Jobs
Interviews

830 Endpoint Security Jobs - Page 8

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 5.0 years

4 - 7 Lacs

gurugram

Work from Office

Required Skills Behavioral | Aptitude | Communication Technology | Hardware and Networking | Installation, configuration, maintainance and repair Technology | Audio, Video support | Installation and configuration Technology | Windows Operating System | Installation, configuration and management Technology | End Point Security | Antivirus management, data encryption, DLP, desktop firewall, VPN, AD policies Education Qualification : Any Graduate Certification Mandatory / Desirable : Technology | Microsoft 365 Certified | Modern Desktop Administrator Associate 1) Field Services Support Engineers primary responsibility is to provide support to an organization s IT systems to help them meet their business goals, this is done by ensuring that all computers and networks operate efficiently with high uptime. 2) As a desktop engineer, you may need to assemble and install client desktop computers and assist the end-user in securing their hardware. 3) This role also involves hands & feet support for various IT support teams to perform activities related to periodic maintenance to handling individual systems hardware, software, and network queries 4) To support daily technical support activities for computers & all other end point devices. Update the support ticket with the progress, to set up and test desktop computer peripherals. 5) To perform the system changes adhered to organizational policies. 6) Conduct remote desktop troubleshooting to end user issues. Maintain technical documentation in association with other functional departments 7) Technical Skills a. Windows Operating System: b. Ability to Install and troubleshoot different versions of Windows OS independently. E.g. Windows XP. Windows 7, Windows 10 and Windows 11 c. Understanding of desktop applications and how do they work, installation & uninstallation. d. Understanding of domain setup & ability to add / remove computers to domain. update Group policies. carry out Disk management, Disk Encryption, Wireless configuration. check utilization and availability, ability to perform start up and shut down services by following SOP. deploy gold images on multiple desktops using SOP, Ability to install and configure client applications independently 8) In addition to above, support and perform below activities. a. Exchange and Mobility Clients b. Printer management c. Backup and Recovery d. Audio, Video support e. End Point Security/Patch Management f. Hardware and Networking

Posted 2 weeks ago

Apply

2.0 - 5.0 years

4 - 7 Lacs

kolkata

Work from Office

Education Qualification : Any Graduate Skills : Tertiary -> Behavioral | Aptitude | Communication | 2 - Knowledgeable Primary -> Technology | Hardware and Networking | Installation, configuration, maintainance and repair | 1 - Aware Secondary -> Technology | Audio, Video support | Installation and configuration | 1 - Aware Primary -> Technology | Windows Operating System | Installation, configuration and management | 1 - Aware Tertiary -> Technology | End Point Security | Antivirus management, data encryption, DLP, desktop firewall, VPN, AD policies | 3 - Experienced Certification : Technology | Microsoft 365 Certified | Modern Desktop Administrator Associate 1) Field Services Support Engineers primary responsibility is to provide support to an organization s IT systems to help them meet their business goals, this is done by ensuring that all computers and networks operate efficiently with high uptime. 2) As a desktop engineer, you may need to assemble and install client desktop computers and assist the end-user in securing their hardware. 3) This role also involves hands & feet support for various IT support teams to perform activities related to periodic maintenance to handling individual systems hardware, software, and network queries 4) To support daily technical support activities for computers & all other end point devices. Update the support ticket with the progress, to set up and test desktop computer peripherals. 5) To perform the system changes adhered to organizational policies. 6) Conduct remote desktop troubleshooting to end user issues. Maintain technical documentation in association with other functional departments 7) Technical Skills a. Windows Operating System: b. Ability to Install and troubleshoot different versions of Windows OS independently. E.g. Windows XP. Windows 7, Windows 10 and Windows 11 c. Understanding of desktop applications and how do they work, installation & uninstallation. d. Understanding of domain setup & ability to add / remove computers to domain. update Group policies. carry out Disk management, Disk Encryption, Wireless configuration. check utilization and availability, ability to perform start up and shut down services by following SOP. deploy gold images on multiple desktops using SOP, Ability to install and configure client applications independently 8) In addition to above, support and perform below activities. a. Exchange and Mobility Clients b. Printer management c. Backup and Recovery d. Audio, Video support e. End Point Security/Patch Management f. Hardware and Networking

Posted 2 weeks ago

Apply

2.0 - 5.0 years

4 - 7 Lacs

hyderabad

Work from Office

Required Skills Behavioral | Aptitude | Communication Technology | Hardware and Networking | Installation, configuration, maintainance and repair Technology | Audio, Video support | Installation and configuration Technology | Windows Operating System | Installation, configuration and management Technology | End Point Security | Antivirus management, data encryption, DLP, desktop firewall, VPN, AD policies Education Qualification : Any Graduate Certification Mandatory / Desirable : Technology | Microsoft 365 Certified | Modern Desktop Administrator Associate 1) Field Services Support Engineers primary responsibility is to provide support to an organization s IT systems to help them meet their business goals, this is done by ensuring that all computers and networks operate efficiently with high uptime. 2) As a desktop engineer, you may need to assemble and install client desktop computers and assist the end-user in securing their hardware. 3) This role also involves hands & feet support for various IT support teams to perform activities related to periodic maintenance to handling individual systems hardware, software, and network queries 4) To support daily technical support activities for computers & all other end point devices. Update the support ticket with the progress, to set up and test desktop computer peripherals. 5) To perform the system changes adhered to organizational policies. 6) Conduct remote desktop troubleshooting to end user issues. Maintain technical documentation in association with other functional departments 7) Technical Skills a. Windows Operating System: b. Ability to Install and troubleshoot different versions of Windows OS independently. E.g. Windows XP. Windows 7, Windows 10 and Windows 11 c. Understanding of desktop applications and how do they work, installation & uninstallation. d. Understanding of domain setup & ability to add / remove computers to domain. update Group policies. carry out Disk management, Disk Encryption, Wireless configuration. check utilization and availability, ability to perform start up and shut down services by following SOP. deploy gold images on multiple desktops using SOP, Ability to install and configure client applications independently 8) In addition to above, support and perform below activities. a. Exchange and Mobility Clients b. Printer management c. Backup and Recovery d. Audio, Video support e. End Point Security/Patch Management f. Hardware and Networking

Posted 2 weeks ago

Apply

2.0 - 5.0 years

4 - 7 Lacs

bengaluru

Work from Office

Education Qualification : Any Graduate (Engineering / Science) Skills : Primary -> Technology | Endpoint Management- SCCM | 2 - Knowledgeable Primary -> Technology | Endpoint Management- Intune | 2 - Knowledgeable Secondary -> Domain | IT in Banking | Customer Support | 2 - Knowledgeable Tertiary -> Behavioral | Aptitude | Communication | 2 - Knowledgeable Certification : Technology | Azure Infra Management Certification As an SCCM and Intune Level 2 Administrator, you will play a pivotal role in the configuration and management of these Microsoft-based systems. You will collaborate with senior administrators and IT teams to ensure the effective deployment of software, updates, monitoring, and mobile device management across our organization. Key Responsibilities: 1. SCCM Configuration and Optimization: - Manage and optimize SCCM infrastructure components, including site servers, distribution points, and client settings. - Lead the design of efficient software deployment processes and ensure timely software updates and patch management. 2. Intune Configuration and MDM: - Oversee the configuration of Microsoft Intune for mobile device management (MDM) and endpoint security. - Lead the implementation of security policies and settings, ensuring a secure mobile device environment. 3. Software Packaging and Deployment: - Lead software packaging and deployment efforts using SCCM, ensuring efficient software distribution, application deployment, and updates. - Implement automation to streamline software deployment processes. 4. Operating System Deployment: - Design and maintain task sequences for OS deployments, including OS upgrades and provisioning of new devices. - Ensure smooth and efficient OS deployment processes. 5. End-User Support: - Provide Level 2 support for SCCM and Intune-related issues and incidents, working closely with Level 1 administrators and escalating complex issues when necessary. - Respond to end-user inquiries, offer guidance, and participate in root cause analysis. 6. Documentation and Reporting: - Maintain comprehensive documentation of configurations, best practices, and optimization procedures for SCCM and Intune. - Create and present reports on the performance and effectiveness of these systems to management and stakeholders. Qualifications: - Bachelor s degree in Information Technology, Computer Science

Posted 2 weeks ago

Apply

2.0 - 6.0 years

4 - 8 Lacs

bengaluru

Work from Office

Required Skills Behavioral | Aptitude | Communication Technology | Cybersecurity | SOC Alert Management Technology | Cybersecurity | Vulnerability Management Technology | Cybersecurity | SIEM-SOAR Technology | Cybersecurity | End Point Security Education Qualification : Any Graduate Certification Mandatory / Desirable : Technology | IT Security Certifications | EC-Council Certifications | EC-Council Certified Ethical Hacker (CEH) Details: Security Event Monitoring (SIEM): 1) Login to Security event monitoring (SIEM) management console and navigate on the console. 2) Monitor number of devices logging into SIEM & logs from each device integrated with SIEM. 3) Create Tickets for correlated security alerts and escalate to respective support team as per the SOP. Data Security (DLP): 1) Login to DLP management console and navigate on the console. 2) Monitor the DLP Security Event as per the defined DLP Event monitoring procedure for vital parameter like number of agents running on user system, health of DLP Systems. 3) Handle DLP Incident Ticket creation and updating of event information & escalation of data breach. 4)Report policy violations against controls defined in DLP. Web Security (Content Filtering): 1) Block and Unblock URL s request(s) for End Users as per the defined standard operating procedure. 2) Login to Content Filtering management console and navigate on the console. Endpoint Security (Antivirus): 1) Create tickets for Out of Date Systems and co-ordinate with other support group on Antivirus definition updates. 2) Monitor the health state of Antivirus (Agents running on User systems and Servers, Communication between agent and management Server). 3) Login to Antivirus management console and navigate on the console. Technical Skills: 1) SIEM (A) 2) Web Security (A) 3) Data Security (A) 4) Endpoint Security (A) 5) Network Vulnerability Scanning Tools (A) Behavioral Skills: 1) Email Communication, Presentation, Public Speaking (F) 2) Interpersonal Skills, Nurturing Relationships (A) 3) Customer Service Orientation, Business Appreciation (A)

Posted 2 weeks ago

Apply

2.0 - 6.0 years

4 - 8 Lacs

bengaluru

Work from Office

Required Skills Behavioral | Aptitude | Communication Technology | Cybersecurity | Penetration Testing Tools Technology | Cybersecurity | End Point Security Technology | Cybersecurity | Vulnerability Management Tools Technology | Cybersecurity | Patch Management Education Qualification : Any Graduate Certification Mandatory / Desirable : Technology | IT Security Certifications | EC-Council Certifications | EC-Council Certified Ethical Hacker (CEH) Details: 1. To perform and monitor test teams on-site and off-site for Vulnerability Assessments, Penetration Tests, Source Code Reviews, and Web Mobile (Android, iOS and Windows), Point-of-sale (POS), Cloud and API Security assessments 2. Maintaining Vulnerability Management Program consisting of activities such as External VA PCI (ASV) scan. 3. Awareness on industry-standard security frameworks such as OWASP, NIST, SANS, etc. 4. To conduct Penetration Testing on Cloud based technologies such as Kubernetes, containers etc. on service providers such as Amazon Web Services (AWS), Google Cloud Platform (GCP) etc. 5. Track project tasks of team members to ensure existing projects are completed as per the deadlines and provide availability of resources for new projects. 6. Exposure in Internal PCI scan, WebSocket based Application Security Testing and other Vulnerability and Penetration Tests. 7. To apply problem-solving skills to evaluate the potential security risks to the clients IT infrastructure and determine the possibility of impact as per clients use-case.

Posted 2 weeks ago

Apply

3.0 - 6.0 years

5 - 8 Lacs

bengaluru

Work from Office

Required Skills Technology | Application Security Methods | Anti Malware Software Technology | Endpoint Security Solutions | Microsoft Technology | Microsoft Office Applications | Microsoft Office Applications Technology | Cyber secuity | MITRE ATTandCK framework Education Qualification : Any Graduate Required Skill Technology - Application Security Methods|Anti Malware Software Technology - Endpoint Security Solutions|Microsoft Technology - Microsoft Office Applications|Microsoft Office Applications Technology - Cyber secuity|MITRE ATT&CK framework - - - Details The Information Security Sr. Executive will plan, implement, upgrade, and monitor security protocols for the protection of the organizations computer networks and information. -Security Technologies Exposure ie Managing DLP, Log Management, Endpoint security etc-Security Process Exposure like creation of polices/procedures/guidelines -Perform reviews of IT Process, Policies, and Procedures -Co-ordinate for Information Security audits and closure of audit findings with stakeholders -Implement compliance specific requirements across teams -Co-ordination for internal and external Vulnerability Assessment and Penetration test -Project management of deployments of File Integrity Manager and Log Manager -Assess compliance of company s IT related policies, regulatory guidelines and international best practices -Follow-up with Auditee for status of audit recommendations till the closure based onreports -BCP -Prepare report on findings during DR/BCP Drill test and highlights to higher management -Facilitate trainings on Information Security -Should have Experience in Vulnerability Management & Understanding of Penetration Testing activity -Understanding of FW, IP & Network Security. -Define, document, implements, maintain and improve information security policies & processes within organization

Posted 2 weeks ago

Apply

3.0 - 6.0 years

5 - 8 Lacs

bengaluru

Work from Office

Required Skills Behavioral | Aptitude | Tasks Related Skills Education Qualification : Any Graduate Details: 1. Hardware and Software Management: a. Support and maintain computer systems and peripherals to ensure optimal workstation performance. Collection of errors from DT servers, printers, etc. b. Configuration of Extended devices like dual screens and replace toner cartridges. c. Utilize OEMs and run self-tests, as prescribed. d. Disk management, Disk Encryption, Wireless configuration. e. Installation of Client OS, configuration of Servers OS, check utilization and availability. 2. Endpoint Security: Anti-Virus Management, check the status of updates as per SOP. 3. Client Applications: Installation and configuration of client applications as per SOP and basic trouble shooting using remote capture tools. Technical Skills: a. Network Components, Devices. b. System Administration. c. MS Exchange Server. d. Storage & Backup Administration. e. Endpoint Security. Behavioral Skills: a. Email Communication, Presentation, Public Speaking. b. Interpersonal Skills. c. Customer Service Orientation, Business Appreciation.

Posted 2 weeks ago

Apply

3.0 - 6.0 years

5 - 8 Lacs

bengaluru

Work from Office

Required Skills Technology | Cybersecurity | End Point Security Behavioral | Aptitude | Communication Technology | Cybersecurity | SOC Alert Management Education Qualification : Any Graduate Certification Mandatory / Desirable : Technology | IT Security Certifications | EC-Council Certifications | EC-Council Certified Ethical Hacker (CEH) Details: 1. Endpoint protection troubleshooting. The security specialist is responsible for conducting information security investigations as a result of security incidents 2. Provide timely detection, identification, and alerting of possible attacks/intrusions, Anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.

Posted 2 weeks ago

Apply

3.0 - 6.0 years

5 - 8 Lacs

bengaluru

Work from Office

Education Qualification : Any Graduate Skills : Primary -> Technology | Cybersecurity | Vulnerability Management Tools | 3 - Experienced Primary -> Technology | Cybersecurity | Penetration Testing Tools | 3 - Experienced Secondary -> Technology | Cybersecurity | End Point Security | 2 - Knowledgeable Secondary -> Technology | Cybersecurity | Patch Management | 2 - Knowledgeable Tertiary -> Behavioral | Aptitude | Communication | 3 - Experienced Certification : Technology | IT Security Certifications | EC-Council Certifications | EC-Council Certified Ethical Hacker (CEH) Details: 1. To perform and monitor test teams on-site and off-site for Vulnerability Assessments, Penetration Tests, Source Code Reviews, and Web Mobile (Android, iOS and Windows), Point-of-sale (POS), Cloud and API Security assessments 2. Maintaining Vulnerability Management Program consisting of activities such as External VA PCI (ASV) scan. 3. Awareness on industry-standard security frameworks such as OWASP, NIST, SANS, etc. 4. To conduct Penetration Testing on Cloud based technologies such as Kubernetes, containers etc. on service providers such as Amazon Web Services (AWS), Google Cloud Platform (GCP) etc. 5. Track project tasks of team members to ensure existing projects are completed as per the deadlines and provide availability of resources for new projects. 6. Exposure in Internal PCI scan, WebSocket based Application Security Testing and other Vulnerability and Penetration Tests. 7. To apply problem-solving skills to evaluate the potential security risks to the clients IT infrastructure and determine the possibility of impact as per clients use-case.

Posted 2 weeks ago

Apply

3.0 - 6.0 years

5 - 8 Lacs

bengaluru

Work from Office

Education Qualification : Any Graduate (Engineering / Science) Skills : Primary -> Technology | Endpoint Management- SCCM | 2 - Knowledgeable Primary -> Technology | Endpoint Management- Intune | 2 - Knowledgeable Secondary -> Domain | IT in Banking | Customer Support | 2 - Knowledgeable Tertiary -> Behavioral | Aptitude | Communication | 2 - Knowledgeable Certification : Technology | Azure Infra Management Certification As an SCCM and Intune Level 2 Administrator, you will play a pivotal role in the configuration and management of these Microsoft-based systems. You will collaborate with senior administrators and IT teams to ensure the effective deployment of software, updates, monitoring, and mobile device management across our organization. Key Responsibilities: 1. SCCM Configuration and Optimization: - Manage and optimize SCCM infrastructure components, including site servers, distribution points, and client settings. - Lead the design of efficient software deployment processes and ensure timely software updates and patch management. 2. Intune Configuration and MDM: - Oversee the configuration of Microsoft Intune for mobile device management (MDM) and endpoint security. - Lead the implementation of security policies and settings, ensuring a secure mobile device environment. 3. Software Packaging and Deployment: - Lead software packaging and deployment efforts using SCCM, ensuring efficient software distribution, application deployment, and updates. - Implement automation to streamline software deployment processes. 4. Operating System Deployment: - Design and maintain task sequences for OS deployments, including OS upgrades and provisioning of new devices. - Ensure smooth and efficient OS deployment processes. 5. End-User Support: - Provide Level 2 support for SCCM and Intune-related issues and incidents, working closely with Level 1 administrators and escalating complex issues when necessary. - Respond to end-user inquiries, offer guidance, and participate in root cause analysis. 6. Documentation and Reporting: - Maintain comprehensive documentation of configurations, best practices, and optimization procedures for SCCM and Intune. - Create and present reports on the performance and effectiveness of these systems to management and stakeholders. Qualifications: - Bachelor s degree in Information Technology, Computer Science.

Posted 2 weeks ago

Apply

4.0 - 8.0 years

6 - 10 Lacs

bengaluru

Work from Office

Required Skills Technology | Cybersecurity | IDAM Technology | Cybersecurity | SOC Alert Management Technology | Cybersecurity | Vulnerability Management Behavioral | Aptitude | Communication Technology | Cybersecurity | End Point Security Education Qualification : Any Graduate Certification Mandatory / Desirable : Technology | IT Security Certifications | EC-Council Certifications | EC-Council Certified Ethical Hacker (CEH) Details: Identity & Access Control Sr. SME is responsible for administering and maintaining access security systems. Will be responsible for working closely to define, implement, deploy and maintain an IDaaS platform that supports both internal and external user identity and access management functionality. 1. Administer a comprehensive IDaaS solution. 2. Have experience in identity access management and governance, to include single sign on, identity federation, enterprise directory architecture and design, and resource provisioning. 3. Demonstrate advanced understanding of business processes, internal control risk management, IT controls and related standards. 4. Identify and evaluate complex business and technology risks, internal controls which mitigate risks, and related opportunities for internal control improvement. 5. Understand complex business and information technology management processes. 6. Communicate to clients and partners aspects of both the product and the implementation at the technical and functional level appropriate for the situation. 7. Work with the Identity Access Management team to continue making enhancement to the Identity Access Management program. 8. Work closely with development teams to perform User management, group management and Password management requests. 9. Create and maintain Identify Access Management metrics.

Posted 2 weeks ago

Apply

5.0 - 9.0 years

7 - 11 Lacs

bengaluru

Work from Office

Required Skills Technology | End Point Management Technology | End Point Management | SCCM Technology | End Point Management | Intune Education Qualification : Bachelor s degree/diploma in computer science or information technology or equivalent Certification Mandatory / Desirable : Technology | Any certification in System Center / Imaging / Intune / XenMobile / Airwatch / Jamf EndPoint Management (OS Image, SCCM, App Package, ManageEngine, Patch Management, Intune/XenMobile/Airwatch/Jamf) - Design, Deployment and maintaining the infrastructure, processes and standards used for centralized desktop management and to assist with setup and build for the same. - Responsible for securely packaging and patching operating systems and applications, managing centralized network-based application licenses, providing centralized print queue services, and providing centralized application and desktop virtualization. - Requirement analysis, assessment, design modern workplace with simplified endpoint management - Experience in defining roadmap for modernization and experience in carrying our large scale upgrades - Assess the customer landscape of end user devices and gather business requirement from customer stakeholders on endpoint management and security - Design Technical solutions (infrastructure and policies) on InTune/SCCM/EndPoint Manager to meet the security requirements - analyze existing desktop management processes for improvements - assist in policies, imaging during migration or upgrades. - Creating and maintaining operating system images and their deployment processes - Knowledge of SCCM/System Center - Demonstrated understanding of or professional experience with enterprise desktop and application management - Creating and maintaining application deployment packages and processes - Ensuring operating systems and applications work as expected through testing, troubleshooting post any setup/migration activity - Experience of designing and implementing large scale and complex SCCM, Intune, MDM, MAM, Office 365, Windows 10 designs - Proficient in managing users and devices in Intune, deploying Intune clients and setting up mobile device management while managing, creating & testing Intune policies - Provide guidance to customers wrt MDM, MAM, Application related policies to meet endpoint security requirements. - Manage solution implementation design deliverables to budget and expected quality standards, through transition and transformation - Configuration of Windows AutoPilot, deployment of OS upgrades and application along with MDM, MAM, MCM policies - Enterprise level device management, Device roll out strategy, persona management and continuous improvement of end user experience with modern devices - Planning and Migration of devices from mobile management platforms to new platform - Programming or scripting skills, particularly with Windows PowerShell - Analyze existing workplace endpoints for improvements and modernization.

Posted 2 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Vulnerability Assessment Penetrationtest. Experience: 8-10 Years.

Posted 2 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

hyderabad

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SailPoint Identity Mgmt and Governance. Experience: 8-10 Years.

Posted 2 weeks ago

Apply

3.0 - 7.0 years

12 - 16 Lacs

bengaluru

Work from Office

Your Career You will work firsthand with our valued customers to address their complex post-sales concerns where analysis of situations or data requires an in-depth evaluation of many factors. Youre a critical thinker in understanding the methods, techniques, and evaluation criteria for obtaining results. Youll enjoy networking with key contacts outside your own area of expertise, with a strong capability of detailing difficult technical issues to both non-technical and technical professionals. You will regularly participate in technical discussions with multi-functional teams, creating an environment of transparency that ultimately leads to better products, better working environments, and better cybersecurity. Your quick thinking and support to our clients provides the fast assistance they need to keep their environments secure which means youll need to move quickly, thoughtfully, and provide technical assistance as needed (often, in high pressure situations). We are looking for a highly motivated and customer-focused professional. As part of the global Cortex XDR support team, you will serve our customer base by providing technical support, by answering incoming support inquiries, and managing escalations, phone calls, and emails in an effective, efficient, and friendly manner within defined service level agreements. Your Impact Respond to user-reported issues in adherence to established Service Level Agreements Triage customer reported issues and respond to them via ticketing system, phone or remote sessions Perform advanced troubleshooting at the application level and OS level, using your knowledge and relevant expertise Identify the area of fault (code, environment, or configuration) and work with the appropriate team(s) to implement the fix Provide timely feedback on the development process on customer-reported product problems Document actions to effectively communicate information internally and to customers Facilitate root cause investigations and manage the implementation of corrective and preventative measures Qualifications Your Experience BE/B.Tech engineering, equivalent technical degree or equivalent military experience required 5 to 10 years of relevant experience with strong communication and customer service skills Required experience with Windows OS, Linux OS and macOS based applications (Installation, troubleshooting, Debugging) Endpoint security technologies experience (XDR, SOAR, SIEM, etc.) Experience understanding malware, exploits, operating system structure, and behavior Experience with Android OS based applications (Installation, troubleshooting, Debugging) Strong experience with MS environment (SCCM, GPO, AD, MSSQL, IIS) Experience with EndPoint security software is a plus (Antivirus, DLP, IPS, NAC) Knowledge of SIEM, vulnerability management tools, and firewalls Good to have skills: Experience with bash scripting OR Python is a plus Strong ability to independently troubleshoot, reproduce issues and identify possible workarounds in broad, complex, and unique environments with mixed applications and protocols required Knowledge of Cloud infrastructure is a plus Knowledge of VDI (VMWare Horizon, Citrix XenApp, and XenDesktop) is a plus Additional Information The Team Our Global Customer Support team is critical to our success and mission. As part of this team, you enable customer success by providing support to clients after they have purchased our products. Our dedication to our customers doesnt stop once they sign it evolves. As threats and technology change, we stay in step to accomplish our mission.

Posted 2 weeks ago

Apply

2.0 - 4.0 years

2 - 6 Lacs

kanpur

Work from Office

Connexpark InfoSolutions is looking for MIS Professional to join our dynamic team and embark on a rewarding career journey Oversee the design, implementation, and maintenance of the information systems, including hardware, software, and networking infrastructure Manage the database systems, including data backup and recovery, data security, and data integrity Develop and maintain procedures for managing the information systems and technology infrastructure, including disaster recovery plans, security policies, and user access controls Analyze the business processes and identify opportunities for improvement through the use of information systems and technology Collaborate with cross-functional teams, including IT, finance, and business operations, to integrate information systems and technology with other systems and processes Monitor system performance and provide technical support to end-users to ensure the smooth operation of information systems and technology Strong analytical and problem-solving skills Excellent communication and collaboration skills

Posted 2 weeks ago

Apply

1.0 - 4.0 years

2 - 5 Lacs

bengaluru

Work from Office

MichBiz Services is looking for MIS Professional to join our dynamic team and embark on a rewarding career journey Oversee the design, implementation, and maintenance of the information systems, including hardware, software, and networking infrastructure Manage the database systems, including data backup and recovery, data security, and data integrity Develop and maintain procedures for managing the information systems and technology infrastructure, including disaster recovery plans, security policies, and user access controls Analyze the business processes and identify opportunities for improvement through the use of information systems and technology Collaborate with cross-functional teams, including IT, finance, and business operations, to integrate information systems and technology with other systems and processes Monitor system performance and provide technical support to end-users to ensure the smooth operation of information systems and technology Strong analytical and problem-solving skills Excellent communication and collaboration skills

Posted 2 weeks ago

Apply

6.0 - 9.0 years

12 - 22 Lacs

chennai

Hybrid

Greetings from Trianz ! We are pleased to share an excellent career opportunity for the role of Endpoint Security Platform Engineer . At Trianz, we partner with Fortune 1000 and fast-growing enterprises to drive digital transformation through innovative, IP-led solutions. Recognized by Forbes as one of the Worlds Best Management Consulting Firms and certified as a Great Place to Work® in both the U.S. and India, we take pride in delivering consistent value to our clients and employees alike. Location: Chennai Experience: 6–8 years Employment Type: Full-time Shift Timing: 10 AM to 7 PM and 1PM to 10 PM (Rotational) Role Overview We are looking for an experienced Endpoint Security Platform Engineer with strong expertise in Sophos AV, Vulnerability Management, and Patching across Windows and Linux environments . The role involves end-to-end design, implementation, and management of endpoint protection, along with comprehensive vulnerability remediation. Key Responsibilities Design, implement, and manage Sophos AV, EDR, DLP, and Encryption solutions. Monitor and administer the Sophos Protection Suite Console for alerts and threats. Lead vulnerability management & patching across Windows/Linux servers and endpoints. Perform security assessments, penetration testing, and incident response. Proactively monitor threat intelligence and industry alerts. Required Skills & Experience 5+ years in Endpoint Security design & implementation (Sophos AV, EDR, DLP, Encryption). 6+ years in Vulnerability Management & Patching (Windows & Linux). 4+ years in Security Infrastructure & Threat Management . Proficiency with tools such as Qualys, Nessus, Nmap, Wireshark . Strong knowledge of Windows Security, Linux/Unix, TCP/IP, IDS/IPS, and firewalls . Security certifications ( CEH, CompTIA Security+, CHFI, CISM ) preferred If this opportunity excites you, we invite you to share your updated resume with us You may also refer friends or colleagues who might be a good fit for this role. Looking forward to connecting with talented professionals who are passionate about cybersecurity and digital transformation .

Posted 2 weeks ago

Apply

5.0 - 8.0 years

8 - 13 Lacs

bengaluru

Work from Office

Role & Responsibilities: Required Skills/qualifications: 5+ years of experience in Network Security experience, Palo Alto, CISCO, ISE etc Working knowledge of common operating systems (Windows, Linux, etc.) and basic endpoint security principles Hands-on experience with common networking services and protocols (TCP/IP, SSH, FTP, DNS, DHCP, SMTP, SSL, etc.) Experience with maintaining and operating common security technologies (IDS, IPS, Firewalls, Cloud Security, WAF, Endpoint Security, SIEM, etc.) Exceptional organizational abilities and attention to detail The ability to think creatively to find elegant solutions to complex problems Excellent verbal and written communication skills Below cloud skills are expected: o Strong conceptual and hands on knowledge of working in cloud security for any popular public cloud platforms like AWS, GCP, Azure. o Setting up cloud security in AWS, GCP, Azure Network/VPC Design and implementation/configuration Governance around security groups, external IP's, encryption, etc Restrict access to team/function level using least privilege model. o Automation using Terraform/Ansible or other tooling o Expert in troubleshooting and resolving issues related to cloud security o Certification in any Cloud platform would be desirable Preferred Qualifications: 5+ years of experience in Information Security, Security Operations, Incident Response, etc. (or related field) Demonstrated ability to analyze and correlate information from a wide variety of enterprise technologies Demonstrated experience managing firewalls and other security technologies Understanding of common security threats, attack vectors, vulnerabilities and exploits CompTIA Network+/Security+, GIAC (GCIA, GCIH, GSEC, GCFA, GCFE, etc.), CISSP, CEH or related certification(s) desired Mandatory Key Skills SMTP,SSL,IDS,IPS,Firewalls,Cloud Security,WAF,Endpoint Security,SIEM,AWS,GCP,Azure,VPC Design,security groups,external IPs,Linux,troubleshooting,Network Security,Palo Alto,CISCO,ISE,Windows,TCP/IP*,SSH*,FTP*,DNS*,DHCP*

Posted 2 weeks ago

Apply

4.0 - 9.0 years

12 - 17 Lacs

bengaluru

Work from Office

Your Career We are looking for a highly motivated and customer-focused professional. As part of the global Cortex XSIAM support team, you will serve our customer base by providing technical support, by answering incoming support inquiries and managing escalations, phone calls, and emails in an effective, efficient, and friendly manner within defined service level agreements. Our methodology is first class support. Weve been recognized for it as an industry leader and were dedicated to continuing this standard. In this role, you will work with our technical account managers to personalize our customers experience. You will learn your clients business objectives in and out within their technical environment and focus on mitigating risks and resolving any technical issues in their networks. Youre close to the deployment of cybersecurity solutions and we need you to recognize risks before they arise. You get a thrill from seeking out complex issues and finding their resolutions and you dont wait for those issues to escalate from our clients. Instead, you find them. Youll be working hand in hand with our developers to reproduce the issues you find and develop permanent solutions to prevent them in the future. Your Impact Respond to user-reported issues in adherence to established Service Level Agreements Triage customer reported issues and respond to them via ticketing system, phone, or remote sessions Perform advanced troubleshooting at the application level and OS level, using your knowledge and relevant expertise Identify the area of fault (code, environment, or configuration) and work with the appropriate team(s) implementing the fix Provide timely feedback into the development process on customer-reported product problems Document actions to effectively communicate information internally and to customers Facilitate root cause investigations and manage the implementation of corrective and preventative measures Qualifications Your Experience Previous experience with Endpoint Security software is required SIEM experience, including - Deep understanding of how SIEMs works Experience in creating custom collections and data parsing Experience in creating complex correlation rules, reports and dashboard Experience in integration and implementation of SIEMs Experience working with EDR tools Experience with strong communication and customer service skills Required basic networking knowledge - Ability to independently debug broad, complex, and unique environments with mixed applications and protocols Experience with Windows OS, MacOS, and Linux based applications (Installation, troubleshooting, Debugging) 4+ years of experience as a Support Engineer Fundamental understanding of Kubernetes, GCP, and AWS for troubleshooting cloud agent deployment and data extraction. Excellent written and verbal communication skills Strong customer advocacy skills and experience, ability to work in difficult customer situations Knowledge of Cloud infrastructure a plus Experience in incident response a plus Experience with scripting a plus Experience with MS Server solutions (SCCM, GPO, AD, MSSQL, IIS, Exchange) is a plus

Posted 3 weeks ago

Apply

5.0 - 10.0 years

7 - 14 Lacs

bengaluru

Work from Office

Your Career You will work firsthand with our valued customers to address their complex post-sales concerns where analysis of situations or data requires an in-depth evaluation of many factors. Youre a critical thinker in understanding the methods, techniques, and evaluation criteria for obtaining results. Youll enjoy networking with key contacts outside your own area of expertise, with a strong capability of detailing difficult technical issues to both non-technical and technical professionals. You will regularly participate in technical discussions with multi-functional teams, creating an environment of transparency that ultimately leads to better products, better working environments, and better cybersecurity. Your quick thinking and support to our clients provides the fast assistance they need to keep their environments secure which means youll need to move quickly, thoughtfully, and provide technical assistance as needed (often, in high pressure situations). We are looking for a highly motivated and customer-focused professional. As part of the global Cortex XDR support team, you will serve our customer base by providing technical support, by answering incoming support inquiries, and managing escalations, phone calls, and emails in an effective, efficient, and friendly manner within defined service level agreements. Your Impact Respond to user-reported issues in adherence to established Service Level Agreements Triage customer reported issues and respond to them via ticketing system, phone or remote sessions Perform advanced troubleshooting at the application level and OS level, using your knowledge and relevant expertise Identify the area of fault (code, environment, or configuration) and work with the appropriate team(s) to implement the fix Provide timely feedback on the development process on customer-reported product problems Document actions to effectively communicate information internally and to customers Facilitate root cause investigations and manage the implementation of corrective and preventative measures Qualifications Your Experience BE/B.Tech engineering, equivalent technical degree or equivalent military experience required 5 to 10 years of relevant experience with strong communication and customer service skills Required experience with Windows OS, Linux OS and macOS based applications (Installation, troubleshooting, Debugging) Endpoint security technologies experience (XDR, SOAR, SIEM, etc.) Experience understanding malware, exploits, operating system structure, and behavior Experience with Android OS based applications (Installation, troubleshooting, Debugging) Strong experience with MS environment (SCCM, GPO, AD, MSSQL, IIS) Experience with EndPoint security software is a plus (Antivirus, DLP, IPS, NAC) Knowledge of SIEM, vulnerability management tools, and firewalls Good to have skills: Experience with bash scripting OR Python is a plus Strong ability to independently troubleshoot, reproduce issues and identify possible workarounds in broad, complex, and unique environments with mixed applications and protocols required Knowledge of Cloud infrastructure is a plus Knowledge of VDI (VMWare Horizon, Citrix XenApp, and XenDesktop) is a plus

Posted 3 weeks ago

Apply

8.0 - 13.0 years

25 - 35 Lacs

hyderabad, pune, chennai

Hybrid

Create secure IT infrastructure, including networks, systems, and databases, to safeguard sensitive data. Assess the effectiveness and efficiency of security systems, such as firewalls, routers, and VPNs. Required Candidate profile Develop and maintain security policies and architecture patterns to ensure compliance and security best practices.Implement security controls and recommend solutions to mitigate evolving cyber threats

Posted 3 weeks ago

Apply

3.0 - 8.0 years

10 - 14 Lacs

bangalore rural, bengaluru

Work from Office

Role & responsibilities 70% -Technical expertise- network and application security and cloud (Certifications-AWS, AZURE, GCP) 30%- risk mgt Exposure OR audit exp (Must have) foundational knowledge across key areas of cloud security, With further depth in risk frameworks, cloud models, and practical exposure to tools and controls Preferred candidate profile those who have certification in any of this - CISA/ CISSP/ AWS/ AZURE/ GCP/ CEH

Posted 3 weeks ago

Apply

5.0 - 10.0 years

5 - 15 Lacs

chennai

Work from Office

Position: Presales Engineer (Strong Technical knowledge of Cyber Security Threats, Endpoint Security, EDR / XDR, MDM, ZTUA / ZTNA, DLP, Data Privacy solutions & Network Security solutions). Experience: 5+ Year Job Description Develop a deep understanding of cybersecurity products and solutions offered by Seqrite. Stay updated on industry trends, emerging threats, and advancements in cybersecurity technologies Deliver compelling and persuasive presentations to clients, showcasing the benefits and features of our cybersecurity solutions. Conduct product demonstrations and simulations to illustrate the effectiveness of our solutions. Meet or exceed monthly, quarterly, and annual sales targets and quotas set by the organization by providing full Technical assistance to Sales Team. Initiate and maintain proactive communication with prospective clients. Conduct initial discovery calls to understand client requirements and pain points. Build and maintain strong relationships with potential customers, fostering trust and confidence in our solutions. Collaborate with the sales team to deliver compelling and customized presentations, demonstrating how our solutions meet the specific security requirements of potential clients. Conduct product demonstrations sessions to showcase the effectiveness of our solutions, addressing client concerns and objections. Coordinate and conduct product demonstrations and proof of concepts for potential clients. Manage POC projects from initiation to successful completion, ensuring customer satisfaction. Provide valuable feedback to the organization regarding market trends, client needs, and competitive positioning. Work closely with the sales, marketing, and technical teams to ensure a unified approach to client engagement. Provide feedback from clients to inform product development and improvements. Provide training sessions to clients & Partners for Seqrite solutions. Prepare and maintain detailed records of client interactions and opportunities in the CRM & SharePoint Trackers. Generate reports and analysis to track the progress of presales activities and identify areas for improvement. Analyze competitor solutions and market trends to position our products effectively. Differentiate our offerings by highlighting unique features and benefits. Required Skills: Strong Technical & Communication skills to effectively communicate with Customers & Partners. Strong Technical knowledge of Cyber Security Threats, Endpoint Security, EDR / XDR, MDM, ZTUA / ZTNA, DLP, Data Privacy solutions & Network Security solutions. Focuses on Understanding desired outcomes and showing value for Seqrite Partners & Customers. Develop a deep understanding of our products and services. Provide technical expertise to clients and answer their questions regarding our solutions. Excellent verbal and written communication skills to articulate cybersecurity solutions to clients in a clear and understandable manner. Active listening skills to understand client needs and propose solutions accordingly. Collaborate with the sales team to understand client requirements and objectives. Conduct in-depth consultations with clients to identify cybersecurity challenges and pain points. Willingness to travel as needed to meet with clients and attend industry events. Proficiency in using CRM software to manage leads, opportunities, and customer interactions throughout the sales process. Comfortable with learning and presenting technical information about cybersecurity products and services. Collaborative mindset to work effectively with cross-functional teams, including marketing, product, sales, and technical teams.

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies