Jobs
Interviews

3 Enterprise Computing Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 9.0 years

5 - 9 Lacs

bengaluru

Work from Office

Educational Requirements Bachelor of Engineering Service Line Data & Analytics Unit Responsibilities We are looking for smart, self-driven, high energy people with top notch communication skills, intellectual curiosity and passion for technology in Machine Learning Space. Our analysts have a blend of in-depth domain expertise in one or more areas (Financial Services), strong business acumen and excellent soft skills & Exposure to Technology. Preferred Skills: Technology->Infrastructure-DataCenter->enterprise computing ( citrix mosaic RFID VMware VDI support etc) Technology->Data Science->Machine Learning .

Posted 6 days ago

Apply

3.0 - 10.0 years

0 Lacs

thiruvananthapuram, kerala

On-site

You are seeking an Endpoint Security Specialist with 3 to 10 years of experience and a strong understanding of Endpoint Security solutions, including Anti-Virus (AV), Extended Detection and Response (XDR), and Endpoint Detection and Response (EDR). In this role, you will be responsible for designing, implementing, configuring, and maintaining endpoint security platforms and associated policies. Your expertise in enterprise computing and endpoint architecture design, along with hands-on experience in triaging malware and responding to security incidents, will be crucial for success. Your key responsibilities will include: - Designing, implementing, and maintaining endpoint security solutions (AV, XDR, EDR) to safeguard against evolving cyber threats. - Developing and enforcing endpoint security policies across the organization. - Collaborating with cross-functional teams to ensure alignment of endpoint security with overall cybersecurity strategies. - Monitoring and triaging security incidents, investigating potential threats, and taking necessary remediation actions. - Leading Security Incident Response (SIR) efforts, including malware analysis and threat containment. - Continuously evaluating and enhancing the security posture of endpoint systems. - Staying updated on the latest trends, vulnerabilities, and attack techniques in endpoint security. To qualify for this role, you should have: - Strong experience with endpoint security technologies such as Anti-Virus (AV), Extended Detection and Response (XDR), and Endpoint Detection and Response (EDR). - Proven experience in designing, implementing, and managing endpoint security solutions. - A solid understanding of enterprise computing environments and endpoint architecture design patterns in cybersecurity. - Experience in malware triage, investigation, and Security Incident Response. - Excellent analytical and problem-solving skills. - Strong communication skills and the ability to work effectively in a collaborative team environment. - Relevant certifications (e.g., CEH, CISSP, CompTIA Security+, etc.) are a plus. Key skills required for this role include Endpoint Security, Enterprise Computing, and Endpoint Architecture Design. About UST: UST is a global digital transformation solutions provider that has been partnering with leading companies worldwide for over 20 years. With a focus on technology, people, and purpose, UST works with clients from design to operation, embedding innovation and agility into their organizations. With a workforce of over 30,000 employees across 30 countries, UST influences billions of lives through its boundless impact and domain expertise.,

Posted 1 week ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Pune, Maharashtra, India

On-site

Cradlepoint is seeking a highly motivated Security Vulnerability Analyst to join our dedicated security team. This pivotal role is responsible for the end-to-end vulnerability management practice, encompassing identifying, researching, prioritizing, remediating, and mitigating vulnerabilities. You will work alongside a highly skilled and diverse team, ensuring the continuous security and integrity of our information assets. What You Will Do: Key Responsibilities Perform daily operations and maintenance of vulnerability scanning tools and their supporting infrastructure. Register assets in the scanning tool and execute scans according to the agreed schedule. Conduct comprehensive Vulnerability Management , including supporting scan tools, executing vulnerability scans, performing CIS Hardening , conducting analysis, and recommending/tracking mitigations. Monitor ticket and email queues for incoming Vulnerability & Pen test requests. Monitor email/web-based reporting of vulnerabilities from external reporters. Responsible for reporting and tracking the completion status of vulnerability assessment scans. Perform periodic validation of assets through the Central Depository. Perform, review, and analyze security vulnerability data to identify applicability and false positives, recommending corrective actions for mitigation. Publish reports on identified security vulnerabilities and control gaps found during security control reviews, as per defined schedules. Manage tracking and remediation of vulnerabilities by leveraging agreed-upon action plans and timelines with responsible technology developers and support teams. Overall responsibility for the governance and tracking of the Vulnerability Remediation action plan . Plan and coordinate vulnerability scanning schedules with customers and stakeholders. Assist in metrics development and reporting for vulnerability management activities. Participate in the out-of-hours on-call rotation , providing technical support to the business for major and critical incidents. Required Qualifications Education: Bachelor's Degree (B.E./B.Tech) in Computer Science or a related field. Solid understanding of security controls (e.g., Access Control, auditing, authentication, encryption, integrity, physical security, and application security). Working knowledge of scanning tools such as Nessus, Qualys, Netsparker, Fortify, etc. Strong understanding of enterprise, network, system, and application-level security issues. Understanding of enterprise computing environments, distributed applications , and a strong understanding of TCP/IP networks , including available security controls (technical & process controls) for respective layers. The ability to provide support after normal business hours . The ability to work constructively under pressure . Ability to work both in a team as well as individually . Strong Knowledge Sharing and Collaboration skills . Ability to deliver results and meet customer expectations . Excellent communication skills; English is a must.

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies