Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
4.0 - 9.0 years
5 - 11 Lacs
Mumbai, Thane, Mumbai (All Areas)
Work from Office
Role & responsibilities Identify potential customers in the Pharma /BFSI /Manufacturing/Healthcare other industries along with the OEMs and build strong relationships with key decision-makers in the OEM and customers. Conduct market research and analysis to identify new business opportunities and stay updated with industry trends and competitors and build repo with CISOs. Deliver product presentations and demonstrations to prospective clients, highlighting the features and benefits of our cybersecurity solutions. Collaborate with the marketing team to develop sales collateral, including presentations, case studies, and proposals as per joint go to strategy with the OEMs. Manage the complete sales cycle, from lead generation to deal closure, ensuring timely follow-ups and effective pipeline management along with the OEMs. Negotiate contracts and pricing agreements with customers, while ensuring profitability and customer satisfaction. Provide regular updates and interlock with the Account management and SE team of focused OEM along with the senior management team. Stay updated with the latest advancements in the cybersecurity industry and continuously enhance product knowledge along with key OEM certifications. Preferred candidate profile The candidate must have experience in "Cyber security Sales".
Posted 4 days ago
0.0 - 2.0 years
3 - 4 Lacs
Hyderabad
Work from Office
We have urgent requirement for security positions Company : Mphasis Job Type : Full Time Skill: Email security,ATP, Network security, Cloud security Exp : 0 to 8 Yrs Np: Immediate -30Days Location : Any Mphasis If you are interested share your details. Exp: Rel Exp: Company: Payroll Company: Current CTC: ECTC: Any Offers(mention offered CTC): Notice Period(LWD If serving): Current Loc: Preferred Loc: Have you Applied before for Mphasis(Yes/No): Are you available for Video call interview ?
Posted 4 days ago
3.0 - 6.0 years
20 - 25 Lacs
Pune
Work from Office
Experienced Data Analyst skilled in Python, Tableau, and Power BI with exposure to Intune/SCCM. Strong in IT/endpoint data reporting, compliance insights, and dashboarding. Suitable for hybrid Pune-based UEM analytics roles. Required Candidate profile Looking for a Data Analyst with experience in IT systems or Intune/SCCM. Must know Python, Tableau/Power BI. UEM or endpoint data experience is a plus.
Posted 4 days ago
8.0 - 13.0 years
8 - 12 Lacs
Bengaluru
Work from Office
Cybersecurity Incident Manager is responsible for managing and mitigating enterprise-level cybersecurity incidents leading the coordination and communication of incident response efforts. The main priorities are ensuring timely detection, containment, eradication, and recovery from cyber threats while minimizing operational disruptions. Key Responsibilities Monitor, detect, and respond to security incidents using various security tools and technologies. Execute containment, eradication, and recovery procedures during incidents to minimize impact and restore normal operations. Develop and maintain incident response playbooks and escalation procedures to ensure a consistent and efficient response to incidents. Collaborate with other IT and security teams to remediate vulnerabilities and improve the overall security posture. Prepare detailed and accurate incident reports and documentation for internal use and for external stakeholders, if necessary. Stay current with the latest threats, vulnerabilities, and security technologies to ensure effective detection and response capabilities. Serve as the primary coordinator during cybersecurity incidents, aligning efforts across technical and business teams. Conduct real-time analysis and correlation of security events from multiple sources including SIEM, IDS/IPS, firewalls, and endpoint security solutions. Perform in-depth investigation and analysis of security incidents, including malware analysis, forensic investigations, and reverse engineering. Participate in threat hunting activities to proactively identify and mitigate potential security risks. Stay informed about new threats and trends in cybersecurity to enhance response skills. Ensure compliance with the organization's incident response framework and regulatory requirements. Coordinate with Enterprise Risk Management, SOC, Legal, IT, Data Privacy, and other functions for a unified response. Collaborate with third-party vendors and MSSPs as needed. Act as the primary contact for incident updates to executive leadership and stakeholders. Generate comprehensive reports during and after incidents, including root cause analysis and mitigation strategies. Supervise the creation of post-incident reports and ensure that lessons learned are integrated into future planning strategies. Propose security improvements to prevent the reoccurrence of incidents. Perform regular tabletop exercises and simulations to train and prepare teams. Qualifications Bachelors degree in Computer Science, Information Security, or a related field, or equivalent work experience. At least 12+8 years of experience in a SOC or similar security-focused environment. Experience in managing large-scale cybersecurity incidents. Understanding of regulatory requirements and industry standards (e.g. GDPR, HIPAA, PCI-DSS). Proficient written and verbal communication skills. Strong hands-on experience with SIEM platforms (e.g. Palo Alto XSIAM, Splunk, QRadar), IDS/IPS systems, firewalls, endpoint security tools and service management tools (e.g. ServiceNow) Proficiency in conducting forensic investigations and malware analysis. Experience with scripting and automation tools (e.g., Python, PowerShell) to streamline incident response tasks. Deep understanding of network protocols, operating systems, and common attack vectors. Relevant certifications such as CISSP, CISA, CISM, CEH, or GIAC are highly desirable. Excellent problem-solving skills and the ability to work under pressure in a fast-paced environment. Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 4 days ago
7.0 - 12.0 years
20 - 25 Lacs
Pune
Work from Office
Mandate Skills- SIEM, PAM, Endpoint security & Vulnerability assessment. Key Responsibilities Incident Response and Management: Lead the incident response process, including identification, containment, eradication, and recovery. Analyze and respond to complex security incidents and breaches. Conduct post-incident analysis and develop reports with recommendations to prevent future incidents. Security Monitoring and Analysis: Oversee the continuous monitoring of security alerts and events. Analyze logs and data from various sources (e.g., SIEM, firewalls, EDR, IDS/IPS) to identify suspicious activity. Perform advanced threat hunting and forensic analysis. Vulnerability Management: Conduct regular vulnerability assessments. Identify, prioritize, and remediate security vulnerabilities in systems and applications. Collaborate with IT and development teams to implement security patches and updates. Security Architecture and Engineering: Design and implement security solutions to protect the organization's networks, systems, and data. Develop and maintain security policies, standards, and procedures. Evaluate and recommend new security technologies and tools. Compliance and Risk Management: Ensure compliance with relevant regulatory requirements and industry standards (e.g., ISO 27001, NIST). Perform risk assessments and develop mitigation strategies. Document and maintain security controls and frameworks. Required Skills and Qualifications Technical Expertise: Advanced knowledge of cybersecurity principles, techniques, and technologies. Proficiency in using security tools such as SIEM, IDS/IPS, firewalls, and endpoint protection solutions. Experience with vulnerability management, penetration testing, and forensic analysis. Experience: Minimum of 7-10 years of experience in cybersecurity, with at least 2-3 years in an L3 or senior role. Proven track record of handling complex security incidents and leading incident response efforts. Experience in designing and implementing security architectures and solutions. Certifications: Relevant certifications such as CISSP, CISM, CEH, GIAC, or equivalent are highly desirable. Analytical and Problem-Solving Skills: Strong analytical skills with the ability to identify and mitigate security threats. Excellent problem-solving skills and the ability to think critically under pressure. Communication and Collaboration: Strong communication skills, both written and verbal. Ability to collaborate effectively with cross-functional teams and stakeholders. Preferred Skills and Qualifications Experience with cloud security (e.g., AWS, Azure, Google Cloud). Knowledge of scripting and automation tools (e.g., Python, PowerShell). Familiarity with regulatory requirements and standards (e.g., GDPR, HIPAA).
Posted 4 days ago
2.0 - 3.0 years
3 - 6 Lacs
Bengaluru
Work from Office
Suprajit Engineering Ltd. is looking for Network Security Engineer to join our dynamic team and embark on a rewarding career journey Maintaining LAN, WLAN and architecture of the server as per the business policy Reporting the security analysis of findings Maintaining the regulatory systems about ISMS policy (Information System Management Systems) Developing the security authentication protocol Maintaining server and switches Maintaining & implementation of the SOP for Network securityKnowledge of performing routing protocols (MPLS, HAIPE/IP, QOS and WAN) Monitoring of web security gateways, perimeter security, network access controls, endpoint security
Posted 4 days ago
5.0 - 10.0 years
14 - 24 Lacs
Hyderabad, Chennai
Hybrid
JD Background in Data Analysis Experience in training Artificial Intelligence models, with special focus on prompt engineering Two years related work experience in Data Loss Prevention (DLP), and/or Cybersecurity. For DLP, experience providing recommendations for tuning content detection rules to improve accuracy, a plus Able to learn and apply new concepts quickly Proven analytical and problem solving abilities Able to learn and apply new concepts quickly Proven analytical and problem solving abilities Strong communications skills Responsibilities: train Machine Learning (AI) models in answering Data Loss Prevention topics Be an advocate of users of Artificial Intelligence (AI): understand and give prompts from user perspective. generate metrics for AI responses Evaluate AI responses and generate comprehensive feedback about the prompt and the responses Document and articulate the AI feedback into guide books Communicate the AI feedback across stakeholders and drive continuous improvements The JD for the DLP role is still accurate. We want candidates who has domain knowledge in using DLP module of compliance tools such as: MS Purview ProofPoint ForcePoint Symantec DLP others
Posted 4 days ago
5.0 - 7.0 years
8 - 12 Lacs
Chennai
Work from Office
Role & responsibilities Design, implement, and manage endpoint security solutions, including antivirus, EDR, NDR, XDR and intrusion detection prevention systems. Expertise required on DLP and DAM solution to build up the protection policies and deployment with hands on troubleshooting skills Monitor endpoint security systems to detect and respond to security incidents. Conduct regular security assessments and vulnerability scans to identify potential security weaknesses. Ensure that endpoint security systems are configured and maintained in accordance with security best practices and industry standards. Collaborate with other IT teams and systems administrators to ensure that endpoint security solutions are integrated into the organization s overall security posture. Research and evaluate new security technologies and make recommendations for implementation. Develop and implement security policies and procedures for end users, including guidelines. Provide training and support to end users on how to use endpoint security solutions effectively. Respond to security incidents and participate in incident response efforts as required. Stay up to date on the latest security trends and developments and maintain a high level of technical expertise in the field of endpoint security. Required troubleshooting skills for all end point security system such as AV, NDR,VA and NAC solution Expertise on OS Linux, windows and MAC.. Managing the systems and keep them up to date with the latest patches. Strong Skills required related to network component such as routing, Switch Requirements and skills Proven hands-on 5 to 7 years as Endpoint security engineering experience Certification in endpoint security products such EDR, DLP & Deception technology. Deep understanding of endpoint security products (e.g., Sentinel one, Force point,Trendmicro) Solid understanding of the OSI or TCP/IP model Hands-on experience with monitoring, diagnostic and analytics tools Degree in Computer Science. Immediate availability is preferred Perks and benefits
Posted 4 days ago
10.0 - 15.0 years
20 - 30 Lacs
Chennai
Work from Office
As the Chief Information Security Officer (CISO) at Galaxy Health Insurance, you will lead the development and implementation of a robust cybersecurity strategy to safeguard digital assets and data. This role ensures compliance with Indian regulations (IRDAI, DPDPA) while mitigating risks in cloud infrastructure, APIs and third-party ecosystems. Role & responsibilities Cybersecurity Strategy & Execution Design and execute a comprehensive enterprise-wide information security strategy aligned with IRDAI guidelines, ISO 27001, and global best practices. Secure core systems including APIs, applications, databases and cloud workloads. Integrate cybersecurity into digital transformation, DevSecOps, and product lifecycle initiatives. Policies & Governance Define, develop, implement, and maintain information security policies, standards, and procedures. Ensure policy enforcement across departments through regular audits, compliance reviews and corrective action plans. Review and update policies in response to threat landscape changes and regulatory updates. Embed policy controls in business processes, vendor SLAs and IT operations. Regulatory Compliance & Risk Management Ensure compliance with IRDAI cybersecurity regulations, DPDPA, HIPAA (as applicable), and ISO 27001. Conduct risk assessments, privacy impact assessments, and internal security audits. Monitor and manage cybersecurity risks related to third parties and APIs. Security Operations & Incident Response Lead the Security Operations Center (SOC), incident response team, and threat monitoring processes. Establish and maintain robust incident response and disaster recovery plans. Ensure timely breach detection, containment, investigation, and regulatory reporting, especially for PII and financial data breaches. Collaboration & Stakeholder Engagement Work closely with IT, application owners, operations, legal, compliance, and external providers to ensure secure operations. Serve as the key liaison with regulators (e.g., IRDAI), auditors, and industry bodies on security matters. Oversee security due diligence for partnerships, vendor onboarding, and mergers/acquisitions. Training & Awareness Build and maintain an organization-wide security awareness program, including phishing simulations and secure data handling training. Promote a culture of security and data privacy across all levels of the organization. Reporting & Metrics Provide regular reports and dashboards to executive leadership and the board on the organizations security posture, key risks, and ongoing initiatives. Track key risk indicators (KRIs), audit findings, and mitigation timelines. Requirements and skills Bachelors or Masters degree in Information Security, Computer Science, Information Technology, or a related field. 10–15 years of progressive experience in information security, with at least 5 years in a leadership or CISO role, preferably within the insurance sector. Strong understanding of IRDAI cybersecurity regulations, HIPAA, NIST, and ISO/IEC 27001 standards. Hands-on expertise in cloud security, Identity and Access Management (IAM), data privacy, SOC operations, Vulnerability Assessment and Penetration Testing (VAPT) and security monitoring tools. Demonstrated success in managing security program governance, risk management initiatives, and regulatory audit readiness. Industry-recognized certifications such as CISSP, CISM, CISA, CRISC, HCISPP, or ISO 27001 Lead Implementer are highly preferred. Excellent leadership, communication, and stakeholder engagement skills. Immediate availability is preferred Perks and benefits
Posted 4 days ago
12.0 - 15.0 years
25 - 30 Lacs
Bengaluru
Work from Office
The IT Infrastructure Security Lead is responsible for managing and overseeing the security of the organization's IT infrastructure, including office environments and data centres. This role focuses on safeguarding hardware Required Candidate profile Protection of IT assets, including hardware, data centers, and network infrastructure. Proactive identification and mitigation of infrastructure vulnerabilities. Close collaboration with the IT team
Posted 6 days ago
10.0 - 20.0 years
35 - 50 Lacs
Bengaluru
Work from Office
Design, implement, and assess cybersecurity controls across IT and OT environments. Conduct vulnerability assessments, develop secure architectures, and ensure compliance with standards Required Candidate profile Experienced in hands-on cybersecurity engineering and threat assessment with exposure to IT and OT. Strong in vulnerability scanning, architecture reviews, and cross-functional collaboration.
Posted 6 days ago
5.0 - 8.0 years
8 - 12 Lacs
Thane
Work from Office
Qualifications. Proven experience in information security management roles. In-depth knowledge of information security principles and practices. Experience in developing and implementing information security policies and procedures. Familiarity with regulatory requirements and industry standards related to information security. Strong understanding of network security, cryptography, identity and access management, and security architecture. Experience with security risk assessments and vulnerability management. Knowledge of security technologies, such as firewalls, intrusion detection/prevention systems, antivirus, and endpoint security. Excellent communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams. Bachelor’s degree or higher in Information Security, Computer Science, or a related field. Relevant certifications (e.g., CISSP, CISM, CISA) are a plus. Demonstrated leadership skills and the ability to mentor and guide a team. Show more Show less
Posted 1 week ago
3.0 - 7.0 years
8 - 12 Lacs
Gurugram
Work from Office
Dentsply Sirona is the world’s largest manufacturer of professional dental products and technologies, with a 130-year history of innovation and service to the dental industry and patients worldwide. Dentsply Sirona develops, manufactures, and markets a comprehensive solutions offering including dental and oral health products as well as other consumable medical devices under a strong portfolio of world class brands. Dentsply Sirona’s products provide innovative, high-quality and effective solutions to advance patient care and deliver better and safer dentistry. Dentsply Sirona’s global headquarters is located in Charlotte, North Carolina, USA. The company’s shares are listed in the United States on NASDAQ under the symbol XRAY.. Bringing out the best in people. As advanced as dentistry is today, we are dedicated to making it even better. Our people have a passion for innovation and are committed to applying it to improve dental care. We live and breathe high performance, working as one global team, bringing out the best in each other for the benefit of dental patients, and the professionals who serve them. If you want to grow and develop as a part of a team that is shaping an industry, then we’re looking for the best to join us.. Working At Dentsply Sirona You Are Able To. Develop faster with our commitment to the best professional development.. Perform better as part of a high-performance, empowering culture.. Shape an industry with a market leader that continues to drive innovation.. Make a difference -by helping improve oral health worldwide.. Scope. The Senior Security Analyst is responsible for maintaining security systems, implementing process automation, and responding to security incidents. They must have a thorough understanding of both cloud-based and on-prem environments and threats. They serve as an escalation point for incident response and the support of security toolsets. They must be capable of working on multiple projects and alerts with general supervision.. Key Responsibilities. Administer, monitor, and maintain cloud-based and on-prem security systems.. Coordinate the implementation and upgrade of security systems.. Administer, monitor, and maintain automated security response tools.. Develop and maintain automated security processes and workflows.. Investigate and remediate security related alerts for both cloud-based and on-prem systems.. Investigate and remediate security policy violations.. Research threat actors, tactics, techniques, procedures, malware, and other IOCs.. Engineer and tune custom alerts for security systems.. Research emerging security technologies and make recommendations to influence security initiatives.. Assist with documentation and training related to security systems.. Act as an escalation point and mentor for junior analysts.. Act as an escalation point and oversee relationship with hosted SOC.. Act as a technical point of contact during security incidents.. Prepare security reports for benchmarking security efficiency.. Collaborate with cross-functional teams to support security initiatives of varying complexity.. Typical Background. Education: BS/BA Degree in Computer Information Systems, Computer Science, Information Systems Management, or equivalent professional experience. Certifications/Licensing: COMPTIA Security+, CEH, CISSP, GIAC Security Essentials, CCNA Security, Google Professional Cloud Security Engineer. Years and Type of Experience: 6+ years of experience in Information Systems with at least 2 years of formal experience in Cyber Security.. Excellent English written and spoken communication skills with the ability to explain technical information to non-technical people.. Key Required Skills, Knowledge And Capabilities. Experience with the Microsoft Suite of Security Tools.. Experience with configuration and management of security solutions for Google Cloud, Microsoft Azure, and/or Amazon Web Services.. Experience with configuration and management of endpoint security solutions including EDR and DLP.. Experience with process and security automation.. Experience with SIEM configuration, alert tuning, and KQL.. Experience with configuration and management of Office 365 services and security solutions.. Experience with incident response.. Must have excellent technical writing and research skills.. Experience with Microsoft Windows, Linux, and macOS.. Willing to work non-standard hours and be on-call.. Team player.. Ability to work with ambiguity.. Resilience to change.. Communication skills.. Integrity.. Open minded, respectful, empathetic ability to work in a multicultural environment.. Analytical thinking, problem solving.. DentsplySirona is an Equal Opportunity/ Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, sexual orientation, disability, or protected Veteran status. We appreciate your interest in DentsplySirona.. If you need assistance with completing the online application due to a disability, please send an accommodation request to careers@dentsplysirona.com. Please be sure to include “Accommodation Request” in the subject.. Show more Show less
Posted 1 week ago
2.0 - 5.0 years
11 - 15 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
About Us. At SentinelOne, we’re redefining cybersecurity by pushing the limits of what’s possible—leveraging AI-powered, data-driven innovation to stay ahead of tomorrow’s threats.. From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We’re looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you’re excited about solving complex challenges in bold, innovative ways, we’d love to connect with you.. What are we looking for?. If you’re passionate about enabling customer success through leading and facilitating successful deployments of our highest value accounts, this role is for you. SentinelOne is growing its Customer Success team and looking for a technically skilled project manager. Responsibilities include managing project milestones and timelines in coordination with the customer as well as with internal cross-functional resources in Technical Account Management, Product Management, and Professional Services. The role requires facilitating a partnership between our customers and internal teams to define and implement project KPIs and parameters that will realize optimal ‘time to value’ and enable long-term success and growth.. What will you do?. The key responsibility of this role will be to facilitate a partnership between customers and internal teams, creating an engaging and productive deployment experience for customers throughout their solution adoption phase. Additional responsibilities will include regular cadence reporting on key metrics as defined by CS leaders (ex, indicators of feature adoption or deployment progress), pre-sales support on services, and collaboration with service delivery teams to tailor service offerings to client requirements.. Onboard key customers through full deployment, with a focus on structured project management combined with white-glove relationship management.. Work cross-functionally within SentinelOne with Support, Product Management, Engineering & other teams to provide customers with insight while advocating for their needs. Communicate expectations, project timelines, requirements, and potential blockers to key stakeholders, both internal and external. Lead the deployment project teams in removing obstacles and addressing technical challenges when necessary, including ensuring issues are escalated and actively managed. Expand the client engagement by collaborating with key decision-makers and stakeholders to understand their requirements and continually position our services as the optimal solution for net new, upsell, and renewal opportunities.. Strategic Pre-Sales Support on Services: Collaborate with the Sales, Solution Engineering, & Customer Success Management and service leaders to help with the positioning of our Services offerings and meet sales targets while ensuring ‘right-fit’.. Achieving trusted advisor status by understanding all aspects of the Services portfolio, including MDR, DFIR, Threat Hunting, Strategic Advisory, and Deployment Services.. Demonstrate the value of service positions by executing compelling presentations and demonstrations of our services to prospective clients. Articulate the value proposition of our Services and how they address specific client needs and challenges.. Collaborate with the service delivery teams and customers to ensure alignment between sales, solution engineering, and service execution, and when relevant, provide initial scoping along with the Services team.. What skills and knowledge should you bring?. At least 7 years of prior experience at an enterprise software company (preference to those with Endpoint Protection experience) in related roles (Customer Success, Support, Training, etc.). Experience with managing highly complex implementations and technical engagements for a diverse set of customers, including identifying customer requirements. Customer-focused with experience in customer-facing roles (Customer Success, Support, Professional Services, Customer Onboarding, etc.). Experience with Salesforce and with project management tools like Asana/Atlassian.. Requirement for an existing understanding of customer IT/security architecture and continued learning related to the technical landscape and deployment specifics of SentinelOne product and service offerings. Knowledge of security technologies, architecture, and operations and experience in advising customers on best practices. Knowledge of Windows, MacOS and Linux operating systems as well as containerized environments. Display a talent for building strong relationships and managing customer expectations resulting in high customer satisfaction. Cross-functional excellence with a track record of getting teams to work together on accomplishing complex operational goals. Ability to lead, support, and drive on-going projects and meet deadlines in a complex and dynamic environment. Impeccable written and verbal communication skills. Thrives in a multitasking environment and can adjust priorities on-the-fly. Strategic and creative thinker with well-developed problem-solving and analytical skills. Experience with a structured project management methodology which may include; Agile Methodologies (Including Scrum or Kanban), Lean, Traditional Waterfall, Six Sigma, PMBOK, or a hybrid of these or other methodologies. Experience in the IT or Cybersecurity industry, especially Endpoint Security and SIEM, with host base (endpoint agent) security solutions is preferred. Why us?. You will be joining a cutting-edge company, where you will tackle extraordinary challenges and work with the very best in the industry.. Industry leading gender-neutral parental leave. Paid Company Holidays. Paid Sick Time. Employee stock purchase program. Disability and life insurance. Employee assistance program. Gym membership reimbursement. Cell phone reimbursement. Numerous company-sponsored events including regular happy hours and team building events. SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.. SentinelOne participates in the E-Verify Program for all U.S. based roles.. Show more Show less
Posted 1 week ago
0.0 - 6.0 years
2 - 8 Lacs
Gurugram
Work from Office
Required Skills Behavioral | Aptitude | Communication Technology | Hardware and Networking | Installation, configuration, maintainance and repair Technology | Audio, Video support | Installation and configuration Technology | Windows Operating System | Installation, configuration and management Technology | End Point Security | Antivirus management, data encryption, DLP, desktop firewall, VPN, AD policies Education Qualification : Any Graduate Certification Mandatory / Desirable : Technology | Microsoft 365 Certified | Modern Desktop Administrator Associate 1) Field Services Support Engineers primary responsibility is to provide support to an organization s IT systems to help them meet their business goals, this is done by ensuring that all computers and networks operate efficiently with high uptime. 2) As a desktop engineer, you may need to assemble and install client desktop computers and assist the end-user in securing their hardware. 3) This role also involves hands & feet support for various IT support teams to perform activities related to periodic maintenance to handling individual systems hardware, software, and network queries 4) To support daily technical support activities for computers & all other end point devices. Update the support ticket with the progress, to set up and test desktop computer peripherals. 5) To perform the system changes adhered to organizational policies. 6) Conduct remote desktop troubleshooting to end user issues. Maintain technical documentation in association with other functional departments 7) Technical Skills a. Windows Operating System: b. Ability to Install and troubleshoot different versions of Windows OS independently. E.g. Windows XP. Windows 7, Windows 10 and Windows 11 c. Understanding of desktop applications and how do they work, installation & uninstallation. d. Understanding of domain setup & ability to add / remove computers to domain. update Group policies. carry out Disk management, Disk Encryption, Wireless configuration. check utilization and availability, ability to perform start up and shut down services by following SOP. deploy gold images on multiple desktops using SOP, Ability to install and configure client applications independently 8) In addition to above, support and perform below activities. a. Exchange and Mobility Clients b. Printer management c. Backup and Recovery d. Audio, Video support e. End Point Security/Patch Management f. Hardware and Networking
Posted 1 week ago
6.0 - 8.0 years
7 - 10 Lacs
Ahmedabad
Work from Office
Experience: 6+ Years Key Responsibilities: Design, implement, and manage secure network solutions including firewalls, VPNs, IDS/IPS, and endpoint protection. Monitor and analyze network traffic to identify suspicious behavior and respond to threats. Perform vulnerability assessments and penetration testing to identify risks and provide mitigation strategies. Maintain and update security systems, hardware, and software, including firewalls, routers, switches, and antivirus platforms. Respond to and investigate security incidents, breaches, and alerts. Develop and enforce network security policies, procedures, and best practices. Collaborate with other IT teams to ensure overall system security and performance. Conduct security audits and prepare reports for management and compliance. Keep up to date with the latest cybersecurity trends, threats, and technology solutions. Requirements: Education & Experience: Bachelors degree in Computer Science, Information Technology, or related field. 6+ years of experience in network security or IT security-related roles. Technical Skills: Strong knowledge of network protocols, firewalls (e.g., Palo Alto, Fortinet, Cisco ASA), IDS/IPS, and SIEM tools. Proficiency in configuring and managing routers, switches, and network appliances. Experience with VPNs, SSL, IPsec, and secure remote access solutions. Familiarity with industry standards and frameworks (e.g., NIST, ISO 27001, CIS Controls). Scripting skills (e.g., Python, Bash) are a plus. Soft Skills: Excellent problem-solving and analytical skills. Strong communication and documentation abilities. Ability to work independently and in a team environment.
Posted 1 week ago
2.0 - 5.0 years
8 - 8 Lacs
Bengaluru
Work from Office
Role: Microsoft Defender/MAC Endpoint Vulnerability Management Specialist Role Summary: He/She will be responsible for managing vulnerability remediation activities using Microsoft Defender, with a strong focus on endpoint security and management. Additionally, should possess expertise in Mobile Device Management (MDM) solutions such as Intune, and demonstrate advanced troubleshooting skills at the Windows OS level. Scripting knowledge is considered a plus. Location: Bangalore Preferred Duration: 3 Months(Extendable Project) Date : Immediate Joining also preferred Key Responsibilities: - Review vulnerabilities report, analyze the solutions available and execute vulnerability remediation activities using Microsoft Defender. - Collaborate with the Security Team to assess vulnerabilities and implement mitigation strategies. - Manage endpoint security configurations and policies through Microsoft Defender. - Implement solutions through Mobile Device Management solutions, Intune/WS1/SCCM. - Develop policies as required in collaboration with Product Owners and Security team. - Provide L3 level support for Windows OS-related issues. - Diagnose complex system problems and work towards resolution swiftly. - Utilize scripting languages (e.g., PowerShell) to automate or deploy solutions as needed. - Develop scripts to enhance monitoring capabilities or streamline solution deployment processes. - Maintain comprehensive documentation of processes, incidents, resolutions, and changes implemented. Qualifications: - Proven experience in managing Microsoft Defender Endpoint solutions. - Expertise in MDM tools like Intune/WS1/SCCM. - Strong troubleshooting skills at the Windows OS level. - Proficiency in scripting languages such as PowerShell. - Excellent analytical skills with attention to detail. - Strong communication skills; ability to collaborate effectively with cross-functional teams. - Ability to work independently while managing multiple priorities efficiently. - Work experience with monitoring tools like Nexthink is an advantage.onsibilities
Posted 1 week ago
1.0 - 4.0 years
3 - 6 Lacs
Bengaluru
Work from Office
Job Title: SOC Analyst Location: Bangalore (on site) Experience Level: 1 to 4 years The candidate must be willing to work in rotational shifts 24/7. About ColorTokens At ColorTokens , we empower businesses to stay operational and resilient in an increasingly complex cybersecurity landscape. Breaches happen but with our cutting-edge ColorTokens Xshield platform , companies can minimize the impact of breaches by preventing the lateral spread of ransomware and advanced malware. We enable organizations to continue operating while breaches are contained, ensuring critical assets remain protected. Our innovative platform provides unparalleled visibility into traffic patterns between workloads, OT/IoT/IoMT devices, and users, allowing businesses to enforce granular micro-perimeters, swiftly isolate key assets, and respond to breaches with agility. Recognized as a Leader in the Forrester Wave : Microsegmentation Solutions (Q3 2024) , ColorTokens safeguards global enterprises and delivers significant savings by preventing costly disruptions. Join us in transforming cybersecurity. Learn more at www.colortokens.com . Our culture We foster an environment that values customer focus, innovation, collaboration, mutual respect, and informed decision-making. We believe in alignment and empowerment so you can own and drive initiatives autonomously. Self-starters and highly motivated individuals will enjoy the rewarding experience of solving complex challenges that protect some of the world s impactful organizations - be it a children s hospital, or a city, or the defense department of an entire country. Company Overview: ColorTokens is a fast-growing cybersecurity product company that is redefining the way enterprises protect their digital assets. Our market-leading Xshield platform enables Zero Trust microsegmentation and real-time visibility into application traffic, ensuring robust protection against modern cyber threats. We are looking for passionate and driven individuals to join our mission in building cutting-edge security products. Job Description: Skills and Experience: 1 to 4 years of experience in Cyber Incident response and investigations. Correlate and analyze events using the Splunk/Log Rhythm/Qradar and stellar cyber SIEM tool to detect IT security incidents. Knowledge of network and endpoint security, threat intelligence, and vulnerabilities. Conduct analysis of log files, including forensic analysis of system resource access. Monitor multiple security technologies, such as SIEM, IDS/IPS, Firewalls, Switches, VPNs, networking, and other security threat data sources. Knowledge of sandbox and malware analysis. Knowledge of Cyber Kill Chain and MITRE ATT&CK frameworks functionality. Possible attack activities, such as scans, man in the middle, sniffing, DoS, DDoS, etc. and possible abnormal activities, such as worms, Trojans, viruses, etc. CCNA, CEH, CISSP, GCA, GCIA, GCIH, SANS certification would be preferable. High level of integrity, professionalism, and attention to detail Ability to communicate complex security issues to peers and management alike. A motivated, self-managed individual who can demonstrate above average analytical skills and work professionally with peers and customers even under pressure. Roles & Responsibilities: Investigate alerts, triage, deep dives, and come up with proper action items and remediation plans. Conduct investigation, containment, and other response activities with business stakeholders and groups. Compose incident analysis and find reports for management, including gap identification and recommendations for improvement. Recommend or develop new detection logic and tune existing sensors/security controls. Participate in security incident response through in-depth, technical (log, forensic, malware, packet) analysis. Provide oversight of security alert detection and analysis capabilities across multiple technologies to ensure that security incidents are identified in a timely manner. Escalate and support potential security incidents in line with appropriate processes. Support communications of potential security incidents via multiple channels. Participate in the response to potential security incidents by identifying and communicating relevant supplementary information. Identify and analyze new and emerging threats to determine impacts to G-P and provide guidelines and recommendations pertaining to opportunities to strengthen G-P security posture. Assist with information security due diligence requests as needed. Provide security recommendations to other team members, management, and business stakeholders for solutions, enhancements to existing systems, and new security tools to help mitigate security vulnerabilities and automate repeatable tasks. Conduct security reviews, perform vulnerability assessments, recommend remediation actions, and manage security policies and access controls to monitor, protect, and govern data and applications across private and cloud environments. Qualifications: Education: Bachelor s degree in information technology, Computer Science, Business, Engineering required, or equivalent experience. Certifications: Advanced certifications such as OSCP, GCIH, GSOC, or GCIA. Incident Response Experience: 1 to 4 years of experience in Cyber Incident response and investigations. Strong interpersonal skills with the ability to collaborate well with others. And, strong written, verbal and communication skills must be needed. Why Join Us? Work on a cutting-edge cybersecurity product in a fast-paced startup environment. Collaborate with a world-class team of engineers and security experts. Opportunity to learn, grow, and make a real impact from day one.
Posted 1 week ago
5.0 - 10.0 years
8 - 12 Lacs
Thane
Work from Office
Pre-Sales Engineer (Cyber Security) Experience: 3 5+ years of relevant experience in the design or pre-sales domain - Very strong background in routing switching firewall, and most recent 2 3 years in the Security domain. - Strong knowledge of consultancy services on network security and endpoint security (DLP, EDR/ADR/XDR/MDR, email security, MDM , SSE ). - Solid technical support experience in large-scale cybersecurity projects and mission-critical infrastructures is an advantage Educational Qualifications: Degree in Engineering, C.Sc., or equivalent. Recognized certifications such as CCIE (Security, RS) or equivalent Pre-Sales Engineer (Cyber Security) Experience: 3 5+ years of relevant experience in the design or pre-sales domain - Very strong background in routing switching firewall, and most recent 2 3 years in the Security domain. - Strong knowledge of consultancy services on network security and endpoint security (DLP, EDR/ADR/XDR/MDR, email security, MDM , SSE ). - Solid technical support experience in large-scale cybersecurity projects and mission-critical infrastructures is an advantage Educational Qualifications: Degree in Engineering, C.Sc., or equivalent. Recognized certifications such as CCIE (Security, RS) or equivalent Experience: 3 5+ years of relevant experience in the design or pre-sales domain Experience: - Very strong background in routing switching firewall, and most recent 2 3 years in the Security domain. - Strong knowledge of consultancy services on network security and endpoint security (DLP, EDR/ADR/XDR/MDR, email security, MDM , SSE ). - Solid technical support experience in large-scale cybersecurity projects and mission-critical infrastructures is an advantage Educational Qualifications: Degree in Engineering, C.Sc., or equivalent. Recognized certifications such as CCIE (Security, RS) or equivalent Educational Qualifications:
Posted 1 week ago
3.0 - 5.0 years
15 - 16 Lacs
Bengaluru
Work from Office
Strong understanding of VM principles, methodologies, Microsoft Defender for Endpoint(MDE). scripting languages (e.g., PowerShell, Python) & ServiceNow Intune/Microsoft Endpoint Manager (MEM)
Posted 1 week ago
2.0 - 5.0 years
4 - 8 Lacs
Noida
Work from Office
Position Overview: The Lead Engineer will be responsible for leading the technical operations and support of infrastructure across multiple locations The candidate will leverage deep expertise in managing and configuring various platforms and technologies, such as Tanium, AWS, Android, iOS, and printer management This role involves collaborating with cross-functional teams, improving technology processes, and providing high-level support to ensure seamless technology operations, ShyftLabs is a growing data product company that was founded in early 2020 and works primarily with Fortune 500 companies We deliver digital solutions built to help accelerate the growth of businesses in various industries, by focusing on creating value through innovation, Job Responsibilities: Lead and oversee technology infrastructure, ensuring smooth operations, updates, and configurations Strong experience using Tanium for endpoint security, configuration, and patch management Provide leadership and support in managing mobile device platforms such as Airwatch, Android OS Management, and Google/Chrome OS Administration Configure and manage Windows environments across multiple locations, ensuring efficiency and security Manage and optimize cloud infrastructure using AWS Oversee iOS device configurations, ensuring smooth integration with systems Monitor, configure, and troubleshoot printer management systems across locations Develop and maintain scripts to automate repetitive tasks and enhance system management Provide L2/L3 support for complex technical issues, ensuring quick resolution and minimal downtime Collaborate with cross-functional teams, including IT, Operations, and external vendors, to drive improvements in technology systems Maintain and document standard operating procedures (SOPs) for all aspects of technology management Basic Qualifications: 8 years of experience in IT roles, with a focus on infrastructure management Strong experience using Tanium for endpoint security, configuration, and patch management, Proven experience in managing AWS cloud services Experience in Windows Configuration across multiple locations Familiarity with Airwatch and Android OS Management for mobile device management (MDM) Hands-on experience with Google/Chrome OS Administration Proficiency in managing iOS devices and printer setups in a distributed environment Experience with Linux, Ubuntu, etc , is good to have but not mandatory Strong scripting skills to automate processes and manage infrastructure efficiently Excellent troubleshooting and support skills at L2/L3 levels We are proud to offer a competitive salary alongside a strong insurance package We pride ourselves on the growth of our employees, offering extensive learning and development resources,
Posted 1 week ago
8.0 - 12.0 years
6 - 15 Lacs
Navi Mumbai
Work from Office
Role & responsibilities: Infrastructure Security EDR/AV/ACC/FIM and Sandboxing. Assist in developing security Policies & Standards and reference Architecture for AV/EDR deployment. Assist in formulating policies for threat detection and response in AV/EDR.Minimum 7 years in above mentioned platform technologies Mandate Skill: TrendMicro Vision One, TrendMicro Apex One, TrendMicro Deep Security - all three must.
Posted 1 week ago
1.0 - 4.0 years
2 - 4 Lacs
Hyderabad
Work from Office
Role- Technical process associate Min 1 Yr Exp Into Technical Support International Voice Any Graduate CTC- Up to 4 LPA Work From Office 5 Days working 2 days off both side Cab Shift- US For more info contact HR Haider - 9256424833
Posted 1 week ago
12.0 - 18.0 years
12 - 16 Lacs
Greater Noida
Work from Office
- Develop and enforce security policies, protocols, and procedures. - Oversee security audits and ensure compliance with regulations such as ISO 27001, GDPR, and PCI DSS - incident response Collaborate with IT & business units Coordinate with vendors
Posted 1 week ago
10.0 - 20.0 years
15 - 20 Lacs
Mumbai Suburban
Work from Office
EC-Council is the worlds largest cyber security technical certification body. We operate in 145 countries globally and we are the owner and developer of various world-famous cyber security programs. We are proud to have trained and certified over 220,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide. www.eccouncil.org Sr. Infra Manager & System Admin Position Type: Full Time Location: Mumbai Andheri or Goregaon The System Administrator cum Sr. Infra Manage r is responsible for overseeing and managing the organization's IT infrastructure, ensuring high availability, security, scalability, and cost efficiency. This role involves designing, implementing, and maintaining enterprise-wide IT systems, cloud environments, network infrastructure, cybersecurity frameworks, disaster recovery strategies, and IT automation processes. The position requires proactive leadership in emerging technologies, IT service optimization, and operational excellence while driving innovation, system resilience, and process improvements. The individual will collaborate with cross-functional teams to ensure seamless IT operations, deliver best-in-class technology solutions, and build a high-performance IT team capable of handling dynamic business needs and technological advancements. Key Responsibilities The System Administrator cum Sr. Infra Manager will be responsible for driving IT infrastructure stability, security, and efficiency while ensuring continuous innovation and optimization. This role requires hands-on expertise in managing cloud environments, networks, cybersecurity frameworks, and IT automation. Infrastructure C System Administration Design, deploy, and manage IT infrastructure, including Windows/Linux servers, storage, networks, and cloud environments (AWS, Azure, Kubernetes, Serverless Computing, Edge Computing). Ensure 99.999% uptime for mission-critical systems. Manage Active Directory (AD), DNS, DHCP, VPN, and endpoint security solutions. Windows Server Administration: Active Directory replication troubleshooting, Group Policy enforcement (GPO), and Windows Server migration. Data Center Operations: Maintain physical hardware, cooling, power management, and environmental monitoring. Software License C Compliance: Track license renewals and ensure legal compliance. IT Process Standardization C Automation: Implement automation of repetitive IT tasks using PowerShell, Bash, and ITSM tools, etc Network C Firewall Security Configure, manage, and maintain network infrastructure, including routers, switches, VLANs, firewalls. Implement and maintain firewall security policies (WAF, IDS/IPS, Zero Trust Security Frameworks). Optimize network performance using advanced routing protocols (RIP, OSPF, IGRP, EIGRP). Manage secure remote access (VPN, load balancing, remote desktop security). Cloud C Virtualization Management Administer AWS/Azure cloud infrastructure, optimizing cost, scalability, and security. Implement and manage virtualization platforms (VMware, Hyper-V, Docker, Kubernetes). Ensure clustered virtualization, live migration, and failover clustering for high availability. Maintain cloud-based backup C disaster recovery (DR) solutions. Identity C Access Management (IAM) Oversee Active Directory (AD), LDAP authentication, role-based access control (RBAC). Enforce password policies, multi-factor authentication (MFA), and account security. Automate software distribution via Group Policy (GPO). Manage user migrations and access controls across cloud and on-prem environments. IT Security Compliance Ensure 100% compliance with ISO 27001, ISMS, GDPR, and Zero Trust Security models. Conduct security audits, vulnerability assessments, and penetration testing. Implement endpoint security, data encryption, and email security policies. Collaborate with infosec teams for deploying cybersecurity frameworks. Innovation C Emerging Technologies Evaluate and implement cutting-edge IT solutions, including: AI-driven automation for IT operations. Zero Trust Security Models to enhance cybersecurity. Cloud-native technologies (Kubernetes, Serverless, Edge Computing). Stay updated with emerging trends in cybersecurity, cloud computing, and automation. Pilot next-gen infrastructure projects to maintain competitive advantage. Application Support, Middleware C Release Management Provide infrastructure support to the Application Release Team. Troubleshoot and resolve system-related issues affecting application deployment. Ensure system stability and performance tuning for .Net, Java, PHP-based applications. Manage C secure web servers (IIS, Apache, Tomcat, Node.js) for application hosting. Ensure middleware stability C performance for application deployments. Stakeholder C Customer Engagement Engage proactively with business leaders and stakeholders to align IT with business objectives. Collaborate with cross-functional teams to ensure IT solutions meet business requirements. Establish structured feedback mechanisms for continuous IT service improvements. Conduct regular IT performance reviews to ensure alignment with customer expectations. IT Support, End-User Training C Helpdesk Coordination Oversee Level 2 C Level 3 IT support, ensuring quick resolution of issues. Ensure 100% SLA compliance for IT ticket resolution. Conduct end-user training on IT best practices C cybersecurity awareness. Implement and maintain enterprise-wide IT policies. Disaster Recovery (DR) C Business Continuity Planning (BCP) Design and regularly test DR plans to ensure rapid recovery from outages. Ensure cloud failover mechanisms are tested and operational. Conduct Business Impact Analysis (BIA) and IT risk assessments. Perform quarterly DR drills to validate backup and recovery effectiveness. Sustainability C Cost-Effectiveness Implement Green IT practices, optimizing energy consumption and cloud resource utilization. Adopt sustainability-focused technologies such as energy-efficient data centers. Optimize IT expenditure through vendor negotiations C resource management. Team Leadership C Capability Development Develop and mentor a high-performing IT team, ensuring continuous upskilling in emerging technologies. Establish structured training programs for IT staff, encouraging certifications and knowledge-sharing initiatives. Foster a culture of innovation and learning within the IT department. Qualifications/Technical Skills Bachelor's degree. Certifications in AWS, Azure, ITIL, CISSP, or equivalent are preferred. 10+ years of experience in IT infrastructure management, networking, and cybersecurity. Expertise in Windows/Linux administration, Active Directory, DNS, DHCP, VPN, IAM. Strong knowledge of firewall security (WAF, IDS/IPS, Zero Trust Security). Hands-on experience in cloud computing (AWS, Azure, Kubernetes, Docker). Familiarity with ITSM, IT process automation (e.g. PowerShell, Bash, etc). Strong leadership, problem-solving, and communication skills. Additional Information We are an equal opportunity workplace and are an affirmative action employer. We are always committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity, or Veteran status and we do not discriminate on the basis of such characteristics or any other status protected by the laws or regulations in the locations where we work. This job description has been designed to indicate the general nature and level of work performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of employees assigned to this job. EC-Council is committed to working with and providing reasonable accommodation to individuals with disabilities. If you have a medical condition or disability which inhibits your ability to complete any part of the application process and are in need of a reasonable accommodation to complete the process, please contact us ecchr@eccouncil.org and let us know how we may assist you. This notice together with our Privacy Policy and Terms of Use of this website and any other documents we mention here are meant to inform you on what personal data about you we collect, use, disclose, share or otherwise process when you are applying for a job at EC-Council or when EC-Council contacts you for recruitment purposes. Please read carefully to understand our views and practices on how we protect your personal data - Privacy Policy | EC-Council (eccouncil.org).
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6464 Jobs | Ahmedabad
Amazon
6352 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane