Jobs
Interviews

830 Endpoint Security Jobs - Page 9

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 8.0 years

12 - 22 Lacs

hyderabad

Work from Office

Role: L2 SOC Location: Hyderabad Shift Timings: Rotational about alliantgroup alliantgroup is a professional services firm that provides tax consulting and compliance services to businesses in the United States. The company was founded in 2002 and is headquartered in Houston, Texas. alliantgroup services are focused on helping businesses claim tax credits and incentives that they are entitled to under various federal and state programs. These credits and incentives are designed to encourage businesses to invest in certain types of activities, such as research and development, energy efficiency, and hiring employees from certain disadvantaged groups. alliantgroup services include helping businesses identify and claim these credits and incentives, as well as providing guidance on compliance with the relevant regulations. alliantgroup is headquartered in Houston, Texas with additional offices located in Austin, Boston, Chicago, Indianapolis, New York, Irvine, Sacramento, Washington, D.C.; and Bristol and London in the U.K. More about our culture and why we love alliantgroup https://youtu.be/nM_9fXXwyrg https://youtu.be/erJobvthqRw alliantgroup India Talent Pvt. Ltd: alliantgroup started its operations in India in the year 2020 with a world-class office in Hyderabad to provide Tax, Advisory, Audit and Accounting services. alliantgroup India Talent comprises a team of skilled professionals who address the most pressing needs of U.S CPA Firms. We work with the best talent and ensure our clients get top quality services they need. We are currently a family of 1000+ employees. Our people and culture set us apart as a firm, and our team includes professionals from a diverse array of fields, including business, engineering, software development, law, and accounting. Alliant Cybersecurity Alliant Cybersecurity created a full-service cybersecurity consultancy for American businesses. We are technology and vendor agnostic and have a customizable security plan that can be made to fit any businesss needs. Our team has seasoned penetration testers, auditors, technologists, and security analysts to help with client’s needs whether it’s a one-time project or permanent outsourced cybersecurity to our Managed Security Operations Center. We are here as an extension of client’s team, offering straightforward solutions to everyday cybersecurity challenges especially in the moments that matter most. Role Overview Alliant Cybersecurity is seeking an experienced Level 2 analyst based in Hyderabad to help expand its Cybersecurity and Risk Advisory practice. This position primarily supports US-based customers and requires flexibility to work during US business hours. What You'll Do: Security Operations & Investigation: Lead deep-dive investigations of escalated L1 incidents Analyze data from multiple security tools and sources Participates to crisis management by providing support to the incident handler and the SOC Level 3 analysts Create reports and visualizations of security attacks Use Case Fine tuning, New Use case creation Tracks trends for metrics and reporting Works on the decrease of false positives Maintain the detection rules database Trending and correlation of monitored events to build new Indicators of Compromise (IOC), attack attribution and helping establish countermeasures increasing cyber resiliency Customer Engagement: Participates to recurring meeting with the customer as the technical referent. Provides recommendations or workarounds to the customer in order to reduce business impact Leads and participates to the continuous improvement of the service (detection level, process, operational procedures, service efficiency, service reporting) Supports the customer for the remediation of incidents Supports the SOC manager for the reporting of the activity. Continuous Improvement: Drive improvement plans and documentation Mentor L1 analysts Work independently on complex analyses Maintain process/procedure documentation Support CISO, CIO, and Head of SOC during incidents Lead continuous service improvement initiatives Coordination with ISMS core team to support ISMS activities and implantation strategies at the company. Education: Bachelor’s degree in computer science, Engineering, or other related discipline. Certifications: Professional Security certifications are a plus (CISSP preferred.) What are we looking for: Minimum 4 years of SOC experience Expert knowledge in: Computer Forensics Reverse Engineering IDS/SIEM/Log Management Threat Intelligence Malware Analysis EDR & Incident Response Vulnerability Management Essential Skills: Rigorous process adherence and attention to detail Strong time management and multitasking abilities Information security mindset Team leadership capabilities Excellent analytical and problem-solving skills Outstanding communication and documentation abilities Autonomous and self-organized Experience in tactical coordination during incidents What we offer: With us, there are always opportunities to break new ground. We empower you to take the organization to the next level with the versatile experience that you bring in. We trust you with responsibility early on and support you in all ways to make this organization as trusted partner to the customers and a great place to work for the employees. Join us and bring your curiosity to life!

Posted 3 weeks ago

Apply

10.0 - 15.0 years

13 - 18 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Threat Protection. Experience: 10 YEARS.

Posted 3 weeks ago

Apply

15.0 - 20.0 years

5 - 9 Lacs

gurugram

Work from Office

Role Description Leadership & Delivery Management - Lead end-to-end service delivery for TAC operations covering L1L3 support across regions. - Manage a large team of 50+ engineers (including Team Leads, SMEs, and Support Engineers). - Ensure adherence to SLAs, KPIs, and contractually agreed service levels. - Own incident, problem, and escalation management; act as the point of contact for high-priority customer escalations. - Drive operational excellence through automation, standardization, and process improvements. Customer & Stakeholder Management - Build strong relationships with client stakeholders (e.g., WatchGuard) for delivery governance, performance reviews, and continuous alignment. - Represent TAC leadership in executive discussions, QBRs, and incident post-mortems. - Ensure proactive communication and reporting on service delivery metrics, risks, and action plans. People & Performance Management - Hire, develop, and retain high-performing support engineers and leaders. - Mentor and coach team leads and SMEs to foster a high-performance culture. - Drive career progression, learning paths, and succession planning within the TAC team. - Conduct periodic performance reviews, workforce planning, and capacity forecasting. Quality & Transformation - Monitor and improve support quality through audits, root cause analysis, and corrective actions. - Champion initiatives around shift-left, knowledge management, and AI-powered support adoption. - Collaborate with Engineering, Product, and QA teams to drive product supportability and feedback loops. Technical Skills - Strong experience in leading TAC or technical support operations for network security products (WatchGuard, Fortinet, Palo Alto, Cisco, etc.). - Proven experience managing large, distributed teams in a 24x7 global support model. - Solid understanding of networking and security concepts (Firewalls, VPN, IDS/IPS, Endpoint Security, MFA, etc.). - Strong grasp of ITIL processes, ticketing systems (Salesforce, ServiceNow), and support tooling. - Exceptional leadership, stakeholder management, and communication skills. Nice-to-have skills Qualifications 15+ years of overall experience in IT operations/support, with 8+ years in people leadership roles, and 3-5 years in delivery leadership. Bachelors or Masters degree in Engineering, Computer Science, or IT. Certifications: ITIL, PMP, or Six Sigma; technical certifications (CCNP Security, NSE, PCNSE, etc.) are a plus. Exposure to managed services, professional services, or support delivery for OEMs or ISVs. Experience driving AI/ML-based support solutions, knowledge management systems, or customer experience transformation.

Posted 3 weeks ago

Apply

2.0 - 5.0 years

5 - 6 Lacs

hyderabad

Work from Office

Role Requirements: Strong experience in Linux and Windows server administration Experience with EDR/XDR/MXDR Provide daily support for office users, including hardware, software, and networking issues Oversee network configuration (firewalls, switches, VPN, Wi-Fi) Manage local backup solutions and disaster recovery procedures Ensure endpoint security, patch management, and antivirus compliance Support deployment and maintenance of corporate applications and collaboration tools Act as the primary IT point of contact for the Riyadh office, coordinating with the central IT team for escalations and projects Maintain IT asset inventory and documentation

Posted 3 weeks ago

Apply

6.0 - 10.0 years

17 - 20 Lacs

hyderabad, chennai

Work from Office

The Impact you will have in this role: Qualifications: Minimum of 6 years of related experience Bachelor's degree preferred or equivalent experience Talents Needed for Success:

Posted 3 weeks ago

Apply

8.0 - 10.0 years

22 - 27 Lacs

chennai

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do : 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Checkpoint Firewalls and VPN Experience : 8-10 Years.

Posted 3 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Security Information Event Management. Experience: 8-10 Years.

Posted 3 weeks ago

Apply

8.0 - 10.0 years

10 - 12 Lacs

hyderabad

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: PKI - Certificate Management. Experience: 8-10 Years. >

Posted 3 weeks ago

Apply

8.0 - 12.0 years

14 - 20 Lacs

navi mumbai

Work from Office

Direct Responsibilities Performs basic vulnerability scans using vendor utility tools. Monitors security audit and intrusion detection system logs for system and network anomalies. Investigates and/or escalates security violations, attempts to gain unauthorized access, virus infections that may affect the network or other event affecting security. Documents and reports event(s). Assists in providing engineering analysis, design and support for firewalls, routers, networks, and operating systems. Assists in performing product evaluations and recommends products/services for network security. Validates and tests basic security architecture and design solutions to produce detailed engineering specifications with recommended vendor technologies. Develops, tests, and operates firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools. Assists in the review and recommends the installation, modification or replacement of hardware or software components and any configuration change(s) that affects security. Assists in providing oversight and enforcement of security directives, orders, standards, plans and procedures at server sites. Responsible in Contributing to Internal InfoSec Assessments Responsible in Independently contribute to 3rd Party Supplier Vendor Risks Responsible in contributing to audit remediations & ensure compliance by effective risk mitigation plans. Liaison & driving external audits like ISO27001, SOC1, SOC2 & Client Audits. Executes vulnerability analysis and exploitation of applications, operating systems and networks. Identifies intrusion or incident path or method through testing and evaluation procedures. Contributes to the design, development and implementation of countermeasures, systems integration, and tools specific to cyber and information operations. Resolve complex malware and intrusion issues within the system as they occur. Monitors industry security updates, technologies, and practices on a continual basis to improve overall security management. Serves as an internal information security consultant on the standards, complex issues and best practices for the organization. Performs testing and analysis of complex software systems to determine both the functionality and intent of the systems. Builds and maintains operational and configuration documentation and creates and maintains diagrams. Works with Cybersecurity Risk and Security Operation teams to enhance the overall security posture of the enterprise. Contributing Responsibilities Work along with the team to ensure there is no impact to the performance. Also ensure 100% uptime for assets. Technical & Behavioural Competencies Knowledge on all security domains SIEM, TVM, IAM, Network Security, SOC and GRC Understanding of Networking & Systems Able to communicate across various business lines. Excellent oral, written and presentation communication skills. Specific Qualifications (if required) ITIL V3 Certified Should have basic knowledge of Security tools: Endpoint detection Response (EDR) , SIEM , Network monitoring tools, Email security tools etc Basic knowledge of programming like python, JavaScript, etc is desired. Experience with working in a high paced pro-active environment. Public Cloud skills Job Location - Airoli - Navi Miumbai

Posted 3 weeks ago

Apply

5.0 - 7.0 years

4 - 7 Lacs

kolkata, mumbai, new delhi

Work from Office

Key Responsibilities: Deploy and manage antivirus agents (e.g., Trend Micro) across all managed endpoints. Ensure real-time protection, policy enforcement, and consistent update of virus definitions. Administer full-disk encryption solutions and handle decryption requests. Investigate malware infections, quarantine events, and initiate remediation workflows. Review endpoint health and compliance dashboards and generate periodic reports. Work with EUC teams to enforce USB control, device lockdown, and application whitelisting. Assist L3 with policy rollouts, tuning signatures, and creating exception lists. Perform forensic artifact collection from infected endpoints as per IR protocols. Participate in root cause analysis of repeated infections and provide corrective action inputs. Support asset onboarding and offboarding from endpoint protection platforms. Key Skills & Certifications: 5 to 7 years of experience with Trend Micro Apex One, Symantec, or equivalent EDR/XDR platforms. Good understanding of endpoint hardening, patching, and encryption controls. Familiarity with secure device lifecycle management. Certifications: o Trend Micro Certified Professional Apex One o Microsoft Defender for Endpoint Certified CompTIA CySA+ optional

Posted 3 weeks ago

Apply

2.0 - 4.0 years

1 - 5 Lacs

kolkata, mumbai, new delhi

Work from Office

Monitor and triage DLP alerts in Forcepoint DLP or equivalent system. Perform initial validation of incidents related to sensitive data movement. Log, document, and escalate confirmed incidents to L2 teams. Support user awareness by identifying common data handling violations. Maintain documentation for DLP rule violations and provide MIS support. Key Skills & Certifications: Understanding of data classification and handling principles. Basic experience with DLP tools (Forcepoint, Symantec DLP, or similar). Knowledge of RBI/SEBI data protection regulations.

Posted 3 weeks ago

Apply

6.0 - 11.0 years

7 - 11 Lacs

gurugram

Work from Office

Lead and manage a team of L2/L3 Network Security Engineers providing TAC support for WatchGuards product portfolio (Firebox, AuthPoint, Cloud, Wi-Fi, Endpoint Security, etc.). - Drive daily operations, ensuring SLAs, KPIs, and customer satisfaction metrics are met or exceeded. - Act as an escalation point for complex customer issues and drive them to resolution in coordination with engineering and product teams. - Provide technical and operational guidance to team members, conduct regular case reviews, and ensure case hygiene and documentation standards. - Monitor team workload and performance; manage shift schedules, resource planning, and leave management to ensure 24x7 coverage. - Conduct regular 1:1s, team meetings, and performance evaluations. - Mentor and coach team members, and drive skill development initiatives. - Collaborate closely with cross-functional teams including Engineering, Product Management, and QA for bug follow-ups, product feedback, and enhancements. - Drive knowledge base creation, process improvements, and automation initiatives to improve support efficiency. - Participate in customer calls (critical accounts, escalations), representing TAC with professionalism and technical authority. Technical Skills - Strong knowledge of networking protocols (TCP/IP, DHCP, DNS, VPN, NAT, Routing, Switching). - Expertise in Network Security technologies including Firewalls, UTM, IDS/IPS, SSL VPN, MFA, and Endpoint Security Qualifications Bachelor's degree in Computer Science, Information Technology, or equivalent. - 6+ years of experience in technical support or TAC roles, with 2+ years in a leadership/supervisory position.

Posted 3 weeks ago

Apply

2.0 - 4.0 years

2 - 5 Lacs

bengaluru

Work from Office

MichBiz Services is looking for MIS Professional to join our dynamic team and embark on a rewarding career journey Oversee the design, implementation, and maintenance of the information systems, including hardware, software, and networking infrastructure Manage the database systems, including data backup and recovery, data security, and data integrity Develop and maintain procedures for managing the information systems and technology infrastructure, including disaster recovery plans, security policies, and user access controls Analyze the business processes and identify opportunities for improvement through the use of information systems and technology Collaborate with cross-functional teams, including IT, finance, and business operations, to integrate information systems and technology with other systems and processes Monitor system performance and provide technical support to end-users to ensure the smooth operation of information systems and technology Strong analytical and problem-solving skills Excellent communication and collaboration skills

Posted 3 weeks ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

bengaluru

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Endpoint Extended Detection and Response Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are seeking a Carbon Black EDR Administrator to manage and support the Carbon Black Endpoint Detection and Response (EDR) platform. The role involves administration, troubleshooting, and maintenance within a 24X7 support model, ensuring alignment with requirements and compliance standards. Roles & Responsibilities:-Administer and manage Carbon Black EDR platform configurations.-Implement changes as per change and service requests, including updates or fine-tuning security policies.-Troubleshot Carbon Black EDR issues related to remote upgrade failures, installation failures, and agents not reporting to the console.-Perform recertification campaigns for USB host exclusions annually, external mass storage exclusions yearly, and Carbon Black console users -Maintain and update standards and procedures, including runbooks, on a quarterly basis. Professional & Technical Skills: - Carbon Black EDR Administration- Security Policy Tuning- Troubleshooting EDR Issues- Compliance and Audit Support- Runbook Development- 8+ years of experience administering Carbon Black EDR platform.- Strong knowledge of endpoint security, policy management, and troubleshooting techniques specific to Carbon Black and also any other EDR tool - Experience with change management, recertification processes, and compliance auditing.- Ability to work in a 24X7 support schedule and handle operational tasks efficiently.- Excellent problem-solving skills and ability to collaborate with compliance and operations teams. Additional Information:- The candidate should have minimum 5 years of experience in Endpoint Extended Detection and Response.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 3 weeks ago

Apply

3.0 - 8.0 years

13 - 17 Lacs

gurugram

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Endpoint Extended Detection and Response Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a security analyst you will be responsible for Level 2 investigation of alerts\incidents, Platform management, Troubleshoot EDR/AV platform issues, Identify and implement Automation opportunities, collaborating with multiple teams, making key decisions, and providing solutions to problems for your team and across multiple teams leveraging our global delivery capability (method, tools, training, assets). Project Role Description:Level 2 EDR/AV delivery analyst of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Roles & Responsibilities:Assists in EDR platform design, testing and implementation.Deep expertise on EDR installation for data enrichment and policy configurations.Hands on experience in working with assets, especially supporting EDR deployment in SaaS environment.Troubleshoot EDR platform issues.Monitor the EDR infrastructure for capacity planning, system health, availability, and optimization.Identify and implement Automation opportunities in project.Review and apply any newly available and applicable updates on EDR components routinely.Troubleshoot issues with EDR sources or systems with vendor, and report system defects as needed.Coordinate & lead the technical discussions with Client/vendors.Identify root cause of EDR platform incidents.Provide day to day operational support for Endpoint Security solution having expert level knowledge of Fault Management like Identify and Classify issues.Candidate should have knowledge of backup and restoration for EDR configuration as per policy defined.Create various reports for remediation, change tracking and on demand basis.Very good Understanding for Endpoint Logs to investigate any incidents and suggest remediations. Technical Skills: - Must Have Skills: EDR/AV and Antivirus Skills (Traditional or Next-Gen)- Mid level experience with deployment, maintenance and operations of one or more major Endpoint Security Products example:McAfee, Symantec, TrendMicro, MS Defender, CrowdStrike, Carbon Black, Symantec etc.- Must have experience in designing Standard Operating Procedures.- Must have the understanding on ITSM process i.e. Incident & change management process.- Tools Proficiency:CrowdStrike, Defender for Endpoint Professional Attributes:- Strong communication and presentation skill- 3+ years of hands-on experience on EDR administration or development with good understanding on EDR/AV environments.- Problem Solver- Evaluate and validate the custom reports and log source groups as per business requirement.- Excellent time management and problem-solving skills- Experience:Minimum 3+ year(s) of experience is required Additional Information:- The candidate should have minimum 3 years of experience in Endpoint Extended Detection and Response.- Experience working in a diversified and virtual environment.- This position is based at our Gurugram office.- A 15 years full time education is required. Educational Qualification:BE / BTECH Qualification 15 years full time education

Posted 3 weeks ago

Apply

5.0 - 10.0 years

13 - 17 Lacs

gurugram

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Endpoint Extended Detection and Response Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will lead the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). You will be responsible for ensuring the successful execution of projects and managing the delivery team. Your typical day will involve overseeing project implementation, collaborating with multiple teams, making key decisions, and providing solutions to problems for your team and across multiple teams. Project Role Description:Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Roles & Responsibilities:Assists in EDR/AV platform design, testing and implementation.Deep expertise on EDR/AV installation for data enrichment and policy configurations.Hands on experience in working with assets, especially supporting EDR/AV deployment in SaaS / OnPrem environment.Troubleshoot EDR/AV platform issues.Monitor the EDR/AV infrastructure for capacity planning, system health, availability, and optimization.Verify custom reports, manage asset groups, policies and validate with clients.Maintain a close partnership with EDR/AV vendor on feature requests, upgrade planning, and product roadmap alignment.Perform supporting tasks such as system hardening, high availability configurations, and developing backup strategies.Identify and implement Automation opportunities in project.Review and apply any newly available and applicable updates on EDR/AV components routinely.Troubleshoot issues with EDR/AV sources or systems with vendor, and report system defects as needed.Coordinate & lead the technical discussions with Client/vendors.Identify root cause of EDR/AV platform incidents.Provide day to day operational support for Endpoint Security solution having expert level knowledge of Fault Management like Identify and Classify issues.Candidate should have knowledge of backup and restoration for EDR/AV configuration as per policy defined.Create various reports for remediation, change tracking and on demand basis.Very good Understanding for Endpoint Logs to investigate any incidents and suggest remediations. Technical Experience:Expert level experience with deployment, maintenance and operations of one or more major Endpoint Security Products, primarily McAfee alongwith Symantec, TrendMicro, MS Defender, CrowdStrike, Carbon Black etc.Must have experience on Endpoint Security management , policy management , Alert triage , managing EDR platform (admin) , compliance reporting.Must have experience in designing Standard Operating Procedures.Must have the understanding on ITSM process i.e., Incident & change management process.Good to have experience in the solution build and design documentation. Professional Attributes:Strong communication and presentation skillEvaluate and validate the custom reports and log source groups as per business requirement.At least 7+ years of experience in Information Security, Risk Management, Infrastructure Security and Compliance5+ years of hands-on experience on EDR administration, development and troubleshooting with good Understanding on EDR/AV environments. Mid-level expertise in UNIX, Linux, and Windows Project/program management experienceExcellent time management and problem-solving skills Professional & Technical Skills: - Must Have Skills: EDR/AV and Antivirus Skills (Traditional or Next-Gen)- Tools Proficiency:CrowdStrike, Defender for Endpoint- Strong understanding of cloud security principles and practices.- Experience with security frameworks such as NIST, ISO 27001, or CIS.- Familiarity with incident response and threat hunting methodologies.- Knowledge of compliance requirements related to cloud security. Additional Information:- The candidate should have minimum 7 years of experience in Endpoint Extended Detection and Response.- Experience working in a diversified and virtual environment.- This position is based at our Gurugram office.- A 15 years full time education is required. Educational Qualification:BE / BTECH Qualification 15 years full time education

Posted 3 weeks ago

Apply

15.0 - 25.0 years

13 - 17 Lacs

bengaluru

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Endpoint Extended Detection and Response Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitating the transition to cloud security-managed operations. You will engage in discussions to align security strategies with organizational objectives, ensuring that all security measures are effectively integrated into the cloud environment. Your role will also require you to stay updated on the latest security trends and technologies to enhance the overall security posture of the organization. Roles & Responsibilities:--Demonstrated expertise in the endpoint security domain with a minimum of 10 years of overall experience, including at least 5 years of hands-on experience with the CrowdStrike Falcon EDR platform.-Endpoint Security Platform:Detection, Quarantine & response handling, On-Demand Scans (ODS), Sensor and prevention policy configuration & General platform administration and operational tasks.-Device Control:USB policy management and enforcement, Device exception handling and approval processes, Monitoring and reporting of device usage & Device Control administration and troubleshooting.-Firewall Management:Creation and management of firewall policies, Configuration of rule groups and policy sets & Troubleshooting firewall-related issues.-File Vantage Module:Policy creation and management, Implementation of rule suppression processes & Monitoring and alert tuning.-The candidate must have hands-on experience with the ServiceNow ticketing platform and a basic understanding of the JIRA storyboard. Professional & Technical Skills: - Must To Have Skills: Proficiency in Endpoint Extended Detection and Response.- Good To Have Skills: Experience with cloud security frameworks and compliance standards.- Strong understanding of security architecture principles and best practices.- Experience in risk assessment and vulnerability management.- Familiarity with incident response and threat intelligence processes. Additional Information:-The candidate must have a minimum of 5 years of hands-on experience with the CrowdStrike Falcon EDR platform.-This position is based at any ATCI office location.-A minimum of 15 years of full-time education is required. Qualification 15 years full time education

Posted 3 weeks ago

Apply

15.0 - 20.0 years

13 - 17 Lacs

noida, hyderabad, chennai

Work from Office

Role Overview: We are looking for an experienced Solution Architect specializing in End User Computing (EUC) to join our dynamic IT team. The ideal candidate will have strong hands-on experience with technologies such as Microsoft Intune, Nexthink, VDI management, AI, Automation etc. The candidate will play a critical role in designing, implementing, and optimizing secure, scalable, and efficient end-user environments for a global workforce. You will architect end-to-end digital workplace strategies that support seamless collaboration, enhanced productivity, and exceptional employee experiences, whether users are in-office, remote, or hybrid. This is a vital role that combines deep technical knowledge with a passion for improving user experience, enabling flexible work, and integrating emerging tools like AI, analytics, and automation into the digital environment. Key Responsibilities: Design and implement end-user computing solutions including but not limited to Intune, Nexthink and Virtual Desktop Infrastructure (VDI) etc. Architect and deploy automated workflows to improve EUC operations and management. Provide strategic guidance and technical leadership for EUC-related projects and initiatives. Analyze enterprise trends and future business needs to develop architecture roadmaps, service blueprints, and endpoint standards. Collaborate with cross-functional teams to deliver scalable and secure desktop and device management solutions. Ensure compliance with organizational security policies and standards. Deliver high-quality documentation for architecture designs, configurations, and operational processes. Required Skills & Experience: Minimum 15 years of overall IT experience with at least 5 years in a solution architect role focused on end-user computing. Hands-on expertise with Microsoft Intune and modern device management strategies. Experience using Nexthink for DEX monitoring and analytics. Use tools like Nexthink, Lakeside, SysTrack, or Microsoft Endpoint Analytics to build dashboards and insights. Strong background in VDI environments design, deployment, and support. Proven ability in automation of EUC tasks using scripting and AI-based tools. Strong troubleshooting and analytical skills. Excellent communication and documentation skills.

Posted 3 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SPLUNK Security Analytics. Experience: 8-10 Years.

Posted 3 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: ForgeRock Identity Manager.Experience: 8-10 Years.

Posted 3 weeks ago

Apply

8.0 - 13.0 years

12 - 14 Lacs

bengaluru

Work from Office

Solution Architect (Presales for Services) Company Name: Inflow Technologies Company Website: https://inflowtechnologies.com/ Company details: Founded in 2005, Inflow Technologies is a niche player in the IT Infrastructure Distribution Services industry providing Value Added Distribution in Networking, Cyber Security, Unified Communications and Collaboration, AIDC, Surveillance, Server, Storage & Software related Products & Services in India/South Asia. Inflow is headquartered in Bangalore with presence across 20+ locations, enabling resellers to design, deploy and adopt IT Infrastructure solutions to facilitate their customer needs. This initiative, supported by a strong technical team of 120+ certified resources, assists channel partners throughout their sales cycle. Inflow has an annual run-rate revenue of USD 700+ Million. Location: Bangalore Mode of Working: Work From Office Days of Working: 5 Days a week Responsibilities Position Overview: We are seeking an experienced and results-driven Project Manager to lead and oversee projects from initiation to completion. The ideal candidate will manage project scope, resources, timelines, and budgets while ensuring stakeholder satisfaction and project success. Key Responsibilities: Presales & Solution Design Act as a technical expert in Security, Networking, and Mobility for IT services solutions. Engage with customers and channel partners to understand business challenges and technical requirements. Design customized service solutions aligned with customer needs. Collaborate with OEMs, service delivery, and project teams for developing solution proposals. SOW & Effort Estimation Prepare detailed Statement of Work (SOW) documents clearly outlining deliverables, timelines, and responsibilities. Conduct effort estimations based on complexity, scope, and resource requirements. Define delivery models (onsite/offshore/hybrid) and SLAs as per project scope. Bid Management & Deal Structuring Own and manage the technical response for RFPs, RFIs, and RFQs. Collaborate with internal stakeholders (sales, delivery, legal, and finance) for deal structuring and pricing. Build compelling proposals that articulate business value and technical benefits. Stakeholder Collaboration Work closely with the Sales team to position services effectively and drive revenue. Interface with customers to provide clarity on solutions, approach, and service capabilities. Maintain strong relationships with OEM partners to stay updated on technology trends and solution offerings. Knowledge Management & Enablement Continuously enhance domain knowledge on latest Security, Networking, and Mobility trends and services. Contribute to development of reusable solution templates, case studies, and delivery frameworks. Experience: 8+ Yrs Skills Needed Required Skills & Experience: 8+ years of experience in Presales/Solution Architect roles within IT Services. Strong hands-on knowledge in: Cybersecurity technologies: Firewalls, SIEM, Endpoint Security, Identity & Access Management. Networking: SD-WAN, LAN/WAN, Switching/Routing, Wireless. Enterprise Mobility: MDM, BYOD strategies, secure access management. Demonstrated experience in writing SOWs, designing solutions, and creating effort estimates. Deep understanding of ITIL processes and service delivery life cycle. Proven experience handling complex, multi-technology deals. Excellent presentation, communication, and stakeholder management skills. Preferred Certifications (Nice to Have): CCNP / CCIE / CISSP / CISM / CEH / CompTIA Security+ TOGAF / ITIL Foundation / PMP OEM-specific certifications (Cisco, Fortinet, Palo Alto, etc.) Key Attributes: Strategic mindset with attention to detail. Ability to work under tight deadlines and manage multiple proposals simultaneously. Team player with high ownership and accountability. Interview process 1st Call, 2 Rounds Virtual and Face to Face Any other additional information Certification: CCNP / CCIE / CISSP / CISM / CEH / CompTIA Security+ Commitment Clause of 3 years ATGS official Email Nived@atgs.co.in ATGS SPOC Contact No. 7411926370

Posted 3 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Saviynt. Experience: 8-10 Years.

Posted 3 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Threat Protection. Experience: 8-10 Years.

Posted 3 weeks ago

Apply

15.0 - 20.0 years

15 - 20 Lacs

bengaluru

Work from Office

Project Role : Solution Architect Project Role Description : Translate client requirements into differentiated, deliverable solutions using in-depth knowledge of a technology, function, or platform. Collaborate with the Sales Pursuit and Delivery Teams to develop a winnable and deliverable solution that underpins the client value proposition and business case. Must have skills : Solution Architecture Good to have skills : NAMinimum 18 year(s) of experience is required Educational Qualification : 15 years full time education Summary :The individual will be responsible for developing Network Security Practice within the space. While the role envisages business development and solution architecture responsibilities, the focus would be more on growing top-line and creating innovative solutions from the existing network security portfolio and alliance partners. The role would also support Client Management, Increasing the Sales Pipeline, and managing P&L for their respective accounts/portfolio through ideas of business transformation. Roles & Responsibilities:-Business Development and Relationship Management for clients, such as Service Providers -Identify key customer requirements and define the right solution to meet these requirements.-Track and solve technical issues with customers.-Solutioning of IT and Network CyberSecurity opportunities, cultivate, allocate and coordinate resources to improve the delivery of projects with a high success rate.-Develop and strengthen customer relationships by organizing various marketing activities. Professional & Technical Skills: -Responsible to craft differentiating solutions in Telco Security domain-Ability to drive solutions across system security design, architecture, consulting, training, implementation & auditing of various cybersecurity domains.-Well-versed in the cyber security domains across host and network solutions, including security technologies ranging from the endpoint to the cloud, e.g., EDR, XDR, Host and Network Intrusion Prevention Systems, Gateway Protection Systems, Data Loss Prevention Systems, etc.-Be the Lead Solution Architect and drive activities such as deal qualification, effort estimations, pricing validation, CCI adherence, internal approvals, etc., for the proposed client solution-Follow trends and market requirements to define product strategy in specific areas.-Promote Organizations Network Services offering and solutions in the market. Expertise in Endpoint Security, Data Protection, Vulnerability Assessment & Management, Network & Host IPS, Email & Web Security, Cyber threat intelligence & deception technologies including honeynet, Dark Web monitoring & research, Mobile device security and mobile device management. -Working closely with Region Sales Team to consistently achieve sales targets.-Define solution/product sales strategy, roadmap and implement through frequent communications with customers.-Prepare bidding materials (technical proposal, soc, quotation) for tenders-RFI-RFQ-RFP responses etc.-General solutioning skills (bring solution components together with all contributing experts e.g; Technology, Analytics, Digital, MC etc.-Innovation catalyst mindset-Development of new industry solutions based on market needs. Managing internal business operations processes (myISP, MMS, MME, MMR etc.) Tracking business/project KPIs and delivering the Sales/Revenue/CCI meeting/exceeding the target.-Should be an Industry/business-oriented person from the CMT cyber security industry, with Key experience in Solutions/Presales/design or delivery of Cybersecurity solutions in the CMT industry OR Enterprise OR Security OEMs in the in this industry. Should have an understanding and experience of networks, that shall be relevant for clients. Identifying existing service offerings that can be leveraged in the India, ASEAN and APAC markets.-Understanding of the business functions and processes within the industry-Identifying emerging market and industry trends and issues, potential game changers to the current business models -Internal Collaboration:Working closely with project teams to ensure successful outcomes for the clients-Deal Shaper Good understanding of deal construct, commercial strategy, exploiting established alliances and adding new ones as appropriate Additional Information:-A minimum of 20-25 years of experience in developing and delivering Cybersecurity solutions in Telco and Enterprise landscape -This position is based at our Bengaluru office.-A 15 years full time education is required. Qualification 15 years full time education

Posted 3 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

hyderabad

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Security Architecting. Experience8-10 Years.

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies