Jobs
Interviews

830 Endpoint Security Jobs - Page 32

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 5.0 years

1 - 5 Lacs

bengaluru

Work from Office

About The Role We are seeking a skilled and customer-focused Desktop Support Engineer to provide comprehensive support for end-user systems, applications, and hardware. The ideal candidate will be responsible for diagnosing and resolving technical issues related to Windows operating systems, Microsoft 365 applications, business productivity tools, and hardware performance. You will coordinate with vendors, provide remote support, and ensure timely resolution of IT incidents and requests. Primary Skills 35 years of experience in L2 desktop support or IT service desk roles. Strong knowledge of Windows OS, Microsoft 365 suite, and endpoint security tools (e.g., Zscaler). Experience with remote support tools and secure access protocols. Familiarity with ticketing systems and SLA-driven environments. Excellent communication and documentation skills.

Posted Date not available

Apply

1.0 - 3.0 years

1 - 5 Lacs

pune

Work from Office

Technical Support: Make sure they have all the following experience. Must have Installed and Configured Firewalls - Palo Alto/ Checkpoint/ Fortinet / etc Must have Installed and Configured Load balancers - F5/Citrix Netscaler Hands-on experience in Endpoint Security components Hands-on experience in Content Filtering/Proxy

Posted Date not available

Apply

8.0 - 13.0 years

13 - 17 Lacs

pune

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals. Must have skills : Operational Technology (OT) Security Good to have skills : Network Security ImplementationMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Senior IT/ OT Endpoint Security engineer, you will be focused to lead the design, implementation, and management of endpoint security controls across enterprise environments. You will play a crucial role in protecting critical assets such as Server Work stations, and ICS equipments. Roles & Responsibilities:-Lead the deployment, management, and optimization of endpoint security tools. (e.g., CrowdStrike, SentinelOne, Microsoft Defender for Endpoint, Trellix)-Monitor, detect, and respond to endpoint-related security incidents and vulnerabilities.-Using MITRE ATT&CK framework improve threat hunting.-Integrate EDR telemetry with SIEM/SOAR platforms and tune detection rules, policies, and behavioral indicators.-Perform real-time threat hunting and investigation using EDR consoles, log data, and forensic artifacts.-Implement host-based control policies, and privilege management solutions.-Monitor and analyze endpoint alerts, triage suspicious activity, and escalate incidents based on impact and severity. Professional & Technical Skills: -experience in endpoint security engineering or cybersecurity operations, with experience in OT/ICS environments will be added advantage. -Experience with endpoint security scripting and automation using Python, Powershell Or API.-Familiarity with industrial protocols and vendor protocols (Modbus, DNP3, OPC, etc.) is added advantage.-Working experience with Patch and Vulnerability Management of end point device with coordination with IT team. Additional Information:- The candidate should have minimum 5 years of experience in Operational Technology (OT) Security.- This position is based at our Pune office.- A 15 years full time education is required. Qualification 15 years full time education

Posted Date not available

Apply

5.0 - 8.0 years

10 - 14 Lacs

pune

Work from Office

About The Role Project Role : Application Lead Project Role Description : Lead the effort to design, build and configure applications, acting as the primary point of contact. Must have skills : Microsoft SQL Server, Firewall, EPO Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Lead, you will lead the effort to design, build, and configure applications, acting as the primary point of contact. Your typical day will involve collaborating with various teams to ensure project milestones are met, addressing any challenges that arise, and providing guidance to team members to foster a productive work environment. You will also engage in strategic discussions to align project goals with organizational objectives, ensuring that the applications developed meet the needs of stakeholders effectively. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate knowledge sharing sessions to enhance team capabilities.- Monitor project progress and implement necessary adjustments to meet deadlines. Professional & Technical Skills: - Must To Have Skills: Proficiency in Microsoft SQL Server.- Strong understanding of database design and management.- Experience with performance tuning and optimization of SQL queries.- Familiarity with data integration and ETL processes.- Ability to troubleshoot and resolve database-related issues. Additional Information:- The candidate should have minimum 5 years of experience in Microsoft SQL Server.- This position is based in Pune.- A 15 years full time education is required. Qualification 15 years full time education

Posted Date not available

Apply

1.0 - 3.0 years

1 - 5 Lacs

gurugram

Work from Office

About The Role Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Microsoft Endpoint Configuration Manager Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Tech Support Practitioner, you will serve as a vital link between clients and the systems or applications they utilize. Your day will involve engaging with clients to understand their needs, troubleshooting issues, and ensuring that our systems operate seamlessly. You will leverage your exceptional communication skills to provide high-quality support, ensuring that client concerns are addressed promptly and effectively. Your role will also require you to interpret complex issues and design tailored resolutions based on your extensive product knowledge, contributing to the overall success of our operations. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team knowledge and skills.- Monitor team performance and provide constructive feedback to ensure continuous improvement. Professional & Technical Skills: - Must To Have Skills: Proficiency in Microsoft Endpoint Configuration Manager.- Strong understanding of system administration and application support.- Experience with troubleshooting and resolving technical issues.- Familiarity with network configurations and security protocols.- Ability to document processes and create user guides. Additional Information:- The candidate should have minimum 7.5 years of experience in Microsoft Endpoint Configuration Manager.- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education

Posted Date not available

Apply

4.0 - 8.0 years

0 Lacs

bengaluru, delhi / ncr, mumbai (all areas)

Work from Office

Job Description: We are looking for an experienced and dynamic Security Sales Engineer to join our team. The ideal candidate will possess a strong background in cybersecurity technologies and pre-sales engagement, with the ability to effectively bridge technical solutions and client business needs. Key Responsibilities: Understand client security requirements and present appropriate cybersecurity solutions. Provide technical support during the sales process including presentations, demos, and PoCs. Collaborate with sales and product teams to design solutions aligned with customer goals. Prepare technical documentation, solution proposals, and RFP responses. Keep up with the latest trends in cybersecurity, threats, and technologies. Build strong relationships with client stakeholders, technical teams, and decision-makers. Troubleshoot client issues and provide post-sales technical assistance when needed. Required Skills & Experience: 4+ years of experience in IT Security Pre-Sales / Sales Engineering roles. Strong knowledge of security technologies such as firewalls, SIEM, endpoint protection, identity and access management (IAM), cloud security, etc. Excellent communication, presentation, and client engagement skills. Experience in responding to RFPs, RFIs, and conducting PoCs. Ability to work collaboratively across technical and sales teams. Strong analytical, problem-solving, and documentation skills.

Posted Date not available

Apply

6.0 - 8.0 years

8 - 12 Lacs

bengaluru

Work from Office

Job Title: Senior SDET We also recognize the importance of closing the 4-million-person cybersecurity talent gap. We aim to create a home for anyone seeking a meaningful future in cybersecurity and look for candidates across industries to join us in soulful work. More at . Role Overview: Trellix is looking for SDETs who are self-driven and passionate to work on Endpoint Detection and Response (EDR) line of products. Tasks range from manual and, automated testing (including automation development), non-functional (performance, stress, soak), solution, security testing and much more. Be part of the vision to ship top-class EDR solutions for On-Prem, Cloud or hybrid Customers. About the role: Peruse requirements documents thoroughly and thus design relevant test cases that cover new product functionality and the impacted areas Execute manually new feature and regression cases as needed for a product release Identify critical issues and communicate them effectively in a timely manner Familiarity with bug tracking platforms such as JIRA, Bugzilla, etc. is helpful. Filing defects effectively, i.e., noting all the relevant details that reduces the back-and-forth, and aids quick turnaround with bug fixing is an essential trait for this job Identify cases that are automatable, and within this scope segregate cases with high ROI from low impact areas to improve testing efficiency Basic understanding of automation programming languages such as Python, Java, etc. is advantageous Execute, monitor and debug automation runs About you: 6-8 years of experience in a SDET role with a relevant degree in Computer Science or Information Technology is required Show ability to quickly learn a product or concept, viz., its feature set, capabilities, functionality and nitty-gritty Hands-on with and a decent understanding of the workings of Windows and Unix platforms is expected Understanding of any Cloud Platforms CSPs such as AWS, GCP, Azure can be advantageous Understanding of Endpoint security concepts around Endpoint Detection and Response (EDR) can also be an added advantage

Posted Date not available

Apply

3.0 - 6.0 years

8 - 12 Lacs

bengaluru

Work from Office

About The Role Manage the continuous improvement of the existing endpoint security solutions, and log collection and treatment tools, in accordance with the relevant internal policies. Development, maintenance and troubleshooting of these solutions. Managing policies and software deployment for these solutions. Hands-on experience with configuring and troubleshooting one of the most crucial elements of the Eurofins global IT. Project approach to resolving technical problems. Troubleshoot occurring issues, getting to the root causes and supporting resolution of the issues found. Technical support for Priority 1 incidents, contributing to resolving the performance issues associated with these solutions. Qualifications 4-8 years of experience in IT Security or Infrastructure and Operations. Experience with Trellix (McAfee), SentinelOne, Zscaler, Cisco Umbrella. Experience with SIEM and XSOAR, CRIBL technologies. Prior strong experience with endpoint protection solutions from Product Owner or Administrator perspective. Technically solid in corporate and enterprise scale of infrastructure implementation. Proven experience of acting as the expert in infrastructure/operations/project teams. Global company experience (enterprise grade). Additional Information What we offer: Opportunity to grow in a demanding, fast-growing organization. Very attractive, multicultural, and friendly work environment in fast-growing international company (more than 55 000 employees). Possibility to grow and make the next step in your professional career and self-development. A launch pad into various opportunities- within many business lines of Eurofins globally. A chance to become part of a highly motivated international team of professionals.

Posted Date not available

Apply

3.0 - 5.0 years

6 - 10 Lacs

bengaluru

Work from Office

OPPORTUNITY OVERVIEW ZeroFOX seeks a passionate and highly skilled Security Operations Engineer who is eager to help ensure the security of a rapidly growing SaaS-based security company! This role is a part of the Security & Compliance team and will help drive cross-functional teams to accomplish company-wide information security initiatives that impact all aspects of the business. Role and responsibilities Directly supports ZeroFOXs security posture across the enterprise, focusing on endpoint security and logging/alerting capabilities for the organization. Serve as primary engineer for endpoint security, including endpoint security (EDR/AV) tool administration, policy configuration, and alert response, as well as endpoint secure baseline configuration and forensics. Provide support for efforts related to monitoring, logging, and alerting, with a focus on automation. Conduct security reviews and provide recommendations for internal systems and applications requests. Triage and resolve security alerts from internal systems, providing operational support for the team. Assist with conducting internal security assessments, prioritizing any gaps, and developing and implementing a prioritized remediation plan. Assist with monitoring and reporting of enterprise security posture. Assist with ensuring continuous compliance with standards such as NIST, SOC2, etc. Required qualifications and skills Experience performing above responsibilities and developing qualifications typically obtained in 3+ years. Strong technical acumen and prior experience as it relates to information security, specifically endpoint security, cloud infrastructure, logging/monitoring/alerting, SIEM, security reviews, and incident response. Prior experience triaging, managing, and responding to information security events. Prior experience conducting systems and applications security reviews. Prior experience successfully interacting with internal and external stakeholders, including non-technical business stakeholders, on matters related to information security. Written and spoken fluency in the English language. Bachelor’s degree in Computer Science, Information Security, or related discipline, or equivalent experience. Ability to travel internationally occasionally (>10%). Desired qualifications and skills Prior experience with email security, forensics, and eDiscovery is a plus. Coding ability is a plus.

Posted Date not available

Apply

3.0 - 5.0 years

6 - 10 Lacs

bengaluru

Work from Office

OPPORTUNITY OVERVIEW ZeroFOX seeks a passionate and highly skilled Security Operations Engineer who is eager to help ensure the security of a rapidly growing SaaS-based security company! This role is a part of the Security & Compliance team and will help drive cross-functional teams to accomplish company-wide information security initiatives that impact all aspects of the business. Role and responsibilities Directly supports ZeroFOXs security posture across the enterprise, focusing on endpoint security and logging/alerting capabilities for the organization. Serve as primary engineer for endpoint security, including endpoint security (EDR/AV) tool administration, policy configuration, and alert response, as well as endpoint secure baseline configuration and forensics. Provide support for efforts related to monitoring, logging, and alerting, with a focus on automation. Conduct security reviews and provide recommendations for internal systems and applications requests. Triage and resolve security alerts from internal systems, providing operational support for the team. Assist with conducting internal security assessments, prioritizing any gaps, and developing and implementing a prioritized remediation plan. Assist with monitoring and reporting of enterprise security posture. Assist with ensuring continuous compliance with standards such as NIST, SOC2, etc. Required qualifications and skills Experience performing above responsibilities and developing qualifications typically obtained in 3+ years. Strong technical acumen and prior experience as it relates to information security, specifically endpoint security, cloud infrastructure, logging/monitoring/alerting, SIEM, security reviews, and incident response. Prior experience triaging, managing, and responding to information security events. Prior experience conducting systems and applications security reviews. Prior experience successfully interacting with internal and external stakeholders, including non-technical business stakeholders, on matters related to information security. Written and spoken fluency in the English language. Bachelor’s degree in Computer Science, Information Security, or related discipline, or equivalent experience. Ability to travel internationally occasionally (>10%). Desired qualifications and skills Prior experience with email security, forensics, and eDiscovery is a plus. Coding ability is a plus.

Posted Date not available

Apply

4.0 - 8.0 years

17 - 20 Lacs

pune

Work from Office

Senior Delivery Manager - Information Security - IT, Infrastructure, Information Security Job Purpose We are seeking a ed Endpoint Security Engineer to join our team. The ideal candidate will be responsible for safeguarding our endpoints, implementing security measures, and ensuring compliance with industry standards. Duties and Responsibilities A- Minimum required Accountabilities for this role Own the vendor assessment end to end from scoping till closure of all observations. Work closely with IT departments to ensure effective integration of endpoint security solutions with existing infrastructure and processes. Stay current with industry trends and emerging threats, continuously seeking opportunities to enhance the organization's endpoint security posture. Evaluate, select, and manage relationships with third-party vendors providing endpoint security solutions, ensuring alignment with organizational needs. Generate regular reports on the security posture of endpoints, including incident reports and compliance status, for senior management. Ensure that endpoint security measures comply with relevant regulations and standards, conducting regular risk assessments and audits. Establish, document, and enforce endpoint security policies and procedures to safeguard sensitive data and ensure compliance with industry standards. Key Decisions / Dimensions Identification of right contacts for get vendor assessments completed on time. Review and decide if the observations shared by auditors for vendor assessment are correct and complete. Review and decide if closure evidence shared by vendors are sufficient to close the audit observations. Decide if the policy and procedure documents need changes based on new regulations or audit outcomes. Major Challenges Handling of fast changing regulatory expectations Handling of compliance expectations in stringent timelines Handling multiple stakeholders at a time including vendor, BFL team who has outsourced work to the vendor, third party consultants who assist in assessing vendors etc. Required Qualifications and Experience A) Qualifications Minimum qualification required is computer graduate with minimum of 4 Years of experience in information security. B) Work Experience Design, implement, and manage endpoint security solutions, including antivirus software, firewalls, and intrusion detection/prevention systems. Monitor network and endpoint security systems to detect and respond to security incidents. Lead a project team for the DLP deployment Spearhead the Endpoint DLP implementation and make recommendations accordingly through project plans Deliver the implementation within approved budget and timeline with minimal issues Provide and communicate the regular project progress of the deployment to stakeholders Apply effective project management methodologies and ensure appropriate action applies in corrective needs Conduct regular security assessments and vulnerability scans to identify potential security weaknesses. Ensure that endpoint security systems are configured and maintained in accordance with security best practices and industry standards. Collaborate with network and systems administrators to ensure that endpoint security solutions are integrated into the organizations overall security posture. Research and evaluate new security technologies and make recommendations for implementation. Develop and implement security policies and procedures for end-users, including guidelines for password management, email security, and the use of portable devices. Provide training and support to end-users on how to use endpoint security solutions effectively. Respond to security incidents and participate in incident response efforts as required. Stay up-to-date on the latest security trends and developments and maintain a high level of technical expertise in the field of endpoint security. s s as per JD Minimum Qualification Others

Posted Date not available

Apply

10.0 - 15.0 years

13 - 18 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: ForgeRock Identity Manager. Experience: 10 YEARS.

Posted Date not available

Apply

8.0 - 10.0 years

12 - 17 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SailPoint Identity Now. Experience: 8-10 Years.

Posted Date not available

Apply

8.0 - 10.0 years

12 - 17 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SailPoint Identity Now. Experience: 8-10 Years.

Posted Date not available

Apply

2.0 - 4.0 years

2 - 6 Lacs

thane

Work from Office

Job Summary: We are seeking knowledge on Security SolutionsSpecialist with hands-on experience in deploying, configuring, and managingsecurity platforms including EfficientIP (DNS, DHCP, IPAM), PicusSecurity (Breach and Attack Simulation), Varonis (Data Security& Governance), and ColorTokens (Microsegmentation & Zero Trust).The candidate will play a key role in optimizing the security posture of theorganization through proactive technology implementation, tuning, andcontinuous improvement. Good to have skills are below: EfficientIP (DNS Security & DDI Management): Configure and manage DDI (DNS, DHCP, IPAM) solutions using EfficientIP. Implement DNS threat protection, DNS tunneling detection, and response actions. Integrate EfficientIP with SIEM/SOC platforms for alerting and incident enrichment. Picus Security (Breach and Attack Simulation - BAS): Operate and tune the Picus BAS platform to continuously validate security controls. Conduct attack simulations mapped to MITRE ATT&CK to identify gaps in defenses. Collaborate with red/blue teams to interpret simulation outcomes and drive improvements. Varonis (Data Security and Insider Threat): Deploy and maintain Varonis to monitor access to critical data repositories (file shares, SharePoint, OneDrive, etc.). Investigate anomalous file activity, permissions misuse, and potential data exfiltration attempts. Support data classification, audit, and compliance initiatives (e.g., GDPR, HIPAA, PCI). ColorTokens (Microsegmentation & Zero Trust): Implement Zero Trust and application-layer segmentation policies using ColorTokens platform. Monitor east-west traffic, define security zones, and restrict lateral movement. Work with infrastructure and cloud teams to enforce policy across hybrid environments. Required Qualifications: Education: B.E./B.Tech/MCA/M.Sc. in Computer Science or Information Technology Certification : CEH

Posted Date not available

Apply

8.0 - 10.0 years

12 - 17 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Security Information Event Management.Experience: 8-10 Years.

Posted Date not available

Apply

10.0 - 14.0 years

13 - 18 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SailPoint Identity Now.Experience: 10 YEARS.

Posted Date not available

Apply

8.0 - 10.0 years

12 - 17 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Forgerock Access Manager. Experience: 8-10 Years.

Posted Date not available

Apply

8.0 - 10.0 years

12 - 17 Lacs

hyderabad

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Varonis - Data Classification. Experience: 8-10 Years.

Posted Date not available

Apply

8.0 - 10.0 years

12 - 17 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SailPoint Identity Mgmt and Governance.Experience: 8-10 Years.

Posted Date not available

Apply

3.0 - 5.0 years

0 - 3 Lacs

pune

Work from Office

Role: The Security Operations (SOC) - Engineer is responsible for monitoring the environment, identifying, reporting, and responding to security threats that put the organization at risk. The primary function of this position is to monitor the security tools and perform alert management and initial incident qualification. Job Description Acknowledge, analyze, and validate incidents triggered from multiple security tools like IDS/IPS, Web Application Firewall, Firewalls, Endpoint Detection & Response tools, and events through SIEM solution Acknowledge, analyze, and validate incidents received through other reporting mechanisms such as email, phone calls, management directions, etc. Collection of necessary logs that could help in the incident containment and security investigation Escalate validated and confirmed incidents to Security administrators Undertake first stages of false positive and false negative analysis Understand the structure and the meaning of logs from different log sources such as FW, IDS/IPS, WAF, Windows DC, Cloudflare, AV and antimalware software, O365 email security etc. Open incidents in ticketing platform to report the alarms triggered or threats detected. Track and update incidents and requests based on updates and analysis results Report infrastructure issues to the IMS Team Working with vendors to work on security issues. Perform other duties as assigned Skills: Strong security knowledge Should have expertise on TCP/IP network traffic and event log analysis Experience with Linux, Windows and Network Operating Systems required. Knowledge and hands-on experience in management of IDS/IPS, Firewall, VPN, and other security products Experience in Security Information Event Management (SIEM) tools, creation of basic co-relation rules, and administration of SIEM Knowledge and hands-on experience in Log management & Endpoint detection and response tools Knowledge of ITIL disciplines such as Incident, Problem and Change Management Strong interpersonal skills including excellent written/verbal communication skills Interview Process: Technical Interview HRBP Interview Consent: Consent: we will use your resume for current full-time job openings with us and retain it for future opportunities

Posted Date not available

Apply

10.0 - 15.0 years

13 - 18 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: IDAM Security Consulting.Experience: 10 YEARS.

Posted Date not available

Apply

8.0 - 10.0 years

12 - 17 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SailPoint Identity Mgmt and Governance.Experience: 8-10 Years.

Posted Date not available

Apply

8.0 - 10.0 years

12 - 17 Lacs

noida

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk. Experience: 8-10 Years.

Posted Date not available

Apply

12.0 - 18.0 years

12 - 16 Lacs

greater noida

Work from Office

- Develop and enforce security policies, protocols, and procedures. - Oversee security audits and ensure compliance with regulations such as ISO 27001, GDPR, and PCI DSS - incident response Collaborate with IT & business units Coordinate with vendors

Posted Date not available

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies