Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: PingFederate . Experience: 8-10 Years .
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
hyderabad
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Security Log Monitoring . Experience: 8-10 Years .
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SailPoint Identity Mgmt and Governance . Experience: 8-10 Years .
Posted 1 week ago
5.0 - 8.0 years
3 - 15 Lacs
bengaluru
Work from Office
Sr. Endpoint Security Engineer Job Description If you have Endpoint Security Product experience as a Technical Support Engineer, reach out for a more detailed JD. We are looking for immediate joiners. We are NOT looking for SOC Analysts! Work from home Health insurance Provident fund
Posted 1 week ago
6.0 - 10.0 years
0 Lacs
pune
Work from Office
Job Description: ITCI Cyber Security team is looking for responsible person in overseeing the endpoint protection landscape, including antivirus, endpoint detection and response (EDR), and encryption solutions. The individual will drive policy deployment, incident analysis, threat remediation, and continuous optimization of endpoint security configurations. Strategic alignment with regulatory requirements and organizational risk tolerance is a core expectation. Key Responsibilities: Oversee the enterprise-wide administration of Trend Micro Apex One AV and encryption agents for all endpoints. Define, enforce, and tune endpoint security policies covering malware, ransomware, and data-at-rest encryption. Lead critical incident analysis related to endpoint compromises, suspicious behaviors, and zero-day threats. Work with SOC and SIEM teams for behavioral threat correlation and response automation. Establish an endpoint security dashboard with visibility across asset health, update compliance, and active threat detection. Conduct endpoint security posture audits, vulnerability patch validation, and system health monitoring. Integrate encryption enforcement for compliance with RBI, SEBI, and DPDP norms on endpoint data protection. Author endpoint protection standards, hardening guidelines, and operational playbooks for policy rollouts. Provide expert-level support and RCA for persistent malware, fileless attacks, or endpoint anomalies. Engage in red-blue team assessments and continuously evolve endpoint security resilience strategies. Key Skills & Certifications: 8+ years in endpoint protection, encryption, and malware response. Strong hands-on experience with Trend Micro Apex One and Trelix device encryption platforms. Certified Trend Micro Security Expert (CPSE), ISO 27001 LA, or equivalent. Familiar with endpoint telemetry integration into EDR/XDR systems. Strong understanding of secure configuration baselines for laptops/desktops.
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Security Incident Response . Experience: 8-10 Years .
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SAP GRC Process Control . Experience: 8-10 Years .
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Threat Protection . Experience: 8-10 Years .
Posted 1 week ago
3.0 - 4.0 years
5 - 6 Lacs
bengaluru
Work from Office
Application Packaging Engineer Senior Requirements The Cyber Security Technology (CST) engineer will support engineering solutions for RALLY Endpoint Security efforts. Under direction from their manager and in-line with stated strategic objectives, the CST engineer will work with other engineers to successfully design and implement enterprise quality and standards-oriented project solutions on-time and on budget. The engineer will also be responsible for ongoing incremental engineering required to continuously achieve the best coverage and operation of the technology and will assist in troubleshooting system degradations and outages if required. Some (but not all) of the primary responsibilities the role will be primarily invo lved with are as follows: Provide technical assistance for an enterprise client security health and standardization effort. Responsibilities Creation and maintenance of security client enterprise deployment standards as part of the overall client health initiative. Administration of employee monitoring and forensics infratructure (e.g., maintenance, configuration and monitoring) Identification and resolution of incidents impacting the health of endpoint security clients or related components Experience working with packaging and deployment technologies, including a deep technical understanding of well-designed deployables, staged deployments, packaging technologies for multiple operating systems, and unified automation strategies for maintaining the health of those clients. Troubleshoot client health issues and work to maintain a standard for security client health. Assist with efforts to improve automation and response activities regarding security client related incidents Participate in developing and providing operational documentation to ensure a well-managed and mature security infrastructure, security packaging and automation standard. Perform other duties and/or special projects as assigned Languages English Fluent advanced 96- 100% Location India Bangalore
Posted 1 week ago
1.0 - 3.0 years
3 - 5 Lacs
gurugram
Work from Office
Education Qualification : Any Graduate Skills : Primary -> Technology | Hardware and Networking | Installation, configuration, maintainance and repair | 1 - Aware Primary -> Technology | Windows Operating System | Installation, configuration and management | 1 - Aware Secondary -> Technology | Audio, Video support | Installation and configuration | 1 - Aware Tertiary -> Technology | End Point Security | Antivirus management, data encryption, DLP, desktop firewall, VPN, AD policies | 3 - Experienced Tertiary -> Behavioral | Aptitude | Communication | 2 - Knowledgeable Certification : Technology | Microsoft 365 Certified | Modern Desktop Administrator Associate 1) Field Services Support Engineers primary responsibility is to provide support to an organization s IT systems to help them meet their business goals, this is done by ensuring that all computers and networks operate efficiently with high uptime. 2) As a desktop engineer, you may need to assemble and install client desktop computers and assist the end-user in securing their hardware. 3) This role also involves hands & feet support for various IT support teams to perform activities related to periodic maintenance to handling individual systems hardware, software, and network queries 4) To support daily technical support activities for computers & all other end point devices. Update the support ticket with the progress, to set up and test desktop computer peripherals. 5) To perform the system changes adhered to organizational policies. 6) Conduct remote desktop troubleshooting to end user issues. Maintain technical documentation in association with other functional departments 7) Technical Skills a. Windows Operating System: b. Ability to Install and troubleshoot different versions of Windows OS independently. E.g. Windows XP. Windows 7, Windows 10 and Windows 11 c. Understanding of desktop applications and how do they work, installation & uninstallation. d. Understanding of domain setup & ability to add / remove computers to domain. update Group policies. carry out Disk management, Disk Encryption, Wireless configuration. check utilization and availability, ability to perform start up and shut down services by following SOP. deploy gold images on multiple desktops using SOP, Ability to install and configure client applications independently 8) In addition to above, support and perform below activities. a. Exchange and Mobility Clients b. Printer management c. Backup and Recovery d. Audio, Video support e. End Point Security/Patch Management f. Hardware and Networking
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: PKI - Certificate Management .Experience: 8-10 Years .
Posted 1 week ago
4.0 - 6.0 years
5 - 9 Lacs
thiruvananthapuram
Work from Office
As a Microsoft Windows Server and Cloud Engineer, you will be responsible for managing and optimizing our clients Windows server infrastructure and cloud solutions Your role will include ensuring the reliability, performance, and security of these environments while delivering top-notch support to our clients This position requires a solid understanding of Microsoft server technologies, Power Automate, M365, End Point Security, and other related technologies You may be supporting multiple clients or dedicated to a single client, depending on the specific requirements What You Will Be Doing: Server Management: Administer and maintain Windows servers for our clients, ensuring optimal performance and availability. Cloud Operations: Manage and optimize cloud environments, particularly Microsoft Azure, to support our clients business needs. M365 Management: Oversee the deployment, configuration, and management of Microsoft 365 services. Security Management: Implement and manage security measures, including Microsoft Defender, to protect server and cloud environments from threats and vulnerabilities. Automation: Develop and implement automation scripts using Microsoft Power Automate and AI tools to streamline server and cloud management tasks. Troubleshooting: Diagnose and resolve technical issues related to Windows servers, cloud services, and M365, minimizing downtime and ensuring business continuity for clients. Backup and Recovery: Manage backup and disaster recovery solutions to safeguard critical data and ensure quick recovery in case of failures. Client Collaboration: Work closely with clients to understand their requirements and deliver effective solutions. Documentation: Maintain comprehensive documentation of server infrastructure with standard operating procedures. What Skills, Certifications, and Experience You Need to Have: Experience: 4 to 6 years of hands-on experience managing Windows servers and cloud environments. Technical Skills: Proficiency in Windows Server administration (e.g., Active Directory, DNS, DHCP, Group Policy). Strong knowledge of cloud services, particularly Microsoft Azure. Experience with virtualization technologies such as Hyper-V or VMware. Proficiency in scripting languages (e.g., Power Shell) for automation purposes. Strong knowledge of Microsoft Power Automate, M365, and Microsoft Defender. Certifications: Relevant certifications such as Microsoft Certified: Azure Administrator, Microsoft Certified: Windows Server Hybrid Administrator Associate, Microsoft Certified: Security, Compliance, and Identity Fundamentals, or similar. Soft Skills: Excellent problem-solving and analytical skills. Strong communication skills, both written and verbal. Ability to work independently and collaboratively in a fast-paced environment. What Will Be Your Career Growth Path: Initial Phase: Gain in-depth knowledge of the companys and clients server and cloud infrastructure, taking on increasing responsibilities in managing and optimizing these environments. Mid-Term Growth: After demonstrating proficiency and reliability, you may take on lead roles in projects, mentor junior engineers, and contribute to strategic planning for IT infrastructure and client services. Long-Term Development: With continued success and professional development, you can progress to senior roles, such as a Technical Architect guiding the clients technology strategy and client management processes.
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SailPoint Identity Mgmt and Governance .Experience: 8-10 Years .
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threat Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SPLUNK Security Analytics .Experience: 8-10 Years .
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
noida
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Checkpoint Firewalls and VPN .Experience: 8-10 Years .
Posted 1 week ago
1.0 - 5.0 years
5 - 11 Lacs
pune, mumbai (all areas)
Work from Office
Role & responsibilities Dear Candidate, We have 2 roles open 1. Lead Endpoint and HSM engineer (Level-1) Experience : 1 to 2 years required Job Location : Mumbai/Pune Skills Required: L1-IAM, DLP, HSM, DNS, WAF, Endpoint security (Level-2) 2. Lead DLP engineer Skills Required: Experience : 3 to 5 years Job Location : Mumbai/Pune L2-IAM, DLP, HSM, DNS, WAF, Endpoint security Preferred candidate profile Prefers who have all mandatory skills and within mumbai/pune candidates are highly prefereed Regards Sunanda
Posted 1 week ago
3.0 - 5.0 years
6 - 10 Lacs
bengaluru
Work from Office
Deliver consistent Customer Support Operational outcomes aligned with Business Objectives. Create an open and engaging work environment with focus on continuous improvement. Recruit, develop and build an inclusive customer focused technical talent Own customer escalations and drive them towards a satisfactory resolution. Implement corrective actions working with relevant stakeholders. Make timely and effective decisions, often with limited information, based off a solid understanding of security principles, business requirements and best practices Collaborate effectively with peers and internal/external stakeholders for effective outcomes Define, refine and implement processes, policies and systems with the goal of enhancing operations and delivering effective customer experience Encourage knowledge sharing and innovation. Contribute in improvement initiatives and global projects What You ll Need: Bachelor s Degree or equivalent with 3-5 years of people management experience leading an Enterprise Product Support team. Strong Support operational experience in a high impact, 24x7 Product Support environment supporting Global Customers. Proven record in identifying and developing talent. Outstanding verbal and written communication skills Strong technical acumen and logical troubleshooting mindset. Knowledge of Endpoint Security technologies with specializations in SIEM/SOAR, Identity Protection or Cloud Security would be a plus. Analytical thinking with problem solving attitude and strong execution skills. Ability to analyse data/reports and take proactive actions Experience collaborating with global cross-functional stakeholders for an outcome Willingness to work in Shifts/Weekends depending upon business requirements
Posted 1 week ago
7.0 - 12.0 years
10 - 20 Lacs
mumbai
Work from Office
SUMMARY Our client is IT MNC part of one of the major insurance groups based out of Germany and Europe. The Group is represented in around 30 countries worldwide, with Over 40,000 people worldwide, focusing mainly on Europe and Asia. Our client offers a comprehensive range of insurances, pensions, investments and services by focusing on all cutting edge technologies majorly on Could, Digital, Robotics Automation, IoT, Voice Recognition, Big Data science, advanced mobile solutions and much more to accommodate the customers future needs around the globe thru supporting millions of internal and external customers with state of-the-art IT solutions to everyday problems & dedicated to bringing digital innovations to every aspect of the landscape of insurance. Roles & Responsibilities: As per of Cyber Security Governance team member you will be closely working with the Global entity teams (IT administrators / IT Security / Information Security) and Germany teams (Cyber Security / SOC / Incident Handling / VAPT). Working in the complex Cyber Security environment and multinational culture Working on NIST Cyber Security Framework to validate the Cyber Security Maturity of Global Entities. Gather the evidence from global entities for Cyber Security controls, maintain, track, and regularly report the status in ERGO standard format. Provide the guidance and consultancy to global entities to implement the Cyber Security Control as per Information Security Policy and Guidelines. Understand the Security Advisory issued by the OEM and other external security agency. Which include IoC (Indicator of Compromise), IoA (Indicator of Attack), and recommended remediation actions. Issue the Security Advisory email to global entities with recommendation on new Vulnerability & Threats Support global entities on post Cyber Incident Activities, such as record lesson learn, RCA validatation, opportunity to improve the Cyber Control, etc. Understand the basic queries, complex issues, and various scenarios on cyber security. Prepare and present the conclusion a way that is appropriate for the target audience Handle the local Cyber Security Incidents with IT & Network Team Create the SoP / documentation as per NIST control and Information Security Policy Requirements Key Competencies & Skills: Deep understanding about Cyber Security concepts and controls in enterprise Knowledge of industry standard and regulations, such as GDPR, PCI-DSS, HIPAA, ISO 27001, NIST Cyber Security Framework (CSF) etc. Solid understanding of network topology, network protocols, Cyber, Servers Security Endpoint Security, Secure Architecture, Security Technology, On-premises Architecture, and Cloud infrastructure. Knowledge of trouble ticketing systems / CRM Proficient knowledge about enterprise processes based on ITIL framework Familiar with the latest Cyber Security vulnerability / exploits / trends Education / Qualification: Bachelor or Master degree in the field of the Computer Science, Information Systems, or Information Technology At least one Cyber Security Certification is must, such as CISM, CISA, CISSP, CRISC, or equivalent Experience: 7 14 Years of total experience with 4 8 Years of relevant experience Job Location: Hiranandani Gardens, Powai, Mumbai Mode: Work from Office
Posted 1 week ago
7.0 - 12.0 years
20 - 35 Lacs
hyderabad, bengaluru, delhi / ncr
Hybrid
Shift timings- 2 PM -11 PM Primary skills Azure Security Defender, Sentinel,(identity, Endpoint, etc.) Secondary skills Azure Infrastructure, Office 365 collab workloads Required Skills & Experience: Technical Expertise: Strong understanding of Azure security offerings, including but not limited to: Microsoft Defender for Cloud / Endpoint / Identity Microsoft Sentinel (SIEM/SOAR) Microsoft Entra (Identity Governance, Conditional Access) Hands-on experience with cloud security assessments, PoC deployments, and client workshops. Familiarity with Zero Trust architecture and related best practices. Professional Experience: 7+ years in IT security roles, with 2+ years focused on Azure or cloud security. Proven track record of leading technical engagements independently. Soft Skills: Excellent communication and presentation skills. Ability to articulate technical concepts to both technical and business audiences. Self-starter who thrives in a fast-paced, client-facing environment. Preferred Qualifications: Microsoft certifications (e.g., SC-100, AZ-500, SC-200) Experience working with Microsoft partners or within funded engagement programs. Exposure to regulatory compliance frameworks (e.g., ISO, NIST, GDPR) Key Responsibilities: Client Engagements: Conduct security assessments and discovery workshops to understand client environments, security gaps, and cloud readiness. Deliver technical Proof of Concepts (PoCs) and hands-on demonstrations of Microsoft Azure security solutions. Host and facilitate technical workshops on Zero Trust, Microsoft Defender, Sentinel, Entra, and related technologies. Provide technology walkthroughs, highlight use cases, and share practical experience to illustrate business value. Solution Design & Implementation: Design and recommend secure architectures and configurations using Azure-native tools and services. Collaborate on solution development, documentation, and client readiness for security modernization. Internal & Cross-Functional Collaboration: Work closely with Sales, PreSales, and regional delivery teams to align on customer needs, technical strategy, and success metrics. Contribute to proposal development and client presentations from a technical security standpoint. Thought Leadership & Enablement: Stay updated on Azure security advancements and share knowledge internally and with clients. Support internal enablement sessions and mentor junior team members, where applicable.
Posted 1 week ago
5.0 - 9.0 years
0 Lacs
ernakulam, kerala
On-site
As the Lead Security Analyst, you will be responsible for overseeing the monitoring and analysis of security alerts and events from various sources to detect and address potential security incidents efficiently. Your role will involve providing mentorship and guidance to junior analysts to foster their professional growth. Conducting thorough analysis of security incidents, evaluating their implications, and coordinating efforts across different teams for effective resolution will be a key aspect of your responsibilities. You will be expected to develop and implement advanced detection rules, use cases, and correlation logic to improve the accuracy of security monitoring. Collaboration with threat intelligence teams to remain updated on the latest threats, tactics, techniques, and procedures (TTPs) is essential. Leading incident response activities, ensuring prompt and comprehensive actions to mitigate security incidents, will be crucial in this role. Participation in post-incident reviews and analysis to identify root causes and areas for enhancement is required. Additionally, contributing to the continuous improvement of Security Operations Center (SOC) processes, procedures, and toolsets is a key responsibility. Staying abreast of emerging security technologies and industry trends to provide recommendations for tool upgrades and process enhancements is also part of your role. Furthermore, you will assist in creating and maintaining comprehensive documentation related to security incidents, procedures, and findings. Reviewing incidents escalated by Level 1 analysts and collaborating with internal customers to address their security-related issues are among the duties you will perform. You should be prepared to work in a 24/7 rotational shift model, including night shifts, and conduct forensic investigations when necessary. It is considered advantageous to have strong expertise in security monitoring tools and technologies such as SIEM, Firewall IDS/IPS, EDR, and threat intelligence platforms. An in-depth understanding of network protocols, firewall technologies, endpoint security, and cloud security is beneficial. Proficiency in recognizing successful intrusions and compromises, leading security incident response efforts, and possessing excellent analytical and problem-solving skills are desired qualities. Moreover, exceptional communication and interpersonal skills are essential for effective collaboration with both technical and non-technical stakeholders. Possession of relevant certifications such as CISSP, CISM, CISA, GIAC Certified Incident Handler, CEH Certified, CCSP, or SOC Analyst is highly desirable for this role. A minimum qualification of a Bachelor's degree in Computer Science, Information Security, or a related field is preferred for applicants.,
Posted 1 week ago
5.0 - 9.0 years
0 Lacs
navi mumbai, maharashtra
On-site
You should have at least 5 years of experience in Cybersecurity and EDR Solutions to be considered for this role. As the ideal candidate, your responsibilities will include leading the installation, configuration, and policy deployments of SentinelOne in enterprise environments. You will be in charge of administering and maintaining the SentinelOne console and endpoint agents, as well as performing advanced troubleshooting and root cause analysis of endpoint issues. Proactive threat hunting and incident investigation using SentinelOne will also be part of your duties. Moreover, you will collaborate closely with clients and internal teams to optimize and tune solutions, integrate SentinelOne with SIEM/SOAR platforms for enhanced threat visibility, and maintain detailed documentation of configurations, procedures, and best practices. To qualify for this position, you must possess strong hands-on experience with SentinelOne in both administration and implementation. You should have expertise in L3 troubleshooting, incident response, and threat containment, along with an understanding of threat detection, forensic investigation, and EDR reporting. While certifications like SentinelOne Certified Admin/Engineer are preferred, they are not mandatory. If you meet these requirements and are ready to take on the challenge, please submit your application or send your CV to Piyush.s@protechmanize.com / 8879773419.,
Posted 1 week ago
8.0 - 12.0 years
0 Lacs
karnataka
On-site
As an experienced Device Management Specialist with 8 to 10 years of experience, you will be responsible for configuring and securing devices in Windows/macOS environments. Your key responsibilities include creating and managing system builds and images, configuring firewalls, client security, and enforcing device policies. You will also be tasked with implementing and managing device lock screens and compliance policies. In addition to device configuration and security, you will play a crucial role in managing system updates and maintenance. This involves deploying driver, BIOS, and firmware updates across devices, as well as monitoring and maintaining system health and performance in various environments. Your role will also include providing workflow and integration support by administering and maintaining myIT workflows for internal IT service operations. You will be responsible for handling Ariba integration and updates for procurement and workflow processes. Furthermore, you will engage with customers and stakeholders to ensure smooth device operations. This will involve coordinating with internal teams and external vendors, addressing and resolving escalations related to workflows and integrations, and ensuring clear communication of timelines, updates, and policy changes. To excel in this role, you are required to have a minimum of 8 years of experience in device management, IT operations, or endpoint configuration. Proficiency in Windows OS imaging, BIOS/firmware updates, and endpoint security is essential. Experience with myIT workflows and the Ariba platform would be advantageous. Strong analytical, troubleshooting, and communication skills are necessary for success in this position. Familiarity with MDM tools such as Intune, SCCM, and JAMF is desirable. If you are looking for a challenging opportunity in Bangalore or Pune and can join within 30 days, we encourage you to apply for this position and contribute to our dynamic team.,
Posted 1 week ago
4.0 - 8.0 years
0 Lacs
hyderabad, telangana
On-site
In our always on world, it is essential to have a genuine connection with the work you do. If you are excited by a challenge and driven by learning and growth, then joining CommScope's cybersecurity team in Hyderabad may be the right next step for you. As a Cyber Security Engineer at CommScope, you will serve as a key individual contributor on the Security Architecture and Engineering team. Your responsibilities will include designing, implementing, maintaining, monitoring, and managing key technical security systems/controls that protect the business. Success in this role will require a foundational understanding of technology stacks, security tooling, and securing cloud environments such as Azure, GCP, and AWS. Ideal candidates will be willing to enhance their technical skills by working on a broad range of security technical controls in an environment where their contribution will make a difference. Your work will play a critical role in our organization's cyber security success. CommScope's security team takes pride in protecting the people, processes, and technologies that serve our customers, ensuring billions of connections each day. Join us and pursue your personal best! As a Cyber Security Engineer at CommScope, you will: - Implement, maintain, monitor, and manage cyber security systems and controls. - Deliver projects on time, within budget, and in accordance with service level agreements (SLAs). - Collaborate with various teams including architects, senior engineers, the security operations center (SOC), incident responders, and technology infrastructure and development team members. - Participate in change management meetings and conduct performance and efficacy testing of security solutions. - Collaborate with team members to develop technical security standards and best practices. - Articulate common practices and tactics used by malicious software and threat actors to other IT teams. - Assist the Governance, Risk, and Compliance team in answering technical questions from auditors and clients. Required Qualifications: - A bachelor's degree with preferably 4+ years of cyber security experience. - Hands-on experience in implementing and supporting at least 2 security capabilities. - Previous professional experience in other IT/technical domains and strong communication skills. - Analytical and critical thinking skills. - Strong interpersonal, written, and oral communication skills. - Customer service and solution-focused orientation. - Ambitious, disciplined, and self-starter. Desired Skills: - Hands-on experience with a major public cloud provider like Azure, AWS, or GCP. - Significant familiarity with Azure security controls and services. - Familiarity with Netskope and Palo Alto Networks firewalls. Join CommScope on a quest to deliver connectivity that empowers how we live, work, and learn. Push the boundaries of communications technology with us and be ready for the needs of tomorrow. Grow your career alongside bright, passionate, and caring individuals who strive to create what's next. Come connect to your future at CommScope.,
Posted 1 week ago
8.0 - 12.0 years
0 Lacs
noida, uttar pradesh
On-site
You will be joining C2Treds, an innovative and growth-driven company dedicated to transforming MSME financial empowerment and shaping India's economic future. As the Senior Manager IT based in Noida, you will lead technology and infrastructure initiatives. With 8-12 years of IT management experience, you will oversee IT operations, infrastructure, security, and strategy to ensure the smooth functioning of all IT systems and align IT with business goals. Your key responsibilities will include ensuring IT security, data protection, and compliance with RBI guidelines, maintaining policies per RBIs Cyber Security Framework, and overseeing IT infrastructure design, implementation, and maintenance for optimal performance. Leading cybersecurity efforts to prevent breaches and implementing DLP protocols and encryption will be crucial. Establishing IT governance frameworks and continuously updating IT policies to meet regulatory and business needs will also be part of your role. Collaboration with auditors and preparing compliance reports will ensure audit readiness for RBI inspections. To qualify for this role, you should have a Bachelors or Masters degree in Information Technology or related fields, along with 8-12 years of progressive IT experience. Strong expertise in IT infrastructure, networking, cloud services, and security protocols is essential. Proven experience in managing IT projects, excellent problem-solving and decision-making skills, and the ability to work under pressure are required. Certifications such as ITIL, PMP, or CISSP are a plus. C2Treds values its customers and team members, offering a comprehensive benefits package, flexible work options, volunteer time off, and more. As an Equal Opportunity Employer, the company is committed to diversity and inclusion, empowering team members to bring their authentic selves to work and creating a workplace that reflects the communities served and global, multicultural clients.,
Posted 1 week ago
5.0 - 9.0 years
12 - 16 Lacs
chennai
Work from Office
Hitachi Energy is looking for Senior Cybersecurity Engineer to join our dynamic team and embark on a rewarding career journey Analyzing customer needs to determine appropriate solutions for complex technical issues Creating technical diagrams, flowcharts, formulas, and other written documentation to support projects Providing guidance to junior engineers on projects within their areas of expertise Conducting research on new technologies and products in order to recommend improvements to current processes Developing designs for new products or systems based on customer specifications Researching existing technologies to determine how they could be applied in new ways to solve problems Reviewing existing products or concepts to ensure compliance with industry standards, regulations, and company policies Preparing proposals for new projects, identifying potential problems, and proposing solutions Estimating costs and scheduling requirements for projects and evaluating results
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |