1168 Endpoint Security Jobs - Page 7

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 5.0 years

10 - 14 Lacs

pune

Work from Office

Job Purpose Information security team member (with skip level reporting to CISO) who is proficient in maintaining & managing Endpoint Security. Information Security tool management & governance. Understanding of regulatory requirements, maintaining the tool compliance, configuring the tool policy, logs review & alert/incident handling. Driving information Security projects & Monitoring Key Risk Indicators (KRIs) for Information Security. Duties and Responsibilities A -Minimum required Accountabilities for this roleWe are looking for a ed and dedicated Modern Device Management Specialist to join our IT team. In this role, you will be responsible for the management and security of all company-...

Posted 2 weeks ago

AI Match Score
Apply

5.0 - 9.0 years

0 Lacs

hyderabad, telangana

On-site

As a Senior Technical Security Specialist, you will play a critical role in supporting cybersecurity operations by implementing technical security controls, monitoring security events, and ensuring compliance with company contractual and regulatory obligations. Your focus will be on operational information security tasks, responding to information security incidents, and continuously improving information security processes to protect managed information and technical assets. Key Responsibilities: - Monitor information security alerts and logs using XDR and other security tools. - Investigate potential information security incidents, escalate critical issues, and support information security...

Posted 3 weeks ago

AI Match Score
Apply

8.0 - 10.0 years

12 - 17 Lacs

mumbai

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...

Posted 3 weeks ago

AI Match Score
Apply

8.0 - 10.0 years

12 - 17 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...

Posted 3 weeks ago

AI Match Score
Apply

8.0 - 10.0 years

12 - 17 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisation€™s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existi...

Posted 3 weeks ago

AI Match Score
Apply

7.0 - 10.0 years

16 - 22 Lacs

bengaluru

Work from Office

The Zscaler Sr. Engineer will work on various aspects of cloud security, including web filtering policy enforcement, CASB, firewall, browser isolation, sandboxing, and data loss prevention. Using your knowledge and experience in Zscaler, youll assess, identify gaps, and develop controls to mitigate security threats and manage infrastructure controls. In this role, youll have a significant impact on our clients' security infrastructure and controls. How youll make an impact Work on various aspects of cloud security, including web filtering policy enforcement, CASB, firewall, browser isolation, sandboxing, and data loss prevention Develop, mature, and maintain Zscalers cloud-based infrastructu...

Posted 3 weeks ago

AI Match Score
Apply

5.0 - 8.0 years

8 - 13 Lacs

bengaluru

Work from Office

Role & Responsibilities: Required Skills/qualifications: 5+ years of experience in Network Security experience, Palo Alto, CISCO, ISE etc Working knowledge of common operating systems (Windows, Linux, etc.) and basic endpoint security principles Hands-on experience with common networking services and protocols (TCP/IP, SSH, FTP, DNS, DHCP, SMTP, SSL, etc.) Experience with maintaining and operating common security technologies (IDS, IPS, Firewalls, Cloud Security, WAF, Endpoint Security, SIEM, etc.) Exceptional organizational abilities and attention to detail The ability to think creatively to find elegant solutions to complex problems Excellent verbal and written communication skills Below c...

Posted 3 weeks ago

AI Match Score
Apply

3.0 - 8.0 years

1 - 5 Lacs

gurugram

Work from Office

About The Role Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Microsoft Endpoint Configuration Manager Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Tech Support Practitioner, you will serve as the vital link between clients and our systems or appl...

Posted 3 weeks ago

AI Match Score
Apply

3.0 - 8.0 years

1 - 5 Lacs

gurugram

Work from Office

About The Role Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Microsoft Endpoint Configuration Manager Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Tech Support Practitioner, you will serve as the vital link between clients and our systems or appl...

Posted 3 weeks ago

AI Match Score
Apply

3.0 - 8.0 years

1 - 5 Lacs

gurugram

Work from Office

About The Role Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Microsoft Endpoint Configuration Manager Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Tech Support Practitioner, you will serve as the vital link between clients and our systems or appl...

Posted 3 weeks ago

AI Match Score
Apply

10.0 - 15.0 years

20 - 30 Lacs

hyderabad, bengaluru

Hybrid

Job Description : • Perform regular administrative task such as verifying EPO master server and Distributed repository, VSE, ENS and McAfee endpoint specific event log monitoring, definition distribution Verification and health check of repositories. Pro-active management of ePO\VSE\ENS\DLP\HIPS\EEPC issues and events. • Meet SLA s by processing requests to resolve endpoint security issues with workstation support and end users which also includes exception/ exclusion handling • Provide desktop and technical expertise to the Security Services Team. • Provide technical support in evaluating, designing, implementing, and supporting a McAfee endpoint and other advanced endpoint protection envir...

Posted 3 weeks ago

AI Match Score
Apply

3.0 - 8.0 years

10 - 14 Lacs

bangalore rural, gurugram, bengaluru

Work from Office

Role & responsibilities 70% -Technical expertise- network and application security and cloud (Certifications-AWS, AZURE, GCP) 30%- risk mgt Exposure OR audit exp (Must have) foundational knowledge across key areas of cloud security, With further depth in risk frameworks, cloud models, and practical exposure to tools and controls Preferred candidate profile those who have certification in any of this - CISA/ CISSP/ AWS/ AZURE/ GCP/ CEH

Posted 3 weeks ago

AI Match Score
Apply

3.0 - 7.0 years

0 Lacs

maharashtra

On-site

As a Security Managed Services Engineer (L1) at NTT DATA, your role involves providing a managed service to clients to ensure the operational efficiency of their Firewall infrastructure. Your main focus will be on maintaining zero missed service level agreement conditions and delivering first-line support for standard and low complexity incidents and service requests. Additionally, you may also be involved in supporting project work as required. Key Responsibilities: - Minimum 3 years of experience in EDR and Trend Micro. - Assess the existing endpoint security infrastructure to identify gaps or vulnerabilities. - Deploy EDR agents on endpoints, servers, and critical systems within the organ...

Posted 3 weeks ago

AI Match Score
Apply

5.0 - 10.0 years

12 - 22 Lacs

hyderabad

Hybrid

Accountability: Expert in Endpoint & Network analysis, to include analysis of relevant logs and data, and background using a variety of analysis tools like EDR, SIEM, Firewall, Proxy, OSINT tools etc Ability to think like an adversary when hunting and responding to security incidents Must perform static and dynamic malware analysis to understand the nature of malware Knowledge on latest TTPs, Vulnerabilities, red team toolsets Ability to lead an investigate an incident starting from detections until post incident activity Passion to learn, as well as a dedication and self-driven desire to keep abreast of latest cybersecurity threats and hacking techniques Advanced problem-solving skills, and...

Posted 3 weeks ago

AI Match Score
Apply

2.0 - 4.0 years

4 - 9 Lacs

chennai, coimbatore

Work from Office

Job Title: Desktop Engineer Department: IT Infrastructure / End User Computing Location: Chennai/Coimbatore Reports To: IT Manager / Infrastructure Lead Job Summary: The Desktop Engineer will be responsible for delivering seamless end-user support and ensuring reliable IT operations across the organization. This role involves managing and maintaining macOS and Windows devices, handling asset lifecycle management, supporting corporate events and townhall setups, and ensuring secure, compliant endpoint management through Jamf, Intune, and related platforms. Key Responsibilities: End-User Device Management Manage and support macOS and Windows laptops across the organization. Configure, deploy, ...

Posted 3 weeks ago

AI Match Score
Apply

3.0 - 5.0 years

15 - 25 Lacs

chennai

Work from Office

Job summary Cyber Security a key organization within Cognizant Technologies Corporate Security is chartered with managing and directing the security programs focused on the discipline of cyber security design implementation analytics threats monitoring and response across the organization Responsibilities Data Base Systems Administration and Programing Deliver Security Advisory to business and project stakeholders to remediate the risk findings document and track the open risks to closure. Understanding of zero day vulnerabilities and identifying effective compensating controls Experience in scripting using PowerShell / Python / any programming language and knowledge on secure development pr...

Posted 3 weeks ago

AI Match Score
Apply

8.0 - 10.0 years

10 - 20 Lacs

chennai

Work from Office

8–10 yrs in cybersecurity with SOC (L2/L3) experience, incident response, threat hunting, log analysis & SIEM tools (Sentinel, Splunk, Securonix). Must hold active CISSP, CISM or CEH certifications along with ISO 27001 & NIST framework knowledge

Posted 3 weeks ago

AI Match Score
Apply

8.0 - 10.0 years

10 - 20 Lacs

chennai

Work from Office

8–10 yrs in cybersecurity with SOC (L2/L3) experience, incident response, threat hunting, log analysis & SIEM tools (Sentinel, Splunk, Securonix). Must hold active CISSP, CISM or CEH certifications along with ISO 27001 & NIST framework knowledge

Posted 3 weeks ago

AI Match Score
Apply

4.0 - 9.0 years

20 - 35 Lacs

hyderabad

Work from Office

Cybersecurity at Providence is responsible for appropriately protecting all information relating to its caregivers and affiliates, as well as protecting its confidential business information (including information relating to its caregivers, affiliates, and patients) What will you be responsible for? - Design, implement, and maintain enterprise EDR/XDR, encryption, and device control platforms. - Own agent upgrade cycles, patch validation, and lifecycle management. - Define endpoint security baselines, hardening standards, and policy frameworks. - Integrate endpoint telemetry into SIEM/SOAR platforms for visibility and automation. - Collaborate with vendors for agent compatibility, new featu...

Posted 3 weeks ago

AI Match Score
Apply

4.0 - 9.0 years

20 - 35 Lacs

hyderabad

Work from Office

Cybersecurity at Providence is responsible for appropriately protecting all information relating to its caregivers and affiliates, as well as protecting its confidential business information (including information relating to its caregivers, affiliates, and patients) What will you be responsible for? - Manage endpoint onboarding/offboarding (agent install, de-registration, compliance checks). - Monitor agent coverage, connectivity, and update compliance across enterprise endpoints. - Troubleshoot and resolve endpoint platform/agent failures. - Perform health audits, patch compliance checks, and version upgrades. - Provide feedback from daily operations to engineering for product improvement....

Posted 3 weeks ago

AI Match Score
Apply

7.0 - 11.0 years

0 Lacs

pune, maharashtra

On-site

Role Overview: As the Lead Security Operations Center (SOC) Analyst at our company, your primary responsibility will be to analyze dashboards, systems, and reports to mitigate risks, triage security incidents, and implement fixes to enhance our endpoint security posture. You will play a crucial role in creating and maintaining policies, standards, and procedures related to endpoint security event response. Your tasks will involve conducting forensic investigations on compromised systems, correlating incident data to identify vulnerabilities, and making recommendations to improve endpoint security. Additionally, you will be responsible for handling threat detection and response, contributing ...

Posted 3 weeks ago

AI Match Score
Apply

5.0 - 9.0 years

0 Lacs

chennai, tamil nadu

On-site

As an experienced professional in the field, your role will involve ensuring the security and integrity of servers through thorough hardening and reviews. You will also be responsible for providing operational support at the Disaster Recovery (DR) Site and participating in weekend activities as planned by the Information Security Team. Additionally, you will be handling AD support, USB / VPN support, and iSMART requests to contribute to the overall security posture of the organization. - Conduct server hardening and review activities - Provide operational support at the DR Site - Participate in weekend activities as planned by the Information Security Team - Handle AD support, USB / VPN supp...

Posted 3 weeks ago

AI Match Score
Apply

5.0 - 9.0 years

0 Lacs

kolkata, west bengal

On-site

As a Windows Admin at Freepost located in Kolkata, your role involves installing, configuring, and maintaining Windows server operating systems such as Windows Server 2016, 2019, 2022, and 2024. You will be responsible for deploying and configuring Windows Server features like Active Directory, DNS, DHCP, Group Policy, and more. Your tasks will include applying security patches, updates, and service packs to Windows servers and systems, as well as implementing and enforcing security best practices for users, groups, permissions, and backup and disaster recovery solutions. Additionally, you will manage firewalls, antivirus software, and endpoint security. Key Responsibilities: - Install, conf...

Posted 3 weeks ago

AI Match Score
Apply

5.0 - 9.0 years

0 Lacs

maharashtra

On-site

Role Overview: As a member of KPMG entities in India, you will be part of a professional services firm affiliated with KPMG International Limited. You will leverage a global network of firms and possess in-depth knowledge of local laws, regulations, markets, and competition. With offices across major cities in India, you will offer services to national and international clients across various sectors. Your role will involve providing rapid, performance-based, industry-focused, and technology-enabled services that demonstrate a deep understanding of global and local industries and the Indian business environment. Key Responsibilities: - Proven experience as a system administrator or security ...

Posted 3 weeks ago

AI Match Score
Apply

8.0 - 10.0 years

12 - 17 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...

Posted 3 weeks ago

AI Match Score
Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies