Home
Jobs

264 Endpoint Security Jobs - Page 9

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

9.0 - 14.0 years

8 - 12 Lacs

Hyderabad

Work from Office

Naukri logo

We re on a mission to change the future of clinical research. At Perceptive, we help the biopharmaceutical industry bring medical treatments to the market, faster. Our mission is to change the world but to do this, we need people like you. Apart from job satisfaction, we can offer you: HEALTH: - Medical plan for you and your dependents. - Personal Accident Insurance - Life Insurance - Critical illness cover WEALTH: - Salary structure and Flexi basket - Provident fund of 12% - Gratuity scheme YOURSELF: Internal growth and development programs trainings Key Responsibilities Security Engineering Implementation Deploy, configure, and maintain security technologies, including firewalls, IDS/IPS, endpoint security, and XDR solutions. Work closely with IT and DevOps teams to integrate security into system and application architectures. Threat Detection Incident Response Monitor security alerts and investigate incidents to identify root causes and remediation actions. Support security operations teams in responding to threats and improving detection and response capabilities. Endpoint, Cloud, and Network Security Implement and manage security controls for endpoints, cloud environments, and networks. Work on securing hybrid cloud infrastructures and enforcing Zero Trust principles Vulnerability Patch Management Conduct security assessments and penetration tests to identify vulnerabilities. Work with IT teams to prioritize and apply security patches and remediations. Compliance Risk Management Assist in maintaining compliance with industry regulations (ISO 27001, GDPR, HIPAA). Participate in security audits, risk assessments, and policy development to strengthen the organization s security framework. Security Awareness Collaboration Work closely with internal teams to provide security guidance and training. Contribute to security awareness programs to enhance the organizations security culture. Functional Competencies (Technical knowledge/Skills) Strong knowledge of security frameworks (NIST, ISO 27001, CIS Controls). Hands-on experience with security tools such as firewalls, IDS/IPS, EDR, and XDR solutions. Understanding of cloud security in AWS, Azure, or GCP. Experience with vulnerability management and penetration testing. Knowledge of IAM, PAM, and Zero Trust security principles. Strong analytical skills and problem-solving capabilities. Effective communication skills to work with technical and non-technical teams. Experience, Education, and Certifications 9+ years of experience in cybersecurity, with hands-on expertise in security engineering. Bachelors degree in Computer Science, Cybersecurity, or a related field. Relevant certifications such as CISSP, CEH, OSCP, or equivalent are preferred. Experience in security operations, incident response, and vulnerability management. Strong understanding of regulatory and compliance requirements in cybersecurity. Come as you are. Were proud to be a Equal Employment Opportunity employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.

Posted 1 month ago

Apply

10.0 - 12.0 years

2 - 3 Lacs

Mumbai

Work from Office

Naukri logo

1. Sales & Business Development - Identify and pursue new business opportunities incybersecurity solutions, including network security, endpoint security, cloud security andthreat intelligence. - Develop and execute sales strategies to achieve revenuetargets. - Generate leads through networking, cold calling, industryevents, and referrals. - Conduct sales presentations and demos for clients toshowcase cybersecurity solutions. - Respond to RFPs (Request for Proposals) and createcompelling proposals for potential clients. 2. Client Relationship Management - Develop and maintain strong relationships with keydecision-makers (CISOs, IT Heads, CTOs, CIOs). - Conduct regular account management activities to drivecustomer satisfaction and long- term partnerships. 3. Market & Industry Analysis - Stay updated with industry trends, cybersecurity threats,and evolving technologies. - Identify competitive threats and developcounter-strategies. xbiz - Provide insights on market demands and customer painpoints to internal teams for product/service improvement. 4. Collaboration & Reporting - Work closely with marketing, and product / technical teamsto develop sales strategies. - Provide regular sales forecasts, reports, and pipelineupdates to senior management. - Represent the company at cybersecurity conferences, tradeshows, and networking events. Key Requirements Education & Experience - Bachelordegree in business, IT, Computer Science, or arelated field. - 4-8 years of experience in B2B sales, business developmentin the cybersecurity or IT solutions space. Technical & Sales Skills - Strong understanding of cybersecurity solutions(firewalls, endpoint security, SIEM, SOC, identity & access management, cloud security, etc.). - Proven track record in meeting or exceeding sales targetsin a cybersecurity or IT solutions company.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: ForgeRock Identity Manager. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 12.0 years

12 - 17 Lacs

Pune

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Noida

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: PingFederate. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Noida

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: SailPoint Identity Mgmt and Governance. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Hyderabad

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Active Directory. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: GRC Technology. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Coimbatore

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: F5 Load Balancers. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Noida

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.

Posted 1 month ago

Apply

5.0 - 8.0 years

8 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

Job Title:Architect Experience5-8 Years Location:Bangalore : Data Management and Integration:The data architect will be responsible for managing and defining/integrating data from various sourcesacross regionto ensure seamless data flow and accuracy. This includes addressing data security and privacy concerns, integration challenges, and ensuring real-time data accuracy AI Integration:A significant component of the CMO360 project is the integration of AI to provide insights and support user actions. The data architect will play a crucial role more from “Data” perspective for implementing AI features and ensuring they are effectively integrated into the system Collaboration with Teams:The data architect will work closely with various teams, including CMO, Engineering, across the organization to ensure that the data architecture aligns with the project's objectives and requirements. This includes participating in workshops and meetings to identify pain points and prioritize requirements Technical Assessment and Risk Management:The data architect will be involved in conducting technical assessments and managing risks associated with data security, integration, and user adoption. Mitigation plans will need to be developed and implemented to address these risks Documentation and Communication:The data architect will be responsible for documenting the data architecture and communicating it to relevant stakeholders. This includes creating and maintaining documentation that outlines the data architecture, data flow, and integration points LocationIndia – Bangalore

Posted 1 month ago

Apply

3.0 - 7.0 years

2 - 6 Lacs

Bengaluru

Work from Office

Naukri logo

Drive projects and initiatives to improve and expand existing DLP platform capabilities. Implement and manage DLP solutions, including data labeling technologies. Work directly with stakeholders to define requirements and develop security solutions. Ensure the security of endpoint devices, including data protection and behavior analysis. Deploy and manage endpoint DLP solutions, such as those offered by Proofpoint. Manage email security policies and configurations, including DLP for email. Detect and prevent data loss through email channels, such as by identifying sensitive content and usebehavior. Gain deep knowledge of the Proofpoint platform, including its various modules (e.g., Endpoint DLP, Email DLP) Be proficient in using the Proofpoint console to manage alerts, investigate incidents, and analyze user behavior. Primary Skills DLP Endpoint Security Email Security Secondary Skills Data Labeling Behavior Analysis Incident Response

Posted 1 month ago

Apply

6.0 - 9.0 years

4 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

Experience in designing, implementing, and managing SCCM and Intune solutions. Strong understanding of endpoint management concepts, including device provisioning, software distribution, patch management, and security. Experience with Microsoft Endpoint Manager (SCCM and Intune) integration, configuration, and administration. Familiarity with modern management concepts, such as cloud-based management, autopilot, and zero-touch deployment. Experience working with PC/Mac infrastructure as an engineer level SCCM & Intune Certification. Experience with system provisioning and imaging using tools such as DEP and SCCM. Experience with managing 802.1x on MacOS/Windows (for wifi and wired network connections). Experience with end point management client software deployment (SCCM + Intune), inventory, antivirus and end point security solution. Familiarity with configuration profile and working with preference files (.plist) Experience with Azure/AWS, Network troubleshooting, Background in server administration, networking, troubleshooting, scripting, automation Experience with Active Directory including user and group management, group policies Experience with desktop operating systems including Windows 10/11 and OS X Scripting via PowerShell, BASH, and others. Excellent analytical, problem-solving, and communication skills. Primary Skills Operating System Deployment SCCM Intune Secondary Skills Mircosoft Endpoint Patching

Posted 1 month ago

Apply

4.0 - 8.0 years

6 - 8 Lacs

Coimbatore

Work from Office

Naukri logo

We are seeking a Cloud Engineer to design, implement, and maintain cloud infrastructure (AWS, Azure, GCP). Key responsibilities include cloud architecture, system administration, automation, security, cost management, and documentation. Experience with migrating Exchange and SharePoint to cloud solutions is required. Collaborate with, cross-functional teams to design, implement, and maintain cloud infrastructure solutions. Provide technical guidance and support to resolve complex issues related to cloud services, Cyber Security, Networks. Perform regular assessments and audits to ensure the security, reliability, and efficiency of cloud environments. Participate in planning and executing cloud migration projects, including workload assessments, resource provisioning, and data migration strategies. Work as a Technical Consultant for Various Microsoft Technologies and its Security products. Hosted Exchange and Online Exchange Migration - SharePoint and OneDrive Migration - Teams, Enterprise Roaming Profile and Intune Deployment - Spam Filters and Endpoint Security, EDR, XDR, NDR, MDR - Work with Pass-through, Federated auth, SSO, Hybrid access, Cloud Sync, Delegation, Self Service. - MFA, Conditional Policies, PIM, Vulnerabilities and risk assessment. - Encryption, Risk Asses, Incidence management, VA, Penetration test, IDS/IPS, compliance.

Posted 1 month ago

Apply

2.0 - 5.0 years

6 - 10 Lacs

Mumbai

Work from Office

Naukri logo

About The Role Inside Sales ConsultantExperience 2 to 5 Years (B2B Sales) Location Mumbai (Malad West)- As an Inside Sales Consultant, you will play a critical part in our fast-growing Cyber Security business servicing our customers. You will be part of a smart, innovative team that is changing the way customers buy and manage their IT infrastructure. Candidates with high energy, entrepreneurial-spirited people who settle for nothing less than selling world class solutions & services. The successful candidate will be responsible for driving revenue growth by effectively engaging with prospects and nurturing relationships. - Lead Generation Researching potential customers and identifying decision-makers within target organizations. This involves using various tools and methods to generate leads such as cold calling, email campaigns, social media outreach, and leveraging inbound inquiries. - Qualifying Leads Assessing the viability of leads based on criteria such as budget, authority, need, and timeline (BANT). This helps prioritize efforts towards leads most likely to convert into customers. - Customer Relationship Management Building and maintaining strong relationships with customers throughout the sales process and beyond. This includes following up on sales inquiries, providing ongoing support, and ensuring customer satisfaction. - Sales Reporting and Analysis Tracking sales activities, pipeline development, and forecasting using CRM (Customer Relationship Management) systems. Analyzing sales data to identify trends, opportunities, and areas for improvement. - Collaboration with Other Teams Working closely with sales and technical teams to align sales strategies with overall business objectives. Providing feedback from customers to help improve products and services. - Continuous Learning and Improvement Staying updated on industry trends, market conditions, and competitive activities. Continuously improving sales techniques and product knowledge to enhance effectiveness in generating sales. Key Skills - Bachelor's degree/Master's Degree - preferably IT Industry - Excellent written and verbal communication skills. - Ability to multi-task, organize, and prioritize work. - Excellent presentation skills. - Ability to approach adversity with a positive attitude. Ideal Candidate - Minimum 2-5 years of B2B sales experience working with senior level decision makers (CTO, CIO, CISO and IT Managers) within key verticals, understanding of sales revenue cycle and buying behavior. - Preferred Experience in strategic/solution selling in technologies like Endpoint Security & EDR/XDR, Encryption, Gateway Security, Web Proxy Solution, Data Loss prevention Solution, Email Gateway Security, CASB, IRM/DRM, MDM etc. This job opening was posted long time back. It may not be active. Nor was it removed by the recruiter. Please use your discretion.

Posted 1 month ago

Apply

4.0 - 8.0 years

6 - 10 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Naukri logo

We are seeking a highly motivated and detail-oriented Cybersecurity Analyst to join our remote team in India You will be responsible for identifying vulnerabilities, monitoring security systems, and defending against cyber threats This role requires a proactive mindset, critical thinking, and the ability to work independently in a fast-paced environment, Key Responsibilities: Monitor networks and systems for security breaches, intrusions, or anomalies Analyze security incidents and provide incident response Conduct regular vulnerability assessments and penetration tests Implement and maintain security tools such as firewalls, antivirus, SIEM, etc Collaborate with IT teams to improve overall security posture Create detailed reports on security incidents and risks Stay updated with the latest cyber threats, trends, and best practices ???? Required Skills & Qualifications: Bachelor's degree in Computer Science, IT, Cybersecurity, or related field 2+ years of experience in cybersecurity or information security Proficiency in tools like SIEM (Splunk, QRadar, etc ), IDS/IPS, and antivirus systems Strong knowledge of firewalls, VPNs, proxy servers, and endpoint security Familiarity with frameworks such as NIST, ISO 27001, or OWASP Analytical mindset with excellent problem-solving skills Good communication and documentation skills Preferred (Bonus): Certifications: CEH, CompTIA Security+, CISSP (or working towards it) Experience with cloud security (AWS, Azure, or GCP) Understanding of scripting languages (Python, PowerShell, Bash)

Posted 1 month ago

Apply

3.0 - 5.0 years

20 - 25 Lacs

Gurugram

Work from Office

Naukri logo

Must Have Skills Data Loss Prevention (DLP) Administration & Implementation Experience : 3-5 years relevant Deploy, configure, and manage DLP solutions (eg, Forcepoint, Symantec, McAfee). Design and implement DLP policies for email, endpoints, cloud storage, and web traffic. Integrate DLP with SIEM, CASB, and other security tools for centralized monitoring. Conduct proof-of-concept (PoC) testing for new DLP features and updates. Work with IT teams and business units to align DLP configurations with organizational security policies. Regularly review and fine-tune DLP policies to reduce false positives and negatives. Conduct data classification and discovery scans to identify sensitive information. Establish role-based access controls (RBAC) to manage DLP policy enforcement. Investigate DLP alerts and incidents, identifying root causes and recommending corrective actions. Hands-on experience with DLP tools (eg, Symantec DLP, Forcepoint DLP, Microsoft Purview, McAfee DLP, Digital Guardian, Netskope). Strong understanding of data classification, encryption, and regulatory compliance frameworks. Expertise in network security, endpoint security, and cloud security. Experience in SIEM integration, CASB solutions, and data discovery tools. Knowledge of incident response frameworks and forensic investigation techniques.

Posted 1 month ago

Apply

4.0 - 9.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Diverse Lynx is looking for Splunk Professional to join our dynamic team and embark on a rewarding career journey Collaborate with stakeholders to understand data requirements, use cases, and objectives for Splunk deployments Design and implement data ingestion processes, including data collection, parsing, normalization, and indexing in Splunk Develop custom Splunk queries, search strings, and data models to extract meaningful insights from machine-generated data Create interactive dashboards, reports, and visualizations using Splunk's search processing language (SPL) and visualization tools Implement and maintain Splunk apps, add-ons, and configurations to support specific use cases or data sources Automate data analysis workflows and alerting mechanisms to identify and respond to critical events and anomalies Optimize Splunk deployments for performance, scalability, and search efficiency Monitor and troubleshoot Splunk infrastructure and resolve issues related to data ingestion, search performance, and system availability Collaborate with security and operations teams to develop and implement Splunk-based security monitoring, log analysis, and incident response solutions Ensure data privacy and security by implementing access controls, data encryption, and compliance with relevant regulations Stay updated with Splunk product releases, new features, and best practices to recommend and implement improvements in Splunk deployments Provide training and support to end-users on utilizing Splunk for data analysis and visualization

Posted 1 month ago

Apply

3.0 - 5.0 years

6 - 7 Lacs

Noida

Work from Office

Naukri logo

Design, implement, and maintain Zero Trust Architecture using Zscaler and related security frameworks. Develop and enforce app segmentation strategies to isolate and secure internal applications based on user roles and access needs. Monitor and troubleshoot endpoint connectivity issues, ensuring consistent performance and reliability across devices. Collaborate with security, infrastructure, and application teams to align Zscaler solutions with enterprise IT strategies. Maintain and enhance endpoint security postures through Zscaler integrations with MDM and EDR platforms. Configure and deploy Zscaler Client Connector across diverse device environments (Windows, macOS, mobile). Perform regular audits and compliance checks to validate secure access and policy adherence. Analyze traffic logs, identify anomalies in collaboration with other teams. Support change management and documentation processes related to endpoint networking and Zscaler configuration. Provide subject matter expertise (SME) in Zscaler and Zero Trust principles during security architecture reviews and planning sessions.Stay updated with the latest advancements in endpoint security and Zero Trust Network Access (ZTNA) technologies. We re looking for someone with: Bachelor s/Master s degree in Information Technology or related field. Minimum 3-5 years of experience with Zscaler Products Possess deep knowledge of Networking concepts like DNS, IP subnets, Firewall etc. Manage and optimize Zscaler Private Access (ZPA) and Zscaler Client Connector (ZCC) policies to ensure secure/seamless user access and security Policy management. Certification - Zscaler Certified ZIA/ZPA Administrator/Zscaler Certified Cloud Expert (ZCCX)

Posted 1 month ago

Apply

7.0 - 10.0 years

12 - 16 Lacs

Gurugram

Work from Office

Naukri logo

Job Description : We are seeking a dynamic andresults-driven Channel Sales Manager to join our growing team. The idealcandidate will have a proven track record of building and managing channelpartner relationships, driving revenue growth through partner channels, and achievingsales targets. The ideal candidate will have a strong background in IT/ITESsales, extensive experience in channel partner management, and a proven trackrecord of driving revenue growth. This role requires a strong understanding ofthe cybersecurity market, excellent communication and negotiation skills, andthe ability to work effectively in a fast-paced and dynamic environment. Role & Responsibilities : Channel Partner Identification : Identify and onboard channel partnerswith a proven track record in IT/ITES sales, particularly for similar products(like \u2013 Firewall/End point security products). Evaluate potential partnersbased on their market expertise, customer base, and sales capabilities. Contract Negotiation : Negotiate contractual agreements with new channel partners, ensuringmutually beneficial terms and conditions that align with our businessobjectives. Onboarding and Training : Conduct comprehensive product and sales training sessions for newlyonboarded channel partners to equip them with the necessary knowledge andskills to effectively market and sell our solutions. Relationship Building : Build and maintain strong, long-term relationships with keystakeholders, including management, owners, and founders of channel partnerorganizations. Act as a trusted advisor and liaison between our company and thechannel partners. Sales Support : Collaborate closely with channel partners to support lead generationefforts, facilitate deal closures, and provide timely assistance to addresscustomer inquiries and concerns. Sales Strategy Development : Develop tailored sales strategies and initiatives to empower channelpartners in driving both top-line and bottom-line growth. Utilize marketinsights and trends to identify opportunities for revenue enhancement. Marketing and Promotions : Design and implement targeted marketing campaigns, promotionalactivities, and incentive programs to drive product awareness and demand amongchannel partners and end customers. Sales Metrics Monitoring : Establish key performance indicators (KPIs) and sales metrics tomonitor channel partner performance, track growth, and identify areas forimprovement. Regularly analyze data to measure the effectiveness of salesstrategies and initiatives. Individual Sales Contribution : Actively engage in sales activities,including prospecting, lead generation, and deal closure, to contribute tooverall revenue targets. Lead by example and demonstrate best practices insales execution. \u200b Team Leadership Experience : Demonstrate leadership capabilities by having previously led a team of5 or more salespersons. Provide mentorship, guidance, and support to teammembers to foster their professional development and drive collective Requirements 1.Total 7-10 years of experience in a similar profile. 2.Minimum of 4 years\u2019 experience in B2B Sales, of Industry sectors \u2013 Retail/Education/Hospitality/IT Technology/ IT Services/ IT hardware organization where in managing resellers/ franchisees/ channel partners. 3.Strong negotiation skills and the ability to cultivate strategic partnerships with channel partners. 4.Excellent communication and interpersonal skills, with the ability to build rapport and influence stakeholders at all levels. 5.Demonstrated leadership experience, including managing a team of sales professionals, in the past, for providing guidance and support to drive individual and collective success. 6.Good understanding of cybersecurity products and industry trends, with a passion for technology and innovation. 7.Strategic thinker with the ability to develop and execute sales and marketing strategies to achieve business objectives. 8.Analytical mindset with the ability to leverage data and metrics to drive informed decision-making. 9.Proactive and results-oriented approach, with a focus on delivering exceptional customer experiences and driving revenue growth. 10.A willingness to learn technical details of the product. 11.Experience in B2B SAAS is preferred. 12.Should be process-oriented and disciplined. Benefits Our Benefits Include: Health Insurance, Performance-Based Bonuses (For Specific Roles), Wellness Programs \u2013 Access to mental health support, meditation sessions, and ergonomic workspaces to ensure a healthy and productive work environment, Team Lunches & Celebrations \u2013 Regular team lunches, parties, and win celebrations to foster a collaborative and fun work culture.

Posted 1 month ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

Job Description Overview: As an MECM and Intune Administrator, you will play a critical role in the design and management of these Microsoft-based systems. You will lead the effort to ensure the effective deployment of software, updates, monitoring, and mobile device management across our organization. US Shift Key Responsibilities: 1. MECM Design and Optimization: Lead the design and optimization of MECM infrastructure, including site servers, distribution points, and client settings. Implement advanced software deployment strategies, automation, and ensure efficient patch management. 2. Intune Configuration and MDM Expertise: Good knowledge on Intune policies, Azure policies and AD GPO. Lead the configuration and management of Microsoft Intune for mobile device management (MDM) and endpoint security. Implement and manage complex security policies, device settings, and compliance rules. 3. Software Packaging and Deployment Leadership: Lead the packaging and deployment of software applications, updates, and patches using MECM. Implement advanced software distribution methodologies, package creation, and automation. 4. Operating System Deployment Expertise: Design, create, and maintain advanced task sequences for OS deployments, including in-place upgrades and dynamic provisioning. Optimize and automate OS deployment processes for efficiency. 5. Advanced Troubleshooting and Support: Provide support for MECM and Intune-related issues and incidents. Conduct root cause analysis for complex issues and incidents. 6. Documentation and Reporting: Maintain detailed documentation of configurations, best practices, and optimization procedures for MECM and Intune. Create and present advanced reports on the performance and effectiveness of these systems to management and stakeholders. Qualifications: 5+ years of experience in MECM, SCOM, and Intune administration, optimization, and troubleshooting. In-depth knowledge of Microsoft technologies, including Windows OS, MECM and Intune. Strong analytical, problem-solving, and advanced troubleshooting skills. Excellent communication

Posted 1 month ago

Apply

6.0 - 8.0 years

13 - 18 Lacs

Mumbai, Hyderabad

Work from Office

Naukri logo

Summary Lead Endpoint Security and Management, shall be responsible for ensuring the day-to-day operations and maintenance of the organization's Endpoint security. Strengthen security posture and ensure the control effectiveness of security systems within an organization. Collaborate with diverse teams to ensure the seamless functioning of the Solutions, optimization of the security infrastructure and controls. Role & responsibilities 1. Ensure the day-to-day operations and maintenance of the organization's cyber security infrastructure and controls to protect systems, networks, and data. 2. Configuration, Monitoring & Troubleshooting of Antivirus, EDR, XDR, DLP, APT, Sandboxing, Secure Proxy, Endpoint Security, PIM,HIPS, FIM, Laptop/Desktop Encryption etc. 3.Provide resolution of issues escalated from L1 and L2. Handling Shift Operations across 24x7 4.Prepare HLD & LLD, generate configuration template etc for changes. 5. Ensure coverage and effectiveness of Security Solution, Report and Review incidents. 6. Ensure optimum security, availability, performance, and capacity of security solutions under management 7. Ensure & maintain up-to-date documentation - SOPs, Architecture digrams etc. to remove dependency on people 8. Manage configuration changes and deployments according to established change management processes, ensuring minimal disruption and adherence to best practices. 9. Ensure hardening, latest stable version and security patches of security devices and solutions 10. Track EOL/EOS and ensre that there no technology obsolescence. 11. Ensure resolution of incidents and outages, coordinating with internal teams and external vendors to restore service within agreed-upon SLAs. 12. Manage escalations and run the smooth operations of security solutions. 13. Ensure relevant processes are followed for change, incident & daily operations 14. Identify & analyse pain areas in existing security operations & implement improvements 15. Manage operational issues which require design/technical inputs. 16. Ensure compliance with regulatory requirements, security policies, and security frameworks such as ISO 27001, NIST, or CIS 17. Publish the relevant dashboards and status updates. 18. Escalate deviations and violations in a timely manner. 19. Remain current with organizations security policies, latest security advisories/threats, industry best-practices and developments in cyber security, and recommend and implement best practices and technologies to mitigate emerging threats. Knowledge 1. Sound experience in managing Endpoint security technologies and operations in a large and complex environment. 2. Should have sound understanding & knowledge of various Operating system, security technologies & techniques like Anti-malware,APT, Sandboxing, Secure Proxy, Endpoint Security, PIM, NAC,HIPS, FIM, Laptop/Desktop Encryption etc. 3. Should have hands on experience on Antivirus, EDR, XDR, DLP and incident response techniques and technologies. 4. Should have knowledge & understanding of Cloud Technologies, IT infrastructure & networking technologies, operations and security principles. 5. Should have sound understanding about Threat Hunting, Mitigation and Response. 6. Strong understanding of Regulatory security guildelines & master directions and security frameworks such as ISO 27001, NIST, or CIS. 7. Should be well versed with ITIL and ITSM practices. Preferred candidate profile 1. Exceptional analytical, conceptual thinking, Troubleshooting and problem-solving skills. 2. Strong leadership, negotiation, and conflict resolution skills. 3. Detail-oriented with a focus on quality and accuracy in project/service deliverables 4. Should have strong written, verbal and presentation skills. 5. Ability to perform under pressure, influence stakeholders and work closely with them to determine acceptable solutions.

Posted 1 month ago

Apply

7.0 - 10.0 years

10 - 15 Lacs

Pune

Work from Office

Naukri logo

Job Description We are seeking a highly skilled and experienced Senior System Engineer to join our dynamic IT team. This role is ideal for a well-rounded professional with strong expertise in managing hybrid infrastructures, covering cloud platforms (Azure & AWS), virtualization, server administration, endpoint security, and backup technologies. The candidate should be capable of independently managing L2/L3-level tasks and contributing to cloud transformation, automation initiatives, and security-focused integrations. Responsibilities Administer and support Office 365, Azure, and SharePoint at L2/L3 levels. Manage and maintain Azure VMs, resource groups, networking, and RBAC. Provide intermediate-level (L2) support and operations for AWS infrastructure including EC2, IAM, S3, and VPC. Perform day-to-day administration and troubleshooting of VMware environments. Manage and configure FortiClient EMS for endpoint protection and policy enforcement. Administer and monitor backup platforms like IBM Spectrum Protect Plus for VMs and Druva for Office 365. Manage Linux server environments (RHEL, SUSE, CentOS, Ubuntu) and Windows Servers. Administer Mimecast email security, archiving, and continuity solutions. Handle On-Prem Active Directory (L3-level) including GPO, DNS, DHCP, user and group management. Collaborate with the security and compliance teams for audits, policy implementation, and security tool integrations. Support basic SIEM-related activities such as log source onboarding and integration with IT infrastructure components. Develop and maintain technical documentation and operational procedures. Microsoft Azure: VM provisioning, cost optimization, Azure AD integration, virtual networking, storage, monitoring, and automation (ARM/Bicep templates or equivalent). Amazon Web Services (AWS): Hands-on experience with EC2, IAM policies, S3, CloudWatch, and basic VPC/networking. Office 365 / Microsoft 365: Tenant management, Exchange Online, Teams, SharePoint, and Intune. Understanding of hybrid infrastructure models and integrating on-premises systems with cloud platforms. Exposure to cloud security best practices, backup strategies, and resource tagging/governance. Work with internal teams to track, assess, and remediate vulnerabilities across systems, applications, and cloud resources. Essential Skills Office 365 and SharePoint (L2-level) administration. Microsoft Azure and AWS (L2-level) operational experience. VMware administration and performance monitoring. FortiClient EMS management and policy deployment. Proficient in Windows and Linux server administration. Mimecast configuration and mail flow troubleshooting. Strong Active Directory management (L3-level). Experience with backup solutions: IBM Spectrum Protect Plus and Druva. Vulnerability management processes and remediation tracking. Basic knowledge of SIEM platforms (e.g., log source integration, onboarding, and verification). Strong problem-solving and documentation skills. Additional Desired Skills Industry certifications (AZ-104, AWS SysOps/Associate, VMware VCP, RHCSA/RHCE, ITIL). Experience with PowerShell or shell scripting for automation. Familiarity with Jira Service Management or other ITSM platforms. Basic knowledge of networking and firewall rules. Exposure to cloud cost management and resource optimization tools. Education Requirements & Experience Bachelor’s degree in computer science, Information Technology, or related field. 7–10 years of experience in systems and cloud administration roles. Strong background in hybrid cloud environments and enterprise IT infrastructure. Excellent communication and stakeholder management skills.

Posted 1 month ago

Apply

3 - 4 years

3 - 4 Lacs

Bengaluru

Work from Office

Naukri logo

locationsBangalore RMZ-ECO WORLDposted onPosted Yesterday time left to applyEnd DateJune 14, 2025 (28 days left to apply) job requisition idR177746 , India Job Family Group: Information Technology (IT) Worker Type: Regular Posting Start Date: May 15, 2025 Business unit: Projects and Technology Experience Level Experienced Professionals About The Role Whats the role As a Cyber Threat Prevention Advisor in the CyberDefence SecOps team, you'll join the Vulnerability team to manage and oversee vulnerability processes, ensuring they are trackable and measurable with robust tool support. Your team will lead the implementation of these processes within ServiceNow Security Operations (SecOps), establishing standard workflows and integrating them with IT service management processes executed by Line of Defence 1 within IRM. This role leverages market-standard tools and practices to streamline the architecture by reducing dependency on Collective. What youll be doing Asset Discovery: Set-up and lead adequate discovery of new Shell IT assets in Shell's legacy IT network, RES & Portfolio companies, Cloud environments and PCD and Retail environments. Ensure visibility in new areas such as Internet of Things and Cloud and investigate possibilities to keep track of IT assets. Automated Vulnerability Scanning: Maintain a portfolio of tools for automated vulnerability scanning with a focus on Business-Critical systems and systems that are available from the public Internet. Set-up regular scanning and make results available for further analytics in IRM investigation platform. Take appropriate action on vulnerabilities where required. Security Posture Reporting: Use the results from asset discovery, vulnerability scanning, penetration testing and attack simulation to provide an overview of vulnerabilities in Shell IT landscapes for different stakeholders including IRM LT and IDSO LT. Create specific reports for Business, Business Critical applications, IDSO service lines, External perimeters etc. Act as a Subject Matter Expert on implications of a vulnerability in an IT system and establishing the priority of applying security patches. Help creating prioritized overviews of Cyber vulnerabilities and putting these in a context of IT services and Business applications. Take mitigating actions coming out of identified threats or vulnerabilities either directly by the team or agree the actions with other parties in Shell. What you bring Bachelors degree in Computer Science, Information Technology, or related field 5-8 years of total experience in IT Security including at least 3-4 years of experience in Vulnerability Assessment Proficient in analysing network traffic using tools such as tcpdump or wireshark Strong experience in using open-source scanning tools such as nmap, nessus, metasploit and/or commercial tools such as Rapid7 or Qualys Knowledge in integrating Vulnerability Management into modern CI/CD Pipelines with 'shift-left' strategy Understanding of Network Security, Cloud Security, Endpoint Security, Application Security Understanding Cyber Threat Landscape and analyzing Threats from various sources. Assess new threats, rate threat per Shell ratings and collaborate with Threat team on new threat criticality Understanding of CVE id / CVSS score and metrics Familiar with application of Cybersecurity Benchmarks, NIST controls, PCI controls Lead security research proposals and Proof Of Concepts for Emerging Technologies and assessing Fit-For-Purpose Tools. Understanding of Cloud Security Posture Management (CSPM) Expertise in operating Application security tools like Rapid7 Appspider, Netsparker Knowledge on CI/CD pipeline able to understand the integration of security tools and guide the developers Understanding of Application security design and providing guidance to developers on secure design. Good understating of SAST/DAST concepts and process Knowledge of Mobile DAST scanning and vulnerabilities and remediation consultation Knowledge of Splunk, SecOps VR, basic querying and creating dashboards Additional Skills (Good to have): PCI-DSS Compliance Scan. SecOps VR Module in ServiceNow. Linux environment experience. Azure/AWS Cloud Console. Wiz.io tool knowledge. Advanced Splunk skills. What we offer You bring your skills and experience to Shell and in return you work with talented, committed people on one of the most important challenges facing our planet. Youll have the opportunity to develop the skills you need to grow in an environment where we value honesty, integrity, and respect for one another. Youll be able to balance your priorities as you become the best version of yourself. Progress as a person as we work on the energy transition together. Continuously grow the transferable skills you need to get ahead. Work at the forefront of technology, trends, and practices. Collaborate with experienced colleagues with unique expertise. Achieve your balance in a values-led culture that encourages you to be the best version of yourself. Benefit from flexible working hours, and the possibility of remote/mobile working. Perform at your best with a competitive starting salary and annual performance related salary increase our pay and benefits packages are considered to be among the best in the world. Take advantage of paid parental leave, including for non-birthing parents. Join an organisation working to become one of the most diverse and inclusive in the world. We strongly encourage applicants of all genders, ages, ethnicities, cultures, abilities, sexual orientation, and life experiences to apply. Grow as you progress through diverse career opportunities in national and international teams. Gain access to a wide range of training and development programmes. We'd like you to know that Shell has a > click here . - Shell in India Shell is a diversified energy company in India with 13,000 employees, and presence in Integrated Gas, Downstream, Power, Renewable and Upstream. Additionally, we have deep capabilities in R&D, digitalisation, and business operations. Our global strategy, Powering Progress, is designed to generate value for our shareholders, customers, and the wider society, and focuses on creating more value with less emissions. The strategy supports our purpose of providing more and cleaner energy solutions, with the aim of profitably transforming Shell into a net-zero emissions energy business by 2050. As India moves towards its target of net-zero emissions by 2070, Shell India aims to play a leading role in securing vital energy for today, while investing in, and helping to build, the energy system of the future through strategic investments in the country. Our Lubricants business serves over 50,000 consumers through a strong network of over 200 distributors, and operates an end-to-end value chain that spans conceptualization, development, and production at a world-class blending plant at Taloja. Through our 350-plus retail stations, we offer an integrated mobility experience including fuels, cafes, and convenience stores, with a prominent network of EV recharging facilities. Shell owns and operates a LNG re-gasification terminal at Hazira, Surat, with a capacity of 5 MTPA and a LNG truck-loading unit that plays a crucial role in helping meet Indias growing demand for gas across sectors. In 2022, Shell acquired Sprng Energy in a $1.55 billion deal to build an integrated energy transition business in the country. Sprng is a leading renewable energy company in India which develops and manages solar, wind, and hybrid power generation facilities and infrastructure. Our three capability centres across Bangalore and Chennai serve as a technology and innovation powerhouse for Shell globally, working as a delivery engine for core technical, digital, and finance processespioneering digital innovation and cutting-edge technologies across the energy sector. We also have strong academic partnerships and collaborations with leading universities and technology institutes to accelerate decarbonization efforts within the energy sector. We are committed to positively contributing to the communities in which we operate through programmes on STEM Education, Skilling, and Livelihood across India. We nurture and invest in startups developing initiatives focused on accelerating energy innovation through programs such as Shell E4 and Shell Eco-marathon. We also have strategic investments in new energy companies such as Husk Power, d.light, Orb Energy, and Cleantech Solar. DISCLAIMER: Please noteWe occasionally amend or withdraw Shell jobs and reserve the right to do so at any time, including prior to the advertised closing date. Before applying, you are advised to read our data protection policy. This policy describes the processing that may be associated with your personal data and informs you that your personal data may be transferred to Shell/Shell Group companies around the world. The Shell Group and its approved recruitment consultants will never ask you for a fee to process or consider your application for a career with Shell. Anyone who demands such a fee is not an authorised Shell representative and you are strongly advised to refuse any such demand. Shell is an Equal Opportunity Employer.

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies