 3 months ago
6.0 - 11.0 years
15 - 25 Lacs
Chennai, Bengaluru
Hybrid
Greeting of the Day.... I am Hirimng Thales Vormrtric/ Thales CipherTrust enginner for my client... Location: Chennai, Bangalore Experienece:6-13 Years NP: Immedaite-60 days Job Description • 6+ years in Encryption and Key Management tools and technologies. • Hands-on expertise with Vormetric DSM and CipherTrust Manager. • Proficient in Linux and Windows OS with administration knowledge. • Strong understanding of encryption, key management, and cryptographic principles. • Familiarity with Public Key Infrastructure (PKI) is a plus. • Hands-on experience onboarding applications, databases, and storage platforms into CipherTrust Manager or Vormetric DSM. • Vormetric DSM / CipherTrust Manager. • skills in stakeholder communication, process understanding, and documentation. • Proficient in using enterprise-level security tools for data protection. Primary Skills • Encryption • Key Management and Cryptography • Vormetric DSM • CipherTrust Manager Secondary Skills Ability to work with cross-functional teams and support secure integration processes To apply send me your resume at chanchal@oitindia.com or sharwe this job in your community.
Posted 3 months ago
4.0 - 7.0 years
4 - 8 Lacs
Bengaluru
Work from Office
> If you are looking for a challenging and exciting career in the world of technology, then look no further. Skyworks is an innovator of high performance analog semiconductors whose solutions are powering the wireless networking revolution. At Skyworks, you will find a fast-paced environment with a strong focus on global collaboration, minimal layers of management and the freedom to make meaningful contributions in a setting that encourages creativity and out-of-the-box thinking. We are excited about the opportunity to work with you and glad you want to be part of a team of talented individuals who together can change the way the world communicates. Requisition ID: 75515 Description The Information Security Analyst will play a key role in supporting Cyber Defense and Information Security functions, including governance, risk, and compliance (GRC) initiatives. Responsibilities include managing security solutions, overseeing IT-related onboarding and offboarding processes - such as account creation, systems access, and terminations. Additionally, the Security Analyst will assist the GRC team in enhancing governance and compliance frameworks. This position is essential in maintaining a secure and efficient IT environment while continuously improving security practices. Responsibilities Oversee configurations of endpoint security solutions such as DLP, email gateways, SIEM, web filters. Analyze security logs and alerts from SIEM tools Conduct regular security audits and assessments to identify risk, vulnerabilities, and improve security posture. Define and enforce access control policies based on security best practice. Collaborate with IT, security, and various other departments to develop and implement security strategies aligned with industry standards. Investigate security incidents and propose response procedures to mitigate risk and prevent future occurrences. Work with the HR team to ensure that all new hires have the necessary IT access to perform their job functions. Assist in the development and implementation of IT policies and procedures related to IT access and terminations Assist in monitoring and reporting on compliance with IT policies and procedures. Identify and escalate any potential risks related to IT access and terminations. Collaborate with other members of the GRC team to maintain and improve our governance, risk, and compliance processes. Assist in conducting risk assessments and developing risk mitigation strategies. Keep up-to-date with relevant laws, regulations, and industry best practices related to IT access and terminations. Required Experience and Skills Bachelors degree in IT, computer science, or a related field with minimal one year of experience in IT, GRC or a related field. Knowledge of IT access and termination processes and procedures. Experience with IT security, risk management, and compliance. Strong attention to detail and analytical skills. Excellent verbal and written communication skills. Ability to work independently and as part of a team. Experience with Microsoft Office Suite, including Excel, Word, and PowerPoint. Experience with GRC tools is a plus. Job Segment: Information Security, Computer Science, Network, Telecom, Telecommunications, Technology
Posted 3 months ago
3.0 - 5.0 years
3 - 7 Lacs
Pune
Work from Office
Syensqo is all about chemistry. We re not just referring to chemical reactions here, but also to the magic that occurs when the brightest minds get to work together. This is where our true strength lies. In you. In your future colleagues and in all your differences. And of course, in your ideas to improve lives while preserving our planet s beauty for the generations to come. Job Summary: The Endpoint Security Specialist will be responsible for implementing and managing security measures to protect endpoint devices within the organization. This role involves working closely with the Unified Endpoint Manager, the Chief Information Security Officer (CISO) office, and cybersecurity teams to ensure that all endpoints are secure and compliant with internal and external security standards. Key Responsibilities: Security Implementation and Management: Develop and implement security policies and procedures for endpoint devices. Configure and manage endpoint security tools and solutions, including antivirus, encryption, and endpoint detection and response (EDR) systems. Monitor and respond to security alerts and incidents related to endpoint devices. Threat Detection and Response: Conduct regular security assessments and vulnerability scans on endpoint devices. Analyze security threats and vulnerabilities, and develop strategies to mitigate risks. Investigate and respond to security incidents, including malware infections, data breaches, and unauthorized access. Patching and Updates: Ensure that all endpoint devices are patched and updated to the correct levels to protect against vulnerabilities. Develop and manage a patch management process, including scheduling, testing, and deployment of patches. Monitor the effectiveness of patching and update processes, and make improvements as necessary. Compliance and Reporting: Ensure endpoint security measures comply with regulatory requirements and industry standards. Prepare and present security reports to the Unified Endpoint Manager, CISO office, and other stakeholders. Maintain documentation of security policies, procedures, and incident responses. Collaboration and Support: Work closely with the IT, legal, CISO office, and cybersecurity teams to ensure a cohesive approach to endpoint security. Provide guidance and support to team members on security-related matters. Participate in cross-functional projects to enhance overall security posture. Training and Awareness: Develop and deliver training programs to educate employees on endpoint security best practices. Promote a culture of security awareness within the organization. Continuous Improvement: Stay updated on emerging security threats, technologies, and best practices. Recommend and implement improvements to enhance endpoint security. Qualifications: Bachelor s degree in Information Technology, Cybersecurity, Computer Science, or a related field. Minimum of 3-5 years of experience in endpoint security or a related role. Strong understanding of endpoint security tools and technologies, including antivirus, encryption, and EDR systems. Knowledge of regulatory requirements and industry standards related to endpoint security. Experience with patch management processes and tools. Excellent analytical, problem-solving, and communication skills. Ability to work independently and as part of a team. Relevant certifications (e.g., CEH, CISSP, CompTIA Security+) are a plus. About us Syensqo is a science company developing groundbreaking solutions that enhance the way we live, work, travel and play. Inspired by the scientific councils which Ernest Solvay initiated in 1911, we bring great minds together to push the limits of science and innovation for the benefit of our customers, with a diverse, global team of more than 13,000 associates. Our solutions contribute to safer, cleaner, and more sustainable products found in homes, food and consumer goods, planes, cars, batteries, smart devices and health care applications. Our innovation power enables us to deliver on the ambition of a circular economy and explore breakthrough technologies that advance humanity. At Syensqo, we seek to promote unity and not uniformity. We value the diversity that individuals bring and we invite you to consider a future with us, regardless of background, age, gender, national origin, ethnicity, religion, sexual orientation, ability or identity. We encourage individuals who may require any assistance or accommodations to let us know to ensure a seamless application experience. We are here to support you throughout the application journey and want to ensure all candidates are treated equally. If you are unsure whether you meet all the criteria or qualifications listed in the job description, we still encourage you to apply. # Job ID 32372 Regular Pune, India View in Google Maps Apply to this job
Posted 3 months ago
3.0 - 7.0 years
5 - 9 Lacs
Hyderabad
Work from Office
Job Description: The ideal candidate will be responsible for managing and securing endpoints using CyberArk EPM and CrowdStrike Falcon. They will play a pivotal role in minimizing risks, improving security posture, and ensuring compliance with organizational policies and industry standards. Technical Skills (Necessary) Preferred: CyberArk Defender, CrowdStrike Certified Falcon Administrator (CCFA). Programming/Scripting: Proficiency in Python, PowerShell, or Bash for security task automation. Experience with Security Technologies: Hands-on with EDR, DLP, IDS/IPS, WAF, AV, and SIEM tools. SSL certificate management for installation, renewal, and troubleshooting. Key Responsibilities: CyberArk EPM Management: Configure and manage endpoint privilege policies to enforce least privilege. Monitor and respond to privilege escalation activities. Implement application control policies for endpoint security. CrowdStrike Falcon Management: Monitor endpoint activities and respond to alerts generated by CrowdStrike Falcon. Investigate incidents using CrowdStrike tools and conduct threat hunting. Implement and optimize detection and prevention policies in Falcon. Endpoint Security and Compliance: Collaborate with IT teams to ensure secure endpoint configurations. Ensure compliance with security standards and regulations. SSL Certificate Management: Manage the lifecycle of SSL certificates, including installation, renewal, and troubleshooting. Ensure proper encryption standards are maintained. Continuous Improvement: Stay updated on emerging threats and vulnerabilities related to endpoint security. Enhance policies and procedures for endpoint protection. Documentation and Reporting: Maintain comprehensive documentation of configurations, incidents, and resolutions. Provide regular reports on endpoint security metrics and compliance status.
Posted 3 months ago
1.0 - 4.0 years
30 - 35 Lacs
Pune
Work from Office
Required Skills Behavioral | Aptitude | Communication Technology | Hardware and Networking | Installation, configuration, maintainance and repair Technology | Audio, Video support | Installation and configuration Technology | Windows Operating System | Installation, configuration and management Technology | End Point Security | Antivirus management, data encryption, DLP, desktop firewall, VPN, AD policies Education Qualification : Any Graduate Certification Mandatory / Desirable : Technology | Microsoft 365 Certified | Modern Desktop Administrator Associate 1) Field Services Support Engineers? primary responsibility is to provide support to an organization?s IT systems to help them meet their business goals, this is done by ensuring that all computers and networks operate efficiently with high uptime. 2) As a desktop engineer, you may need to assemble and install client desktop computers and assist the end-user in securing their hardware. 3) This role also involves hands & feet support for various IT support teams to perform activities related to periodic maintenance to handling individual systems hardware, software, and network queries 4) To support daily technical support activities for computers & all other end point devices. Update the support ticket with the progress, to set up and test desktop computer peripherals. 5) To perform the system changes adhered to organizational policies. 6) Conduct remote desktop troubleshooting to end user issues. Maintain technical documentation in association with other functional departments 7) Technical Skills a. Windows Operating System: b. Ability to Install and troubleshoot different versions of Windows OS independently. E.g. Windows XP. Windows 7, Windows 10 and Windows 11 c. Understanding of desktop applications and how do they work, installation & uninstallation. d. Understanding of domain setup & ability to add / remove computers to domain. update Group policies. carry out Disk management, Disk Encryption, Wireless configuration. check utilization and availability, ability to perform start up and shut down services by following SOP. deploy gold images on multiple desktops using SOP, Ability to install and configure client applications independently 8) In addition to above, support and perform below activities. a. Exchange and Mobility Clients b. Printer management c. Backup and Recovery d. Audio, Video support e. End Point Security/Patch Management f. Hardware and Networking
Posted 3 months ago
7.0 - 11.0 years
4 - 8 Lacs
Mumbai
Work from Office
We are looking for a skilled System Engineer L3 to provide advanced remote support for operating systems, applications, and end-user technical issues. The ideal candidate will handle escalations, document issue resolutions, and ensure consistent delivery of high-quality customer support experiences. Must-Have Skills - Strong communication and customer handling skills -Expertise in troubleshooting Windows OS, Outlook, Microsoft Teams, Citrix, VDI, VPN, and endpoint security tools - Solid experience in resolving technical issues via remote support channels - Ability to document technical issues and create clear, reusable SOPs -Proficient in incident routing, trend recognition, and escalation management - Familiarity with ticketing systems (e.g., ServiceNow, Remedy)
Posted 3 months ago
10.0 - 15.0 years
35 - 40 Lacs
Bengaluru
Work from Office
Required Skills Technology | Endpoint Management- SCCM Technology | Endpoint Management- Intune Domain | IT in Banking | Customer Support Behavioral | Aptitude | Communication Education Qualification : Any Graduate (Engineering / Science) Certification Mandatory / Desirable : Technology | Azure Infra Management Certification As an SCCM and Intune Level 1 Administrator, you will play a crucial role in providing support for the configuration and management of these Microsoft-based systems. You will work closely with senior administrators and IT teams to ensure the effective deployment of software, updates, monitoring, and mobile device management across our organization. Key Responsibilities: 1. SCCM Configuration and Support: - Assist in the setup, configuration, and maintenance of SCCM infrastructure components, including site servers, distribution points, and client settings. - Provide Level 1 support for SCCM-related issues, troubleshooting software deployments, and client-related problems. 2. Intune Configuration and MDM: - Assist in the configuration of Microsoft Intune for mobile device management (MDM) and endpoint security. - Help onboard and manage mobile devices, ensuring security policies are applied. 3. Software Deployment: - Assist in packaging and deploying software applications, updates, and patches using SCCM. - Collaborate with senior administrators to monitor deployments, resolve issues, and report on software compliance. 4. Operating System Deployment: - Participate in creating and maintaining task sequences for OS deployments using SCCM. - Support the deployment of operating systems and upgrades on client machines. 5. Troubleshooting and Support: - Provide Level 1 support for SCCM and Intune-related issues and incidents, working with end-users and escalating to senior administrators when necessary. - Assist in monitoring the SCCM and Intune environments to ensure proper functionality and performance. 6. Documentation: - Maintain clear and accurate documentation of configurations, processes, and troubleshooting procedures for SCCM, and Intune. - Collaborate with senior administrators to update knowledge base articles. Qualifications: - Bachelor s degree in Information Technology, Computer Science, or a related field (or equivalent experience)
Posted 3 months ago
9.0 - 14.0 years
5 - 11 Lacs
Gurugram
Work from Office
Role & responsibilities Job Summary: Working knowledge of cloud infrastructure (Azure/AWS/GCP), network security, firewalls, and endpoint protection tools. IT Helpdesk & Operations Management Direct daily IT helpdesk operations, including incident management, problem resolution, and service request fulfillment. Monitor SLAs, ticketing workflows, and user satisfaction to ensure service excellence. Job Description: Working knowledge of cloud infrastructure (Azure/AWS/GCP), network security, firewalls, and endpoint protection tools. IT Helpdesk & Operations Management Direct daily IT helpdesk operations, including incident management, problem resolution, and service request fulfillment. Monitor SLAs, ticketing workflows, and user satisfaction to ensure service excellence. Knowledge of ISTM VPC, EC2, ELB, Auto Scaling, Route 53, IAM, Amazon LightSail, CloudWatch, CloudFront, SNS, SES, RDS, EKS. Document DB, Amazon certificate Manager, AWS backup, S3, CloudWatch Google Firebase, Google Analytics, Google Ads, Google Merchant Center, Google SourceTree. Google My business, Google Tag Manager, Google Map. Preferred candidate profile Perks and benefits
Posted 3 months ago
8.0 - 10.0 years
12 - 17 Lacs
Mumbai
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate
Posted 3 months ago
7.0 - 10.0 years
5 - 8 Lacs
Ambattur
Work from Office
Greetings from Datamark!!! Postion : Information Security Analyst Experience : 5 Yrs in Experience Location: Ambattur Industrial Estate , Chennai Position Overview: The Information Security Analyst is responsible for the administration of the organizations information and data security policies and practices of the overall internal security audit program to ensure that the Company is protected in terms of security, compliance and confidentiality. Primary Responsibilities: Coordinates and assists with security activities for the enterprise Operate, maintain, and validate vulnerability scanning of Infrastructure, Applications, and APIs Review daily threat intelligence. Ensures compliance to security standards for assigned sites Schedules and administers internal security audits for Client and Physical Site Audits Follows up on remediation plans Support the management and maintenance of security tools with an emphasis on Security Information and Event Monitoring (SIEM) tools. Assist with the review of technical deployments for risk prior to deployment across the campus. Recommends risk mitigation solutions based on audit findings Maintains Security and Compliance Metrics monthly Assists in the development and delivery of IT risk and security awareness and compliance training programs Willingness to travel to DATAMARK global sites as necessary Other duties as assigned Minimum Qualifications: Education Requirements: Bachelors degree in Computer Science or related field, experience in lieu of degree can be considered Field Experience: At least four years of experience in Information Security Position Experience: At least four years of experience in an Information Security Analyst position, or similar position Demonstrated experience with traditional vulnerability analysis: identify, categorize, prioritize, track, and validate remediation of known vulnerabilities by accountable IT teams Other Qualifications: Certification in IT Security required Knowledge in Information Security policies and practices Knowledge of third-party auditing and risk assessment methodologies Experience in an IT Security related environment preferred Required Skills: Extremely organized and detail oriented. Capable of holding team members accountable to timely delivery of audit evidences. Practices and methods of IT strategy, enterprise architecture and security architecture Excellent analytical and problem-solving abilities to identify and remediate security risks Team-work mentality to develop security solutions in collaboration with other IT professionals If you are interested please share your updated resume to jagadish.jayavel@datamark.net or contact us 9500681139
Posted 3 months ago
8.0 - 10.0 years
12 - 17 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations
Posted 3 months ago
8.0 - 10.0 years
12 - 17 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations
Posted 3 months ago
8.0 - 10.0 years
12 - 17 Lacs
Mumbai
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Fortinet Firewall.
Posted 3 months ago
8.0 - 10.0 years
12 - 17 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Fortinet Firewall.
Posted 3 months ago
8.0 - 10.0 years
12 - 17 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Fortinet Firewall.
Posted 3 months ago
5.0 - 10.0 years
4 - 9 Lacs
Mumbai, Hyderabad, Chennai
Work from Office
Detailed Job Description: Strong knowledge of networking (Firewalls, routing, TCP/IP, Packet flow and analysis), Operating System (MS Windows, Unix/Linux/Ubuntu), Information Security Concept (Vulnerability, Hardening, OWASP TOP 10, CIA Tried and related controls etc.. • Hands-On experience on different security tools like Network Security (WAF, Network APT, Secure Web Gateway), IAM (PIM, RSA), Endpoint, Security (EDR, DAM, NAC, DLP, FIM, IRM, SIEM/SOAR, Active Directory, Web Application etc. • Good communication, managerial, documentations (i.e presentations, dashboards, HLD/LLD, SOPs, Policies & Configuration etc) and project management skills, should be capable enough to coordinate with different stakeholders. • Experience in Incident management, change management, problem, capacity planning, Migration and availability management etc. • Hand-On experience in automation and optimization (i.e. scripting, ansible, rest API etc) of security tools to minimize manual intervention, human error and faster resolution/response. • Responsible for day-to-day operations and handle technical escalations by L1 and NPCI team, perform root cause analysis, Initiate RMA, follow call closure, assist in internal and external audit, ensure meet SLA as defined, managing L1 team, etc. • Accountable for team building, resource management, skill enhancement, cross function learning and working etc • Certifications: Relevant certifications i.e Certified Endpoint Protection Professional, CEH, CISM, CISSP, CISA, ITIL, COBIT, ISO 27001 etc.
Posted 3 months ago
8.0 - 12.0 years
15 - 25 Lacs
Mohali
Hybrid
Sr. Manager Technology: Sr. Manager Technology is responsible for monitoring the efficiency and performance of the company's technology and oversee the overall Information Technology Operations. He makes sure that the processes defined are adhering and working as per the policies designed to meet the requirement of security and compliance standards of the Organization. KRAs (Technical) Managing and maintaining the overall IT infrastructure of the Organization. End user support as per the SLAs defined. Monitoring and measuring the performance of team members through metrices for the weekly reports. Handling escalations from the business stakeholders/Departments. Oversee the technological changes for the Organization. VAPT (Vulnerability and Penetration testing) / Security rating of the company. Automated Firewalls backup, Server backups, configuration backups. O365 security implementation, SPAM/Security policies to resist the SPAM. O365/SharePoint administration, MS Teams administration. Thorough understanding of end point security like Dell Carbon black and security policies. Technical understanding of Windows/Linux Server administration, Security hardening. MAC OS, iOS platform knowledge. A very good understanding of VOIP infrastructure and Telecom providers for the VOIP services. Hands on to an ITIL/ITSM compliant tool like Fresh Service to manage and maintain the inventory. Knowledge of best security practices and tools to backtrack any security issues like Spamming/Phishing/email headers etc. VPN, IPsec tunnels, security policies implemented at Org level (may include URL filtration as well) Technical exposure to routers/switches/Access points and wireless technologies. Security patching, version control, Change management. Vendor management to choose the right product/services. KRAs (Compliances) Prior experience to work and collaborate as an auditee for ISO 9001 -27001, GDPR, SOC2 Type 2, CPRA, and RFPs filling. Well versed with the security policies as per the ISMS standards. Main auditee for the internal/external audits for the Organization. Ambitious to map the controls with the defined security policies. Good writing skills to draft the policies and procedures. Maintain compliance documents archives and document libraries for different stakeholders/Departments in MS Teams, SharePoint/NAS. Maintain and review the access approvals/approval mechanism aligned with the polices. Maintain the physical security of IT Assets as per compliance and security standards. KRAs (Team Management) A mentor to motivate the team by not only managing the team but showing them the path to achieve the Objectives defined by the Management. Working in a direction with a mutual goal set by the Management. Team player to guide the team for the betterment of the Department/Organization. Positive mindset to handle the conflicts and to guide the team members. A good speaker demonstrating the leadership qualities to motivate the team. Desirable (Communication skills) Must have a fluent speaker to interact with the US folks and top management. Should have an advanced level writing and office grammar skills. Strong PowerPoint presentation skills to present the decks/business cases in the management meetings. Ready to represent the Department in the events/public meetings. Additional skillsets: Microsoft Partnership portal management, Channel partnership management, Software licenses, Azure administration for D365, SendGrid for bulk email sending, mail chimp, MS Visio knowledge for layout diagrams.
Posted 3 months ago
5.0 - 10.0 years
15 - 20 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats. Do Design and develop enterprise cyber security strategy and architecture Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses Identify risks associated with business processes, operations, information security programs and technology projects Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge Identify security design gaps in existing and proposed architectures and recommend changes or enhancements Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. Provide support during technical deployment, configuration, integration and administration of security technologies Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity Provide solution of RFP’s received from clients and ensure overall design assurance Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture Depending on the client’s need with particular standards and technology stacks create complete RFPs Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps Evaluate and recommend solutions to integrate with overall technology ecosystem Tracks industry and application trends and relates these to planning current and future IT needs Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers Provide training to employees on issues such as spam and unwanted or malicious emails Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Program Manager/Director Regular reporting & updates Infrastructure (CIS team) For infrastructure support External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming security technologies (e.g. Firewalls, IPS, DDoS, SIEM, WAF, Endpoint etc.) and understanding of compliance regulatory requirement like PCI DSS, HIPAA, etc.- Expert Systems Thinking - Understanding of the Wipro system (interrelatedness, interdependencies and boundaries) and perform problem solving in a complex environment - Expert Leveraging Technology - In-depth knowledge of and mastery over ecosystem technology that commands expert authority respect - Master Technical Knowledge - Certified Information Systems Security Professional (CISSP), Cloud Architect Certification from AWS and Azure, ToGAF or SABSA certification- Master Competency Levels Foundation Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. Competent Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. Expert Applies the competency in all situations and is serves as a guide to others as well. Master Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. Behavioral Competencies Effective Communication Managing Complexity Client centricity Technology Acumen Innovation Problem Solving approach Collaborative Working Execution Excellence Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2. Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led
Posted 3 months ago
10.0 - 15.0 years
12 - 17 Lacs
Pune
Work from Office
Wipro Limited (NYSE:WIT, BSE:507685, NSE:WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role : Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 3 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |