Jobs
Interviews

830 Endpoint Security Jobs - Page 4

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 10.0 years

0 Lacs

thiruvananthapuram, kerala

On-site

You are seeking an Endpoint Security Specialist with 3 to 10 years of experience and a strong understanding of Endpoint Security solutions, including Anti-Virus (AV), Extended Detection and Response (XDR), and Endpoint Detection and Response (EDR). In this role, you will be responsible for designing, implementing, configuring, and maintaining endpoint security platforms and associated policies. Your expertise in enterprise computing and endpoint architecture design, along with hands-on experience in triaging malware and responding to security incidents, will be crucial for success. Your key responsibilities will include: - Designing, implementing, and maintaining endpoint security solutions (AV, XDR, EDR) to safeguard against evolving cyber threats. - Developing and enforcing endpoint security policies across the organization. - Collaborating with cross-functional teams to ensure alignment of endpoint security with overall cybersecurity strategies. - Monitoring and triaging security incidents, investigating potential threats, and taking necessary remediation actions. - Leading Security Incident Response (SIR) efforts, including malware analysis and threat containment. - Continuously evaluating and enhancing the security posture of endpoint systems. - Staying updated on the latest trends, vulnerabilities, and attack techniques in endpoint security. To qualify for this role, you should have: - Strong experience with endpoint security technologies such as Anti-Virus (AV), Extended Detection and Response (XDR), and Endpoint Detection and Response (EDR). - Proven experience in designing, implementing, and managing endpoint security solutions. - A solid understanding of enterprise computing environments and endpoint architecture design patterns in cybersecurity. - Experience in malware triage, investigation, and Security Incident Response. - Excellent analytical and problem-solving skills. - Strong communication skills and the ability to work effectively in a collaborative team environment. - Relevant certifications (e.g., CEH, CISSP, CompTIA Security+, etc.) are a plus. Key skills required for this role include Endpoint Security, Enterprise Computing, and Endpoint Architecture Design. About UST: UST is a global digital transformation solutions provider that has been partnering with leading companies worldwide for over 20 years. With a focus on technology, people, and purpose, UST works with clients from design to operation, embedding innovation and agility into their organizations. With a workforce of over 30,000 employees across 30 countries, UST influences billions of lives through its boundless impact and domain expertise.,

Posted 1 week ago

Apply

12.0 - 16.0 years

0 Lacs

chennai, tamil nadu

On-site

We are Omnissa! The world is evolving fast, and organizations everywhere from corporations to schools are under immense pressure to provide flexible, work-from-anywhere solutions. They need IT infrastructure that empowers employees and customers to access applications from any device, on any cloud, all while maintaining top-tier security. That's where Omnissa comes in. The Omnissa Platform is the first AI-driven digital work platform that enables smart, seamless, and secure work experiences from anywhere. It uniquely integrates multiple industry-leading solutions including Unified Endpoint Management, Virtual Apps and Desktops, Digital Employee Experience, and Security & Compliance through common data, identity, administration, and automation services. Built on the vision of autonomous workspaces - self-configuring, self-healing, and self-securing - Omnissa continuously adapts to the way people work; delivering personalized and engaging employee experiences, while optimizing security, IT operations, and costs. We're experiencing rapid growth, and this is just the beginning of our journey! At Omnissa, we're driven by a shared mission to maximize value for our customers. Our five Core Values guide us: Act in Alignment, Build Trust, Foster Inclusiveness, Drive Efficiency, and Maximize Customer Value - all with the aim of achieving shared success for our clients and our team. As a global private company with over 4,000 employees, we're always looking for passionate, talented individuals to join us. If you're ready to make an impact and help shape the future of work, we'd love to hear from you! What is the opportunity : This role will be responsible for handling complex technical design discussions across various stakeholders. Here is a breakdown of the responsibilities for the two available roles: - For Staff Engineer with 12+ years of experience: Strong in Coding, Problem-solving, technical expertise in architecting and designing for SaaS applications, providing technical mentorship to the team, subject matter expertise in multiple DevOps domains, proven track record of mentorship, and driving and completing organization-wide projects. - Supporting a global customer-facing SaaS service and working with AWS or Similar infrastructure at a global scale. - Strong development background in Python, Ruby, or a similar language. - Experience maintaining infrastructure as code (e.g., Terraform, Ansible, Chef, Puppet). - Solid security background covering areas such as PKI, TLS, WAF, firewalls, endpoint security, and secrets management. - Networking experience including routing, switching, DNS, proxies, load balancers, and micro-segmentation. - Proficiency in DevOps, Agile, and CI/CD processes. - Excellent communication and leadership skills. - Ability to work collaboratively across cross-functional teams and geographies. What will you bring to Omnissa - Lead the architecture and design of key aspects of the UEM SaaS service. - Interface with the UEM development team to advocate for and drive product changes required by SaaS Ops. - Develop Terraform modules to deploy and configure AWS infrastructure. - Develop Ansible roles to deploy and configure UEM software. - Participate in design reviews, code reviews, 5-whys, and CAB. - Identify process or pipeline improvements to increase team efficiency. - Participate in the on-call rotation. - Champion engineering initiatives and foster a culture of high ownership, continuous improvement, and excellence. - Handle customer-impacting escalations, prioritizing engineering work effectively. Location: Chennai Location Type: HYBRID. This role offers a balanced arrangement, with the expectation of working 3 days a week in our local office and the flexibility to work from home for the remaining days. It is essential that you reside within a reasonable commuting distance of the office location for the in-office workdays. Travel Expectations: 10% of travel Domestic/International only if business demands. What is the leadership like for this role What is the structure and culture of the team like This role reports to the Senior Manager of Engineering. The global team consists of individuals based in Bengaluru and other cities. The expectation is to grow the Bengaluru team considerably over time. We are a close-knit group of senior engineers with deep experience delivering our UEM solution as a cloud service to the world's largest companies. We work closely with our counterparts in the US to drive key platform improvements that focus on security, service availability, resiliency, and cost reduction. The success of our customers is our highest priority. Omnissa industry recognition and awards: - Gartner Magic Quadrant: Consistently positioned as a leader in Gartner's Magic Quadrant for Desktop as a Service (DaaS) and Virtual Desktop Infrastructure (VDI). - IDC MarketScape Q2 2024: Recognized as a leader in IDC MarketScape reports for EUC. - Forrester Wave report for Q4 2023: Workspace ONE received the highest scores in the current offering category and the second-highest scores in the strategy category. - Customer Satisfaction and Reviews: High ratings and positive reviews on platforms like Gartner Peer Insights and TrustRadius. "Omnissa is committed to building a workforce that reflects the communities we serve across the globe. We believe this brings unique perspectives, experiences, and ideas, which are essential for driving innovation and achieving business success. We hire based on merit and with equal opportunity for all." Omnissa is an Equal Employment Opportunity company and Prohibits Discrimination and Harassment of Any Kind.,

Posted 1 week ago

Apply

3.0 - 7.0 years

0 Lacs

karnataka

On-site

As a Cloud Security Analyst & Incident Response Specialist, you will be responsible for monitoring and investigating high-risk alerts from Wiz across AWS, Azure, and GCP environments. Your role will involve analyzing attack paths, exposed services, and identity risks using Wiz Security Graph. You will collaborate with DevSecOps and Cloud Platform teams to triage and contain incidents, correlating Wiz alerts with signals from SIEM, endpoint, and identity tools to understand the full attack context. Supporting incident response efforts by conducting root cause analysis and post-incident reviews will also be part of your responsibilities. Your critical skills should include a degree in Cybersecurity, Information Security, Computer Science, or equivalent practical experience. You should have 3-6 years of experience in security operations, incident response, or threat detection, ideally with a cloud focus. Familiarity with Wiz, including security graph analysis, alert triage, and custom WQL queries is required. Understanding common cloud threats and misconfigurations in AWS, Azure, and/or GCP is essential, along with experience in tools like Microsoft Sentinel, Defender for Cloud, or other SIEM/SOAR platforms. Knowledge of core security concepts such as IAM, network security, and the MITRE ATT&CK framework is crucial. In this role, you will develop or improve playbooks for automated cloud incident response and stay current on evolving threats in cloud environments, such as identity-based attacks, privilege escalation, and lateral movement. Documenting response workflows, findings, and lessons learned to support continuous improvement is also expected. You should be comfortable working in fast-paced environments with cross-functional teams, possessing strong analytical and communication skills for documenting and sharing threat insights.,

Posted 1 week ago

Apply

3.0 - 7.0 years

0 Lacs

pune, maharashtra

On-site

The focus of the Customer/Technical Training role involves planning and executing customer and/or employee training on the firm's products. You are expected to have a deep understanding of current product usage and applications. Your responsibilities will include coordinating the staffing and scheduling of in-house and field training, with the possibility of training Sales Representatives. As part of our Training Team, you will be responsible for delivering top-notch technical training on Qualys IT security risk and compliance solutions, both in classroom settings and online. We are a global team of training professionals dedicated to helping customers excel with our products. We are seeking an experienced Technical Trainer to join our team. Your main duties will involve consulting with stakeholders to identify technical enablement needs, collaborating with various teams to ensure training content meets business requirements, and providing technical training to customers, prospects, partners, and internal employees through different mediums. You will work closely with team members to develop and deliver high-quality technical training materials in various formats, including eLearning, videos, simulations, labs, and instructor-led classroom sessions. In this role, you will independently design, create, and maintain virtual lab environments and associated lab guides to support technical training courses. You will also be an advocate for Qualys Products and play a key role in the success of our training programs. Peer reviews for content development activities, assisting Leads on Training Projects, and becoming a subject matter expert on flagship products will also be part of your responsibilities. To be successful in this role, you must have a BSc/MSc degree or equivalent experience in computer science or related engineering fields. A minimum of 3+ years of experience in delivering technical training, along with 5+ years of experience with Cyber Security products or platforms, is required. You should possess strong communication skills, the ability to manage multiple tasks simultaneously, and be willing to adapt to new technologies quickly. Additionally, you must be based in Pune, India, open to travel for onsite training, and experienced in working across multiple geographic regions when necessary. Desirable skills and experiences include knowledge and usage of Qualys products, delivering Certification-based Training, multilingual abilities, video content creation skills, understanding of compliance standards and cloud platforms, proficiency in creating/modifying custom scripts, building complex virtual environments, familiarity with adult learning theory and instructional design models, and certifications like CompTIA Security +, ISC2 CC, and Cloud Platform Certifications. During the interview process, a technical presentation will be required, and providing references of sample videos and training materials you have created will be advantageous.,

Posted 1 week ago

Apply

6.0 - 11.0 years

4 - 9 Lacs

hyderabad

Work from Office

We are hiring Endpoint Network Security Engineer in Hyderabad. Job Title: Endpoint Network Security Engineer Location: Hyderabad, India Job Type: Full-Time Job Overview: We are looking for an Endpoint Network Security Engineer to help protect and manage our companys laptops, desktops, servers, and mobile devices. You will be responsible for securing endpoints, managing software installations, keeping systems updated, and monitoring for threats. Key Responsibilities: Endpoint Security & Protection Install, manage, and update endpoint security tools (e.g., antivirus, EDR, DLP). Ensure all endpoints follow company security standards and policies. Imaging & Software Installation Build and deploy secure system images for devices (Windows/macOS). Install, update, and remove software using automation tools or scripts. Patching & Updates Regularly apply security patches and updates to operating systems and applications. Monitor patch compliance and address systems that fall behind. Monitoring & Threat Detection Monitor devices and networks for suspicious activity using tools like SIEM and EDR. Investigate alerts and support incident response efforts. Ensure all monitoring tools are running and reporting properly. Reporting & Support Maintain records of patching, imaging, and security incidents. Support IT and security teams in improving overall endpoint protection. Requirements: 8 years of experience in IT security or a similar role. Experience with endpoint protection tools (e.g., Microsoft Defender, CrowdStrike). Basic knowledge of patching tools (e.g., SCCM, Intune, WSUS). Familiarity with imaging tools (e.g., MDT, Autopilot, JAMF). Understanding of SIEM/EDR solutions and how to respond to alerts. Strong troubleshooting and communication skills.

Posted 1 week ago

Apply

5.0 - 7.0 years

13 - 17 Lacs

bengaluru

Work from Office

Uniphore is one of the largest B2B AI-native companies decades-proven, built-for-scale and designed for the enterprise. The company drives business outcomes, across multiple industry verticals, and enables the largest global deployments. Uniphore infuses AI into every part of the enterprise that impacts the customer. We deliver the only multimodal architecture centered on customers that combines Generative AI, Knowledge AI, Emotion AI, workflow automation and a co-pilot to guide you. We understand better than anyone how to capture voice, video and text and how to analyze all types of data. As AI becomes more powerful, every part of the enterprise that impacts the customer will be disrupted. We believe the future will run on the connective tissue between people, machines and data: all in the service of creating the most human processes and experiences for customers and employees. Job Description: About The Role We are looking for a dedicated and experienced Senior IAM and Corporate Security Engineer to own and mature our identity and access management program. In this critical role, you will be responsible for designing, implementing, and managing the systems and processes that control access to our corporate, cloud, and application environments. You will be a key contributor to our modern identity solutions, corporate security posture, ensuring that employee workstations, corporate networks, and SaaS applications are secure. This is a hands-on role for an engineer who is passionate about automation, security-as-code, and building a scalable and secure identity fabric for a complex, multi-cloud enterprise. What You Will Do (Key Responsibilities) Design, build, and maintain a comprehensive IAM strategy that covers corporate (Azure AD), all cloud platforms (AWS, Azure, GCP), and third-party SaaS applications. Develop and enforce Role-Based Access Control models and policies to ensure the principle of least privilege is consistently applied. Lead the management and configuration of a Privileged Access Management (PAM) solution to secure and monitor access to critical systems. Utilize Infrastructure as Code with Terraform to define and manage IAM policies, roles, and permissions in our cloud environments. Develop and manage automated workflows for the entire identity lifecycle, including user onboarding, offboarding, access requests, and periodic recertification. Partner with the primary owners of our identity provider to assess the current state, identify security gaps, develop a strategic roadmap, and assist in implementing improvements to conditional access policies, SSO integrations, and identity governance. Implement and manage a robust entitlement management program to govern access to applications and data. Lead all efforts to harden corporate IT assets and applications by designing and implementing endpoint security policies, as well as contributing to network security controls. Streamline corporate IT procedures, such as user access reviews and audits, to ensure permissions are appropriate and up-to-date . Respond to and investigate access-related security incidents and alerts. Partner with IT, DevOps, and engineering teams to integrate IAM controls into their workflows and CI/CD pipelines. Develop and document standards, procedures, and best practices for identity and access management. Research and develop an IAM framework to securely govern access for emerging technologies, including our LLM and AI platforms. Required Qualifications 5-7 years of direct experience in an Identity and Access Management role. Deep, hands-on expertise with Azure Active Directory, Conditional Access, and PIM. Proven experience managing IAM in multi-cloud environments (AWS IAM , Azure IAM, Google Cloud IAM). Strong proficiency with Infrastructure as Code, specifically using Terraform to manage IAM resources. Demonstrable experience deploying and managing a Privileged Access Management (PAM) solution within engineering environments . Solid understanding of modern authentication and authorization protocols, including SAML, OAuth 2.0, OIDC, and passwordless standards like FIDO2. Experience with hardening corporate assets, CIS benchmarks and managing corporate security tools such as Extended Detection and Response (XDR). Preferred Qualifications Experience with scripting languages such as Python or PowerShell for automation. Familiarity with identity governance and administration (IGA) platforms. Relevant industry certifications such as CISSP , etc . Experience building IAM controls for AI/ML or LLM environments. Bachelors degree in Computer Science , Information Security, or a related field. Location preference: India - Bangalore For more information on how Uniphore uses AI to unify and humanize every enterprise experience, please visit www.uniphore.com.

Posted 1 week ago

Apply

3.0 - 7.0 years

5 - 9 Lacs

bengaluru

Work from Office

Req ID: Come join our passionate team! Barracuda is a leading cybersecurity company providing complete protection against complex threats. Our platform protects email, data, applications, and networks with innovative solutions, and a managed XDR service, to strengthen cyber resilience. Hundreds of thousands of IT professionals and managed service providers worldwide trust us to protect and support them with solutions that are easy to buy, deploy, and use. We know a diverse workforce adds to our collective value and strength as an organization. Barracuda Networks is proud to be an employer that complies with all applicable national, state and local laws pertaining to nondiscrimination and equal opportunity regardless of race, gender, religion, sex, sexual orientation, national origin, or disability. Envision yourself at Barracuda: The Endpoint Security Engineer will work among the global Security Operations Center team, supporting the optimal delivery of the endpoint protection service and support across our customer base. What you ll be working on: Full management of the endpoint protection platform for all tenants. Proactive testing of new product features and agent versions released. Proactive threat hunting within the admin console. Conduct attack and defend exercises within our lab environments to evaluate protection capabilities based on latest endpoint security threats. Responsible for supporting incident response efforts pertaining to endpoint security incidents. Ongoing development of rules within the XDR platform to alert customers of endpoint threat detections. Execute and automate remediation actions based on endpoint security threats detected within the XDR platform. Manage device policies to ensure optimal security settings are applied to best fit each tenant. Implement changes as requested by customers. Changes include but are not limited to: Exclusions Block-listing Policy changes Device updates Troubleshoot any issues that may arise within the given tenants. This typically requires remote sessions working with customers in real-time. Regularly meet with vendor representatives to manage support cases, updates, etc. Support on-call schedule for the endpoint security team. Conduct knowledge-share and training for the GSOC team as a whole on endpoint protection updates. Ensure the customer security dashboard displays visualizations and reports of all relevant endpoint protection data to the customers. What you ll bring to the role: Hands-on experience working with and managing advanced endpoint protection tools such as: Carbon Black CrowdStrike Cylance SentinelOne Experience working in a security operations center. Security analysis and incident response skills pertaining specifically to endpoint security threats such as malware, ransomware, etc. Experience conducting testing within lab/sandbox environments. Knowledgeable in conducting cybersecurity threat hunting. Strong customer service skills. Knowledge and understanding of corporate IT environments: networking, cloud, etc. Bachelors/Masters degree in cybersecurity or relevant field is preferred. CEH, CompTIA Security+, and similar certifications or cybersecurity bootcamps are preferred. What you ll get from us: A team where you can voice your opinion, make an impact, and where you and your experience are valued. Internal mobility there are opportunities for cross training and the ability to attain your next career step within Barracuda. In addition, you will receive equity, in the form of non-qualifying options.

Posted 1 week ago

Apply

10.0 - 20.0 years

20 - 35 Lacs

bengaluru

Hybrid

Hiring: Senior Security Consultant Orange Cyberdefense Were looking for a Senior Security Consultant with strong presales skills, deep security knowledge (SIEM, Cloud Security, Incident Response), and the ability to lead customer conversations at C-level . Certifications like CISSP, CISA, OSCP a big plus . Ready to shape the future of cybersecurity? Role & responsibilities The Senior Security Consultant will possess a proven track record to lead a sales effort that incorporates teaming with Orange sales teams (including account teams, pre-sales consultants, solutions architects, customer service managers, demand generation, marketing, cross business units specialists, etc) and technology partners in positioning and selling Orange Cyberdefense solutions and its portfolio, as well as assisting in providing product/service and commercial overviews of Orange Cyberdefense offerings. The Senior Security Consultant is a security subject-matter expert who must have strong written and verbal communications skills, consistent with developing C-level enterprise customer relationships, and demonstrated ability to work across a matrixed, cross-functional team. In this role, you will work directly with some of the largest Orange customers and acquire new customers, developing and exercising the necessary executive and technical relationships to advise them on strategies to improve their security posture through adoption and operationalization of security solutions around a wide range of technologies (CyberSOC, SIEM, SOAR, SASE, MDR, XMDR), application security, and cloud security initiatives to drive secure by design and zero trust for cyber resiliency across India. The Senior Security Consultant has a combined technical sales and consultative background with very strong business and commercial affinities, with the focus on promoting and positioning Orange Cyberdefense solutions and other technologies and/or services through conference calls, on-site visits to potential new customers and existing customers. The Security Sales Expert is a corner stone in forging strong client relationships with senior leaders and key influencers, supporting the development and answering security solution designs and technical descriptions for RFIs & RFPs, drafting cost sheets and assists in closing deals with Orange sales team. The Senior Security Consultant will contribute to the creation of scalable sales plays and execute go-to-market programs that simplify and synthesize Orange Cyberdefense key selling messages, and help to equip the broad ecosystem of Orange customer-facing teams with the knowledge and confidence to amplify Orange Cyberdefense sales plays. Key responsibilities are as follows: Understand customers business models and drivers and translate them into solution specifications and outcomes through strong knowledge of the Orange Cyberdefense portfolio. Lead security solutions sales in INDIA with focus in strategic consulting, complex security Solutions, and managed security services to drive new client engagements and increase market share across industries. Inform Orange sales team of service offerings and changes, while refining sales messaging and value propositions. Attend, lead and engage with customer meetings and events to introduce and promote Orange Cyberdefense solutions and services. Partner with pre-sales consultants as required in qualifying opportunities, delivering demonstrations, and providing security consulting expertise. Provide design support of security solutions for both new and existing customers (managed or integrated) in support of increasing sales. Actively support responses to proposals, RFQ, RFP and RFI requirements Support Account Managers with the accurate forecasting of security opportunities and managing pipeline. Attend training sessions, both in-house, vendor specific and external Preferred candidate profile Technical Competencies Information Security Cloud technologies and Security (ie Microsoft, Cisco, Zscaler, Palo Alto Network, Fortinet, Checkpoint, etc) Offensive Security Defensive Security OT Security Network architecture IP Routing Operating systems (Windows, *nix) Experience / Knowledge Required Demonstrable experience as a security sales consultant / architect, preferably with presales or consulting experience. 8+ years of experience into Security Domain Experience with Managed Security Services portfolios specifically Security Operations Centres. Customer facing experience with strong presentation skills Experience in writing proposals and scopes, responding to tenders/RFQ/RFP/RFI Strong knowledge of Security Information & Event Management (SIEM), Secure Access Service Edge (SASE), Endpoint Detection & Response, Threat Intelligence solutions, Privileged Access management, Cloud Security, SASE Governance Risk and Compliance, and/or other enterprise security solutions Good understanding in Cyber Security Incident detection and response practices and/or processes. e.g. NIST Incident Handling Guidelines, Cyber Kill Chain, MITRE ATT&CK Framework etc. Strong communication skills, both written and verbal Confidence, tenacity, creativity and flexibility in thinking Key Contacts/Relationships Members of staff within the Sales department Members of staff within the Professional Services Team Members of staff within the MSS department Global Pre-Sales team Global Services and Portfolio teams Regional Head

Posted 1 week ago

Apply

15.0 - 20.0 years

19 - 25 Lacs

gurugram

Work from Office

As MSS head you will be leading a team of experts for providing Managed Security Services for Telcom Service providers. The Managed security services shall include Security Operation Centre, Vulnerability assessment and penetration testing, Risk assessment, Base Line Hardening, Governance Risk and Compliance. You have: 15+years of experience, in Cyber Security on driving Managed Security Operations / Information Security Programs for Organizations, preferably in Telecom space Expertise in the areas of Security Monitoring & Response, Threat detection, hunting, Intelligence feeds, Advisory, Cyber Forensics investigations, SOAR (Security Orchestration Automation and Response), EDR, MDR and XDR endpoint security technologiesExpertise in Threat Modelling techniques, Threat frameworks, Development of attack use cases and implementation. Knowledge on functioning of SIEM Solution (Splunk / ELK), Parser creation Knowledge on tool-based Automation of processes for GRC, MBSS, SOC Good understanding of Vulnerability Management and Penetration testing activities, Red teaming, Implementation of Minimum Base line Security hardening controls. Understanding of Security governance and compliance within the Telecom industry, licensing conditions, Managing governance, risk, and compliance initiatives. Conduct of IS and Compliance audits, Risk assessments and Risk Mitigation Excellent governance ability to handle large security operations, effective follow ups and closure management with stakeholders for VA, Security Advisory, Incidence Management to ensure effective risk mitigation Ability to communicate effectively at the senior level, must have outstanding communication skills to influence others and meet timelines while building positive relationships both internally and externally Mentoring the team, interacting with them and to support them in their professional growth, and identifying and recognizing talents. Ability to handle key interfaces for this role like Customer CISO, Network Security Head and team, CTO, 3rd Party Subcontractors / Partners. Conduct of effective Program Governance with customer and internally A bachelor's degree in engineering in computer science, Communication Theory, information technology, or a related field. An MBA, MS / M tech is preferable. It would be if you also had: Any two of the recognized industry security certifications listed below: CISSP, CISA, CISM, CRISC, GCIH, GCFA, Any other GIAC Certification, ISO/IEC 27001 Act as trusted advisor to customer on Cyber Security issues and supporting customer so that newly - acquired technologies by customer complies with the Cyber security regulations Sound knowledge of information security management frameworks ISO 27001, NIST, CSA (Cloud Security). Knowledge on 3GPP, ITU-T desirable. Excellent knowledge of Operational processes. Knowledge and understanding of relevant legal and regulatory requirements e.g. Country specific telecom security conditions, CII (Critical Information Infrastructure) regulations etc Knowledge about Govt agencies at National Level dealing with Cyber Security. Excellent leadership abilities proved through managing a large Security Operations role earlier / other comparable position. Results-oriented. Able to work independently and take a logical and orderly approach to analyze problems, coordinating work and planning actions. Ability to drive team engagements in a tough and time-critical environment Knowledge on the Telcom technologies (2G, 4G, 5G, Fixed Line) key functions and associated security features desirable Education Qualifications Delivering MSS KPIs and deliverables as per defined contract. Ensure delivery of Project within defined budget for targeted margins in project Prime interface of customer for all MSS related deliverables, issues, and requirements Interface with customer for routine governance and escalation Support new business initiatives from MSS perspective Formulate and drive revenue and margin maximization initiatives Ensure customer satisfaction

Posted 1 week ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisation€™s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP€™s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client€™s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: ForgeRock Identity Manager . Experience: 8-10 Years .

Posted 1 week ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

hyderabad

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Azure B2X Security . Experience: 8-10 Years .

Posted 1 week ago

Apply

4.0 - 9.0 years

7 - 15 Lacs

pune, mumbai (all areas)

Work from Office

We are seeking a highly skilled and experienced Endpoint Security Developer/Lead to design, develop, and maintain endpoint security solutions that protect our enterprise infrastructure. You will play a key role in defining endpoint protection strategy, developing custom security tools, integrating with security platforms (EDR, AV, DLP, etc.), and leading technical efforts to prevent, detect, and respond to threats targeting endpoints. Key Responsibilities Design and implement endpoint security solutions including antivirus, EDR, DLP, disk encryption, and configuration hardening. Develop custom scripts, tools, and integrations to enhance endpoint protection and monitoring. Lead the technical design and deployment of endpoint protection strategies for Windows, macOS, and Linux systems. Collaborate with the SOC, incident response, and IT teams to improve detection and response capabilities on endpoints. Evaluate and integrate third-party endpoint protection products (CrowdStrike, Defender for Endpoint, Trellix, etc.) Stay current with industry trends and emerging threats affecting endpoint security. Required Qualifications 3+ years of experience in cybersecurity, with at least 2+ years in endpoint security development or engineering. Strong programming/scripting skills in Python, PowerShell, Bash, or similar languages. Hands-on experience with endpoint protection tools (e.g., CrowdStrike, SentinelOne, Defender ATP, Tanium). Deep understanding of operating systems internals (Windows, Linux, macOS) and endpoint threat landscapes. Experience with deployment automation tools (e.g., Ansible, SCCM, Intune, JAMF). Strong knowledge of cybersecurity frameworks (e.g., MITRE ATT&CK, CIS Controls).

Posted 1 week ago

Apply

6.0 - 11.0 years

8 - 15 Lacs

mumbai

Work from Office

We are seeking a seasoned and proactive Data Loss Prevention (DLP) Lead to design, implement, and manage our enterprise DLP program. This role will be responsible for protecting sensitive data across endpoints, networks, cloud, and email systems, ensuring compliance with regulatory requirements and internal policies. As the DLP Lead, you will work closely with security operations, IT, legal, compliance, and business stakeholders to prevent data exfiltration, misuse, or leakage. Key Responsibilities Own the end-to-end DLP strategy, architecture, implementation, and management across enterprise environments. Lead the design and tuning of DLP policies, rules, and alerts to protect PII, PCI, PHI, intellectual property, and other sensitive data. Work with stakeholders (e.g., legal, compliance, data governance) to identify and classify sensitive data and define DLP policy requirements. Manage and operate DLP tools (e.g., Microsoft Purview, Symantec DLP, Forcepoint, Digital Guardian, Zscaler DLP, etc.). Conduct risk assessments, gap analyses, and DLP policy reviews to identify and mitigate potential data exposure risks. Collaborate with incident response and SOC teams to triage, investigate, and remediate DLP events. Monitor and report on DLP incidents, trends, and program KPIs to senior leadership. Mentor junior security analysts or engineers involved in data protection activities. Required Qualifications 5 to 10 years of experience in cybersecurity, with 3+ years specifically managing or leading DLP programs. Strong hands-on experience with at least one major DLP platform (e.g., Microsoft Purview, Symantec, Forcepoint, Digital Guardian, etc.). In-depth understanding of data classification, data flows, encryption, and insider threat management. Familiarity with privacy regulations and compliance frameworks (e.g., GDPR, HIPAA, PCI-DSS, ISO 27001, NIST 800-53). Experience integrating DLP with CASB, EDR, email security, and cloud platforms (e.g., O365, GCP, AWS).

Posted 1 week ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Security Information Event Management .Experience: 8-10 Years .

Posted 1 week ago

Apply

6.0 - 11.0 years

12 - 20 Lacs

bengaluru

Hybrid

Minimum experience of 6 years in engineering & operations of security & compliance of cloud systems is a must-have Good knowledge of Cloud Services (like Azure servers, GCP servers) Good knowledge of Operating Systems (Windows servers & clients, Linux servers & clients, Mac clients) Good knowledge of Endpoint Security Tools functionalities and structure Good knowledge of networking concept (Security Groups, NACL's, routing, switching, proxy, firewall) Understanding of common cloud IT issues Understanding of MITRE ATTCK framework and being able to drive design of security controls from the various threats, actors and TTP is a must-have Understanding of Waterfall and Agile processes and principles Good communication and presentation skills Preferred: Previous working experience as a Cloud Security Engineer Understanding of endpoint security controls, forensics, risk assessment and security metrics Solid understanding of Cloud, Windows & Linux security

Posted 1 week ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

mumbai

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: IBM Security Identity Manager . Experience: 8-10 Years .

Posted 1 week ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Data Privacy . Experience: 8-10 Years .

Posted 1 week ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

coimbatore

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk . Experience: 8-10 Years .

Posted 1 week ago

Apply

4.0 - 8.0 years

12 - 20 Lacs

pune

Work from Office

implement, manage security measures to protect endpoint devices Threat Detection & Response Patching and Updates Encryption Certifications (CEH, CISSP, CompTIA Security) endpoint security tools and technologies

Posted 1 week ago

Apply

5.0 - 9.0 years

0 Lacs

maharashtra

On-site

As an Information Security Analyst at DNEG, your role will involve providing essential support to the global InfoSec team and colleagues across the company. You will be expected to work as an InfoSec generalist with a strong technical foundation, while also assisting in GRC functions such as internal and external audits. You will play a crucial role in enhancing the company's assurance and compliance capabilities by collaborating closely with various InfoSec teams, internal IT departments, and colleagues. Your responsibilities will include monitoring, investigating, and resolving issues that may compromise the confidentiality and integrity of the company's systems, as well as documenting technical procedures to improve existing workflows. To excel in this role, you should have 5 to 8 years of experience in SOC/Security Operations or a relevant technical role. Knowledge of cybersecurity operations, incident response management, and various security tools is highly beneficial. Familiarity with network security, endpoint security, access control concepts, and operating systems is essential. Experience with SIEM, security data analytics, vulnerability management tools, penetration testing methodologies, and ITIL framework will be valuable. A Certified Information Systems Security Professional (CISSP) certification is required for this position. While a bachelor's degree in IT or Computer Science is desirable, it is not mandatory. Additional certifications such as Certified Ethical Hacker (CEH) or Cisco CCNA would be beneficial but not essential. Overall, the successful candidate will be a proactive team player with excellent interpersonal and communication skills, a strong technical background, and a willingness to adapt and enhance existing InfoSec technologies to meet the company's evolving needs.,

Posted 1 week ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

mumbai

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Fortinet Firewall .Experience: 8-10 Years .>

Posted 1 week ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: PKI - Certificate Management . Experience: 8-10 Years .

Posted 1 week ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Security Information Event Management .Experience: 8-10 Years .

Posted 1 week ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Fortinet Firewall .Experience: 8-10 Years .

Posted 1 week ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Fortinet Firewall .Experience: 8-10 Years .

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies