Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3 - 8 years
7 - 14 Lacs
Bengaluru, Hyderabad, Mumbai (All Areas)
Work from Office
Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Network Security Implementation Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : BE B Tech M Tech Summary: As an Application Tech Support Practitioner, you will be responsible for providing ongoing support to clients and ensuring the smooth functioning of systems and applications. Your typical day will involve accurately defining client issues and designing effective solutions based on deep product knowledge, while maintaining exceptional communication skills to keep our world-class systems running. Roles & Responsibilities: - Provide ongoing support to clients, acting as the interface between the client and the system or application. - Accurately define client issues and interpret and design effective solutions based on deep product knowledge. - Maintain exceptional communication skills to keep our world-class systems running smoothly. - Collaborate with cross-functional teams to ensure the smooth functioning of systems and applications. - Stay updated with the latest advancements in network security implementation and integrate innovative approaches for sustained competitive advantage. Professional & Technical Skills: - Must To Have Skills: Experience in network security implementation. - Must To Have Skills: Exceptional communication skills. - Good To Have Skills: Experience in cloud tech support. - Good To Have Skills: Experience in software/application tech support. - Strong understanding of systems and applications. - Solid grasp of network security implementation techniques. - Experience with troubleshooting and problem-solving. - Experience with collaboration and cross-functional teams. Additional Information: - The candidate should have a minimum of 3 years of experience in network security implementation. - The ideal candidate will possess a strong educational background in information technology operations, computer science, or a related field, along with a proven track record of delivering impactful solutions. - This position is based at our Pune office. BE B Tech M Tech
Posted 4 months ago
4.0 - 7.0 years
7 - 17 Lacs
noida
Work from Office
Security Engineer (TAC Support) Incedo is a US-based consulting, data science and technology services firm with over 2,000 people helping clients from our six offices across US and India . We help our clients achieve competitive advantage through end-to-end digital transformation. Our uniqueness lies in bringing together strong engineering, data science, and design capabilities coupled with deep domain understanding. We combine services and products to maximize business impact for our clients in telecom, financial services, product engineering and life science & healthcare industries . Working at Incedo will provide you an opportunity to work with industry leading client organizations, deep technology and domain experts, and global teams . Incedo University , our learning platform, provides ample learning opportunities starting with a structured onboarding program and carrying throughout various stages of your career. A variety of fun activities are also an integral part of our friendly work environment . Our flexible career paths allow you to grow into a program manager, a technical architect or a domain expert based on your skills and interests. Technical skills requirements Act as the escalation point for Level 1 support, resolving complex customer issues related to Endpoint Security (EDR, AV, device control), AuthPoint MFA, and cloud integrations. Provide L2 support via phone, email, and case portal, ensuring timely resolution within defined SLAs and proper escalation of critical issues. Troubleshoot real-time issues involving: Endpoint agent deployment, performance degradation, etc Guide customers on advanced configuration, secure deployment, and optimization of MFA and endpoint security policies. Support integration of AuthPoint with identity providers such as Active Directory, LDAP, RADIUS, Azure AD, and SAML-based applications. Perform deep-dive analysis of threat detection logs, cloud sync issues, and endpoint behavior anomalies. Maintain comprehensive case documentation, including troubleshooting steps, findings, and resolution in the ticketing system. Contribute internal knowledge base articles and suggest improvements to existing documentation. Collaborate with L3 engineering, QA, and product teams for unresolved issues and product-level bugs. Participate in on-call rotations and support coverage for high-priority or after-hours incidents as needed. Nice-to-have skills Strong understanding of: Endpoint Protection (EPP), EDR, threat lifecycle Windows-based systems (event logs, registry, services, GPO) Antivirus engines, malware types, and threat remediation Hands-on experience with Panda/WatchGuard products is highly preferred. Experience in a fast-paced support center managing cases, SLAs, and escalation protocols. Strong customer communication, ticket hygiene, and problem analysis skills. Qualifications 4-6 years' experience in a TAC or Enterprise Technical Support environment, preferably for a security or endpoint product. BSc, BCA, B. Tech., M. Tech. or MCA or an equivalent degree from a reputed university We are an Equal Opportunity Employer We value diversity at Incedo. We do not discriminate based on race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status. Thanks, HR Team
Posted Date not available
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk.Experience: 8-10 Years.
Posted Date not available
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Key Responsibilities: Design and implement Zero Trust Architecture (ZTA) strategies, aligned with NIST 800-207 or similar frameworks. Lead the development of security reference architectures and roadmaps for Zero Trust implementation. Collaborate with cross-functional teams including IT, network, DevOps, and application teams to integrate Zero Trust principles into all environments (on-prem, cloud, hybrid). Develop policies and controls around identity verification, least privilege access, micro-segmentation, and continuous authentication. Lead risk assessments and gap analyses related to Zero Trust controls. Provide guidance on appropriate Zero Trust technologies and tools (e.g., SDP, ZTNA, CASB, IAM, EDR). Serve as a subject matter expert (SME) on Zero Trust and represent the organization in internal and external audits and compliance reviews. Stay updated on the latest security trends, threats, and technologies. Qualifications: 5+ years of experience in cybersecurity architecture, network security, or IT security engineering. 2+ years of hands-on experience designing or implementing Zero Trust frameworks. Strong knowledge of Zero Trust principles, identity and access management, encryption, segmentation, and endpoint security. Experience with cloud security AWS preferred , SASE, SD-WAN, and secure access tools. Familiarity with frameworks such as NIST 800-207, NIST CSF, ISO 27001, or MITRE ATT&CK. Relevant certifications (e.g., CISSP, CCSP, CISM, Azure Security Engineer, Zero Trust Certified Architect) are a plus. Strong communication skills and the ability to translate technical requirements into business solutions. Mandatory Skills: Cloud Security Posture Management.Experience: 5-8 Years.
Posted Date not available
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Security Information Event Management.Experience: 8-10 Years.
Posted Date not available
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Saviynt.Experience: 8-10 Years.
Posted Date not available
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Encryption.Experience: 8-10 Years.
Posted Date not available
8.0 - 10.0 years
12 - 17 Lacs
mumbai
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Checkpoint Firewalls and VPN.Experience: 8-10 Years.
Posted Date not available
9.0 - 12.0 years
8 - 12 Lacs
chandigarh, dadra & nagar haveli, jammu
Work from Office
Primary Skills: ITSM, Change Manager Service Management, ITIL experience Secondary Skills : Knowledge of Aws/GCP/Azure would be an added advantage. Any experience of development work using ServiceNow, JAVA, SQL or REST APIs will be added advantage. JD : Support Service Continuity NFRs (Non Functional Requirement) as part of service onboarding process. Manage complex project scenarios and first level escalations. Conduct governance checks for ACTIVE services of multiple regions. Lead IBMi Data Centre Loss Role swap co-ordination for multiple regions. Support PMs & IT Service Owners of all major regions Globally (Europe, North America, Canada, APAC) across multiple lines of business within HSBC on service resilience (continuity) queries. Chair meetings with PMs/ITSOs/Project Teams in relation to NFR process and procedures. Understand and execute Service Resilience policies and procedures in accordance to FIM requirements. Adhere to teams operating model and deliver as per delivery quality parameters of the team. Participate in UAT testing for changes in Scott system. Propose and lead ideas for process improvement and/or automation. Collaboratively work with India and other regional team members. Essential Experience Excellent Verbal and written communication skills Must be able to confidently hold discussions with managers without getting pressurized. Willing to work in rotational shifts (Night shifts are generally not exceeding one week per month) Have analytical and self-driven approach A good team player with the ability to work under pressure Flexible enough to stretch self as per work requirement ITIL Foundation certified Prior experience of working in Service Resilience (Continuity) area would be an added advantage Prior experience of working in large organization with infrastructure in all major global regions would be an added advantage Knowledge of Aws/GCP/Azure would be an added advantage. Any experience of development work using ServiceNow, JAVA, SQL or REST APIs will be added advantage. Location- Chandigarh,Dadra & Nagar Haveli,Jammu,Lakshadweep,Nagar,New Delhi,Puducherry,Pune,Daman,Diu,Goa,Haveli,Sikkim
Posted Date not available
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: F5 Load Balancers. Experience8-10 Years.
Posted Date not available
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Security Architecting. Experience: 8-10 Years.
Posted Date not available
6.0 - 10.0 years
5 - 10 Lacs
bengaluru
Work from Office
Must have requirements: Minimum of 5+ years work experience working with security tools and with security administration. Designing, implementing, managing & maintaining endpoint solutions (Tanium, Crowdstrike), Hands on experience on endpoint tools and overall cybersecurity practices Strong ethics and understanding of ethics in business and information security Ability to mentor juniors and get them up to speed with the process Possess any current security certifications (e.g., CISSP, Security+) Ability to present and articulate findings to technical staff and executives Ability to participate in on-call rotation as needed Must be able to pass a background check.
Posted Date not available
8.0 - 10.0 years
7 - 11 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to provide solutions and bridge the gap between technology and business know-how to deliver any client solution Do 1. Bridging the gap between project and support teams through techno-functional expertise For a new business implementation project, drive the end to end process from business requirement management to integration & configuration and production deployment Check the feasibility of the new change requirements and provide optimal solution to the client with clear timelines Provide techno-functional solution support for all the new business implementations while building the entire system from the scratch Support the solutioning team from architectural design, coding, testing and implementation Understand the functional design as well as technical design and architecture to be implemented on the ERP system Customize, extend, modify, localize or integrate to the existing product by virtue of coding, testing & production Implement the business processes, requirements and the underlying ERP technology to translate them into ERP solutions Write code as per the developmental standards to decide upon the implementation methodology Provide product support and maintenance to the clients for a specific ERP solution and resolve the day to day queries/ technical problems which may arise Create and deploy automation tools/ solutions to ensure process optimization and increase in efficiency Sink between technical and functional requirements of the project and provide solutioning/ advise to the client or internal teams accordingly Support on-site manager with the necessary details wrt any change and off-site support 2. Skill upgradation and competency building Clear wipro exams and internal certifications from time to time to upgrade the skills Attend trainings, seminars to sharpen the knowledge in functional/ technical domain Write papers, articles, case studies and publish them on the intranet Mandatory Skills: Oracle Customer Care Billing Technical. Experience: 8-10 Years.
Posted Date not available
2.0 - 5.0 years
2 - 6 Lacs
chennai
Work from Office
Overview We're seeking a skilled and detail-oriented System Administrator to join our team at Tritusa. In this role, you will be responsible for managing and securing our Microsoft 365 environment, including Intune, Defender for Endpoint, Azure AD, and related tools. You will oversee endpoint security, application control, OS and application patching, and ensure compliance with internal and external standards. Ideal for someone eager to grow, take on new challenges, and bring fresh, innovative ideas to the table. Your Role and Responsibilities Administer and maintain Microsoft Intune for managing devices, compliance, app deployments, and configurations Support DLP, email encryption, and audit logs through Microsoft Purview & Compliance Centre Administer Microsoft 365 Admin Centre for user provisioning, license management, and services configuration Support Exchange Online, SharePoint, OneDrive, and Teams administration tasks Collaborate with internal teams to improve device health, user onboarding, and IT automation Manage Microsoft Intune for device enrollment, compliance, configuration, and remote support Implement and monitor Microsoft Defender for Endpoint for threat protection, detection, and response Handle application whitelisting and application control policies to ensure only authorised software is executed Regularly perform OS and third-party application patching to maintain security and performance Set up and enforce mobile device management (MDM) and mobile application management (MAM) policies Troubleshoot issues related to M365 apps and user access Manage endpoint configurations, software installations, and updates Assist in maintaining compliance with internal IT security standards Prepare documentation and support checklists for repeatable tasks and onboarding processes What Were Looking For Were looking for candidates with a combination of the following: 2 5 years of experience in Microsoft 365, endpoint security, and device management Strong knowledge of Microsoft Defender, Intune compliance policies, and endpoint protection tools Proven knowledge of Microsoft Intune, Defender for Endpoint, Azure AD, and Microsoft 365 Admin Centre Expertise in managing user access, security groups, and policies in Active Directory and Microsoft Entra ID environments. Strong experience with Autopilot and SCCM for provisioning and managing endpoints in an enterprise environment. Ability to create, manage, and troubleshoot Group Policies to enforce company-wide IT policies and security configurations. Proficient in managing and deploying Windows OS patches, ensuring systems are secure and up to date. Expertise with SCCM, Intune, and other endpoint management tools to deploy, monitor, and maintain devices. Proficiency in PowerShell scripting to automate tasks, manage configurations, and improve operational efficiency. Strong understanding of networking protocols, security best practices, and how they apply to endpoint management and protection. Experience with managing and securing mobile devices using MDM/MAM solutions. Hands-on experience with patching, application control, and BitLocker management Hands-on experience with application whitelisting, patch management tools, and security baselines Understanding of Windows OS and endpoint lifecycle management Experience in applying patches and updates across various platforms (Windows, 3rd-party apps) Familiarity with automation tools like PowerShell for scripting common admin tasks Strong troubleshooting, documentation, and communication skills Experience working in a secure or regulated IT environment What We Offer: Tools, training, and freedom to grow – We equip you with the resources and flexibility to succeed on your terms. Focused career development – Through mentorship, hands-on experience, and structured learning, we help you build the skills and mindset to thrive. Inclusive and supportive culture – We value every individual’s unique perspective and are committed to fostering a workplace where everyone feels seen, heard, and appreciated. Flexible work options – Enjoy the benefits of hybrid or remote work arrangements that support your lifestyle and productivity. Opportunities to work on impactful projects – Collaborate with industry leaders and clients on cutting-edge technologies and meaningful work. Recognition and rewards – We celebrate contributions and achievements regularly, ensuring your efforts never go unnoticed. Well-being and work-life balance – We care about your holistic well-being, with initiatives and policies that promote balance, wellness, and fulfilment. Why Tritusa? Tritusa, proudly headquartered in Chennai, India, is a fast-growing IT consulting company with a strong local presence and a reputation for delivering high-quality solutions across SAP Testing, Quality Engineering, Test Automation, DevOps, Performance Engineering, Cybersecurity Testing, and SAP Technical Services. Founded with a vision to make a global impact from India, Tritusa has built a strong team of talented professionals in Chennai who work on complex, enterprise-level projects for clients across India, Australia, and the United States. We blend deep local expertise with global best practices to deliver scalable, reliable, and future-ready solutions. Our Chennai office is the core of our innovation and delivery. Whether you’re designing creative assets, writing code, testing systems, or collaborating with international teams, you’ll be part of a supportive and high-performing environment where your ideas and contributions are valued. At Tritusa, we foster a collaborative, inclusive, and growth-focused culture. Creativity is encouraged, learning is continuous, and everyone has the opportunity to thrive. We’re proud to offer global opportunities grounded in strong Indian roots, making it the perfect workplace for professionals looking to grow their careers while staying close to home. We are deeply committed to diversity, equity, and inclusion. At Tritusa, everyone is welcome. We believe that creating a workplace where people feel respected, supported, and empowered is key to driving innovation and success. All qualified applicants will receive equal consideration regardless of background, experience, identity, ability, or thinking style. If you're looking for a place where you can learn, grow, and make a meaningful impact, Tritusa could be the perfect fit for you. What you need to do now If this sounds like you, please apply to this role by clicking the ‘Apply’ link below and submitting your resume. Alternatively, you can share your CV directly with us at talent@tritusa.com.au Alternatively, you can reach us at +91 7397 352 501 to discuss further. Please allow 1-2 weeks for us to review all applications. You'll get an update on your application status. If you progress to the next stage, our Talent Acquisition team will call you to discuss the role, your motivations, and your career history. We will provide feedback to all applicants either via email or telephone. The preferred candidate will be subject to background screening conducted by Tritusa or an approved third-party provider. Be part of a company where innovation meets impact. Discover more about how we deliver excellence at www.tritusa.com.au If this job isn’t quite right for you but you're exploring new opportunities, feel free to contact us for a confidential discussion. Tritusa would be happy to assist with your next career step.
Posted Date not available
4.0 - 9.0 years
6 - 11 Lacs
mumbai, pune, bengaluru
Work from Office
4+ years experience in designing, implementing, and managing SCCM and Intune solutions. Strong understanding of endpoint management concepts, including device provisioning, software distribution, patch management, and security. Experience with Microsoft Endpoint Manager (SCCM and Intune) integration, configuration, and administration. Familiarity with modern management concepts, such as cloud-based management, autopilot, and zero-touch deployment. Experience working with PC/Mac infrastructure as an engineer level SCCM & Intune Certification. Experience with system provisioning and imaging using tools such as DEP and SCCM. Experience with managing 802.1x on MacOS/Windows (for wifi and wired network connections). Experience with end point management client software deployment (SCCM + Intune), inventory, antivirus and end point security solution. Experience with Azure/AWS, Network troubleshooting, Background in server administration, networking, troubleshooting, scripting, automation Experience with desktop operating systems including Windows 10/11 and OS X Scripting via PowerShell, BASH, and others. Primary skills 4+ years experience in designing, implementing, and managing SCCM and Intune solutions. Hands on experience in Operating System Deployment, Autopilot, Intune, and Co-management. Experience in application Deployment, Patching, and Imaging. Secondary skills Knowledge on DB replication Knowledge on custom Report creation SQL
Posted Date not available
15.0 - 20.0 years
0 - 0 Lacs
anantapur
Work from Office
We are looking candidate for Senior IT Security Consultant position for our Group company KIA India Pvt ltd located at Anantapur - AP location Job Responsibilities: As a Cybersecurity Specialist , you will be responsible for implementing, managing, and optimizing a wide array of cybersecurity solutions. Your key duties will include: DLP(Digital Guardian) SASE(ZScaler) EDR(Trelix) Vulnerability Management(QualysGuard) Anti Virus for PC(MS Defender) Anti Virus for Server(TrendMicro ApexOne) DB encryption(CubeOne) ICS vaccine(AhnLab EPS) AIP(MS) Application Security Testing(HCL AppScan) If you feel that your profile matches the above requirement and if you are interested to attend the direct interview, Please send your updated resume and below required details to s.prathap@hyundai-autoever.com Note: No work from home option, Selected candidate should ready to work in KIA Anantapur Plant Notice Period should be less then 30-45 days only can apply If you are interested please share your updated resume to s.prathap@hyundai-autoever.com with below required details to get a call from our HR team for Interview call letter Name Age Contact Number Email id Highest Educational qualification and year of passing Additional Certifications , if any Total years of experience Relevant years of experience Name of the current organization Current Designation Current Location Number of years working in current organization Notice period Present CTC Expected CTC
Posted Date not available
5.0 - 10.0 years
8 - 12 Lacs
mumbai
Work from Office
Key Responsibilities: Act as the subject matter expert (SME) forPalo Alto Cortex XDR and endpoint security. Lead investigation and response for advanced endpoint threats and alerts using XDR. Develop and fine-tune detection rules, response playbooks, and behavioral indicators. Integrate Cortex XDR with other security tools (SIEM, SOAR, firewalls, etc.). Analyze complex threat patterns, perform root cause analysis, and recommend mitigation strategies. Collaborate with SOC teams to escalate, triage, and resolve endpoint incidents. Create and maintain technical documentation, runbooks, and training materials. Support compliance and audit requirements for endpoint security. Provide L3 support and mentor junior team members. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 5+ years of experience in Cybersecurity or Information Security. Minimum 2+ years hands-on experience specifically with Palo Alto Cortex XDR (endpoint or extended detection and response). Strong knowledge of endpoint detection and response (EDR) technologies and incident handling. Experience in scripting (Python, PowerShell) for automation is a plus. Familiarity with security frameworks such as MITRE ATT&CK. Experience in working with SIEM and SOAR platforms. Excellent analytical, communication, and troubleshooting skills. Certifications like PCNSE, CISSP, CEH, or GCIA are advantageous.
Posted Date not available
4.0 - 6.0 years
6 - 10 Lacs
gurugram
Work from Office
Job Description - Excellent communication and presentation skills- Key Skills Required: Web Security, Cloud Security, Advanced Malware Protection (AMP), Email Security, End Point Security Cisco Anyconnect/Cisco Umbrella, Stealthwatch, ISE with Presales Cisco Firewall ASA 5500, ASAv, NGFWv, Firepower 2100, 4100, 9000 series Preferred Cisco Umbrella, CASB, Thousand Eyes, Palo Alto Prisma, Fortinet ZTNA, FortiSASE, Secure Web Gateway (Not all but Multi OEM knowledge preferred) Preferred good knowledge & Hand on Experience in SASE Solution Preference Certifications: Cisco CCNA/CCNP or any OEM Certification
Posted Date not available
15.0 - 20.0 years
13 - 17 Lacs
bengaluru
Work from Office
Project Role :Security Architect Project Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals. Must have skills : Operational Technology (OT) Security Good to have skills : Endpoint ProtectionMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Senior IT/ OT Endpoint Security engineer, you will focused to lead the design, implementation, and management of endpoint security controls across enterprise environments, will play a crucial role in protecting critical assets such as Server Work stations, and ICS equipments. Roles & Responsibilities:-Lead the deployment, management, and optimization of endpoint security tools. (e.g., CrowdStrike, SentinelOne, Microsoft Defender for Endpoint, Trellix)-Monitor, detect, and respond to endpoint-related security incidents and vulnerabilities.-Using MITRE ATT&CK framework improve threat hunting.-Integrate EDR telemetry with SIEM/SOAR platforms and tune detection rules, policies, and behavioral indicators.-Perform real-time threat hunting and investigation using EDR consoles, log data, and forensic artifacts.-Implement host-based control policies, and privilege management solutions.-Monitor and analyze endpoint alerts, triage suspicious activity, and escalate incidents based on impact and severity. Professional & Technical Skills: -experience in endpoint security engineering or cybersecurity operations, with at least 2+ years in OT/ICS environments will be added advantage. -Experience with endpoint security scripting and automation using Python, Powershell Or API.-Familiarity with industrial protocols and vendor protocols (Modbus, DNP3, OPC, etc.) is added advantage.-Working experience with Patch and Vulnerability Management of end point device with coordination with IT team. Additional Information:- The candidate should have minimum years of experience in Operational Technology (OT) Security.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted Date not available
15.0 - 20.0 years
13 - 17 Lacs
bengaluru
Work from Office
Project Role :Security Architect Project Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals. Must have skills : Operational Technology (OT) Security Good to have skills : Network Security ImplementationMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Senior IT/ OT Endpoint Security engineer, you will be focused to lead the design, implementation, and management of endpoint security controls across enterprise environments. You will play a crucial role in protecting critical assets such as Server Work stations, and ICS equipments. Roles & Responsibilities:-Lead the deployment, management, and optimization of endpoint security tools. (e.g., CrowdStrike, SentinelOne, Microsoft Defender for Endpoint, Trellix)-Monitor, detect, and respond to endpoint-related security incidents and vulnerabilities.-Using MITRE ATT&CK framework improve threat hunting.-Integrate EDR telemetry with SIEM/SOAR platforms and tune detection rules, policies, and behavioral indicators.-Perform real-time threat hunting and investigation using EDR consoles, log data, and forensic artifacts.-Implement host-based control policies, and privilege management solutions.-Monitor and analyze endpoint alerts, triage suspicious activity, and escalate incidents based on impact and severity. Professional & Technical Skills: -experience in endpoint security engineering or cybersecurity operations, with experience in OT/ICS environments will be added advantage. -Experience with endpoint security scripting and automation using Python, Powershell Or API.-Familiarity with industrial protocols and vendor protocols (Modbus, DNP3, OPC, etc.) is added advantage.-Working experience with Patch and Vulnerability Management of end point device with coordination with IT team. Additional Information:- The candidate should have minimum 5 years of experience in Operational Technology (OT) Security.- This position is based at our Pune office.- A 15 years full time education is required. Qualification 15 years full time education
Posted Date not available
15.0 - 20.0 years
13 - 17 Lacs
pune
Work from Office
Project Role :Security Architect Project Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals. Must have skills : Operational Technology (OT) Security Good to have skills : Endpoint ProtectionMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Senior IT/ OT Endpoint Security engineer, you will focused to lead the design, implementation, and management of endpoint security controls across enterprise environments, will play a crucial role in protecting critical assets such as Server Work stations, and ICS equipments. Roles & Responsibilities:-Lead the deployment, management, and optimization of endpoint security tools. (e.g., CrowdStrike, SentinelOne, Microsoft Defender for Endpoint, Trellix)-Monitor, detect, and respond to endpoint-related security incidents and vulnerabilities.-Using MITRE ATT&CK framework improve threat hunting.-Integrate EDR telemetry with SIEM/SOAR platforms and tune detection rules, policies, and behavioral indicators.-Perform real-time threat hunting and investigation using EDR consoles, log data, and forensic artifacts.-Implement host-based control policies, and privilege management solutions.-Monitor and analyze endpoint alerts, triage suspicious activity, and escalate incidents based on impact and severity. Professional & Technical Skills: -experience in endpoint security engineering or cybersecurity operations, with at least 2+ years in OT/ICS environments will be added advantage. -Experience with endpoint security scripting and automation using Python, Powershell Or API.-Familiarity with industrial protocols and vendor protocols (Modbus, DNP3, OPC, etc.) is added advantage.-Working experience with Patch and Vulnerability Management of end point device with coordination with IT team. Additional Information:- The candidate should have minimum years of experience in Operational Technology (OT) Security.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted Date not available
6.0 - 10.0 years
14 - 20 Lacs
chennai
Work from Office
Role & responsibilities Role & responsibilities 6+ years of experience in cybersecurity operations with solid L3-level incident handling. Hands-on expertise with endpoint security solutions (CrowdStrike, SentinelOne, Microsoft Defender ATP, Carbon Black, etc.). Strong proficiency in conducting demos and technical evaluations for R&D or pre-deployment scenarios. In-depth understanding of SIEM platforms, EDR, network security, and intrusion detection. Experience with malware analysis, threat intelligence, and reverse engineering is a plus. Knowledge of Windows, Linux, and cloud environments (AWS/Azure/GCP). Familiarity with security frameworks (NIST, MITRE ATT&CK, SANS). Scripting skills (Python, PowerShell, Bash) for automation. Relevant certifications preferred: CISSP, OSCP, CEH, GCIA, GCIH .
Posted Date not available
6.0 - 11.0 years
8 - 18 Lacs
hyderabad
Hybrid
Immediate Openings on Trellix Endpoint Security PAN INDIA - Contract Skills:Trellix Endpoint Security LOCATION : PAN INDIA Period :Immediate Employment Mode : Contract Description Evaluation Criteria Description Job Title Email security Analyst L2 Skill Name PGP email encryption Personal Qualities - Excellent written and verbal communication skills - Ability to multi-task, prioritize, coordinate, work well under pressure and meet deadlines Key Responsibilities PGP Key Management: Generate, store, and distribute public/private key pairs for email encryption. Manage key lifecycle, including key rotation, revocation, and expiration. Encryption Implementation: Implement PGP encryption on company email systems (e.g., Outlook, Thunderbird).
Posted Date not available
8.0 - 13.0 years
5 - 9 Lacs
hyderabad
Hybrid
Citrix - VDI, AWS Workspaces, Azure VDS Strong experience with Desktop virtualization technologies like (Citrix, AWS Workspaces or Azure VDS) Understands client computing & end users' services environment Windows Image build process & automation experience Windows patching experience, working with and trouble shooting end user issues. Common tools like SCCM, McAfee, MS Defender. Knowledge of active directory and domain joined infrastructure Experience with CI/CD or automation will be added advantage"
Posted Date not available
10.0 - 15.0 years
22 - 37 Lacs
bengaluru
Work from Office
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you a tech-savvy problem-solver with a passion for ensuring optimal network performance? If so, look no further – Kyndryl is seeking a Security Support Specialist who will be the go-to expert for installing, maintaining, and troubleshooting computer networks. As our Security Support Specialist, you'll be working in a complex, multi-vendor environment, and will use your analytical skills to identify and resolve network issues, make configuration changes, and implement security policies. This role requires someone who can think on their feet, test and apply corrective actions (including emergency changes), and participate in change reviews as needed. And with the ever-changing nature of technology, you'll be constantly learning and growing in your role. You will work alongside a talented team of experts to plan and execute routine network changes, troubleshoot and solve network issues and outages, and maintain excellent communication with our end customers, project managers, and service engineers. You’ll be responsible for maintaining network components, monitoring network performance, and maintaining network security. You will also be providing user support for network-related issues, ensuring that our customers receive the highest level of support possible. If you're ready to take on a fast-paced and rewarding role in the world of network support, apply to join the Kyndryl team today! Key Responsibilities: Integrate firewall solutions with SIEM, IDS/IPS, endpoint protection, and cloud security tools Monitor network performance and security systems, responding to security incidents and conducting root cause analysis Investigate and respond to security breaches, malware infections, and intrusion attempts and Major incident handling Configure and manage EDR and XDR solutions, enterprise antivirus solutions (such as TrendMicro, CrowdStrike, or similar), Web Application Firewalls (WAF) in on-premises and cloud environments & NAC for wired, wireless, and VPN network access control. Monitor and analyze security alerts, logs, and reports for malware infections and security incidents install and uninstall endpoint security solutions Implement network virtualization, micro-segmentation, distributed firewalling (DFW). Design and implement .1X authentication, MAB (MAC Authentication Bypass), posture assessment, and profiling policies Understanding of PKI, certificate-based authentication, endpoint profiling, and device posture assessment Configure, and manage Arcon PAM solutions to secure privileged accounts and sensitive data across the organization, troubleshoot PAM issues. Implement and optimize web filtering policies, SSL decryption, and content inspection Configure DLP rules, keyword detection, fingerprinting, and machine learning-based policies Monitor and analyze DLP alerts, incidents, and logs for potential data breaches or policy violations. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career, from Junior Administrator to Architect. We have training and upskilling programs that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. One of the benefits of Kyndryl is that we work with customers in a variety of industries, from banking to retail. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Expertise Strong knowledge of network security, endpoint security Experience in cybersecurity, SOC, or security engineering roles. 12+ years of Total IT experience. Hands-on experience with SDWAN, PaloAlto , FortiGate and Checkpoint. Implement and maintain VPNs, IPSec tunnels, and SSL VPNs using Palo Alto and FortiGate technologies Proficiency in routing protocols BGP, OSPFConfigure proxy and network access control (NAC) solutions Hands-on experience with FortiManager, and FortiAnalyzerCreate and Perform firmware upgrades, patches, and routine maintenance on firewalls. Hands-on experience with WAF, IBM DAM, IBM GDE, Forcepoint Proxy, DLP, Email Gateway. Preferred Technical and Professional Experience Experience with DAM solutions such as IBM Guardium. BSc. B.E./B. Tech, M.E. /M. Tech Ability to monitor and audit database activities for unauthorized access and suspicious activities & Experience with Thales Cipher Trust. Understanding of key management solutions (KMS) and Hardware Security Modules (HSMs). Troubleshoot and optimize NSX networking components, including VXLAN, Overlay, Edge Services Gateway (ESG), and Distributed Logical Routers (DLR) Configure NSX Security Policies, NAT, VPN, Load Balancing, and Firewall rules Expertise in NSX-T components such as Transport Zones, Edge Nodes, and T0/T1 Gateways. Certifications (Preferred, but not Mandatory): Network Virtualization (VCTA-NV) , Forcepoint DLP, Web Security Administrator Certification , CEH , CompTIA Security+ Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted Date not available
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |