Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
2 - 5 years
3 - 7 Lacs
Mumbai
Work from Office
Position - Digital Forensic Analyst Role Summary As an Incident Responder, you are expected to investigate computer-related crimes and cyber security incidents within an organization. You are expected to validate the incidents, identify the root cause, and contain and eradicate the incidents and their traits. You are expected to be proficient in a wide range of computer investigation and forensic tools. Engineering Graduate with 2+ years experience working in IT Security and relevant areas like Security Operations Center, Incident Response, Threat Intelligence, Digital Forensics, Malware Analysis, etc. Activities: The main responsibility of the Incident Responder is to use computer response and forensic tools to examine and analyze electronic media in suspected computer hacking cases, insider threats or malware incidents. Provide response to any IT Security threats, incidents, or cyber-attacks on your organization Provide support in incidence response, analysis, and reporting of cyber threats affecting organizational networks Maintain an understanding of the current vulnerabilities, response, and mitigation strategies used in cyber security operations Provide support to high technology investigations in the form of computer evidence seizure, computer forensic analysis, data recovery, and network assessments Strong knowledge of enterprise detection technologies and processes (Advanced Threat Detection Tools, IDS/IPS, Network Packet Analysis, Endpoint Protection) Analyze and report cyber threats as well as assist in deterring, identifying, monitoring, investigating, and analyzing computer network intrusions To validate the actionable, malware, threat advisories, vendor security bulletins, threat intelligence information, etc., may need to be analyzed. Malware reverse engineering to identify IOC Tools such as Encase, FTK, and Autopsy. Infrastructure and network architecture security Basic programming skills - Java, PHP, shell programming, C, etc. Requirements Engineering graduate with 2+ years of incident response and forensics experience. Knowledge of Forensic and eDiscovery tools such as EnCase, Autopsy, FTK, sysinternals, etc. Should have hands-on experience with utilizing SIEM/EDR/ such as QRadar etc. and help team in investigating security issues and/or complex operational issues Practical experience using computer operating systems such as MS Windows, UNIX, and Linux Detail analytical capabilities to identify. Defense evasion techniques - Malware defense evasion and detection Understanding core Windows processes Persistence - Malware persistence detection and analysis Finding and Analyzing Malicious WMI Event Consumers . A problem-solving mindset Working as part of a team, you need to be a good team player The ability to react quickly and efficiently under pressure Good communication skills as you will be reporting regularly to management and other stakeholders Knowledge and understanding of network protocols, network devices, multiple operating systems, and secure architectures Technical Incident Response Certification like CHFI, CEH, etc.
Posted 3 months ago
5 - 6 years
10 - 14 Lacs
Thane
Work from Office
Job Summary: We are looking for an experienced Senior Linux Administrator to manage and optimize our hybrid cloud and on-premises infrastructure. The ideal candidate should have deep expertise in Linux administration, strong networking skills, and a solid understanding of security best practices. You will be responsible for maintaining system reliability, performance tuning, automation, and ensuring a secure infrastructure across both cloud and on-premises environments. Key Responsibilities: Linux Administration: Deploy, configure, manage, and troubleshoot Linux servers in both on-premises and cloud environments. Hybrid Cloud Management: Manage and optimize workloads across cloud platforms (AWS, Azure, or GCP) and on-premises data centers. Networking: Configure and troubleshoot network components, including firewalls, VPNs, load balancers, and routing in a hybrid environment. Security Compliance: Implement security best practices, harden Linux systems, conduct audits, and ensure compliance with organizational policies. Automation Scripting: Use automation tools (Ansible, Terraform, Puppet, or Chef) and scripting (Bash, Python) to improve efficiency and reduce manual work. Monitoring Performance Tuning: Set up monitoring tools, analyze logs, and optimize system performance. Backup Disaster Recovery: Implement backup strategies and disaster recovery plans for business continuity. Collaboration Documentation: Work with cross-functional teams, document system changes, and provide training to junior engineers. Required Qualifications: Experience: 10+ years in Linux system administration in hybrid cloud and on-premises environments. Linux Expertise: Strong hands-on experience with RHEL, CentOS, Rocky 8/9, Ubuntu, or other Linux distributions. Cloud Platforms: Proficiency in AWS and GCP for hybrid infrastructure management. Networking: Deep knowledge of TCP/IP, DNS, DHCP, VLANs, firewalls, VPNs, and load balancers. Security: Experience with firewalls, IDS/IPS, access control policies, and system hardening. Automation Scripting: Expertise in Bash, Python, and automation tools like Ansible, Terraform, Puppet, or Chef. Monitoring Tools: Experience with Prometheus, Grafana, Nagios, Zabbix, or similar. Storage Backup: Experience with RAID, NFS, SAN, NAS, and backup tools. Certifications (Preferred): RHCE, AWS Certified SysOps Administrator, CCNA/CCNP, or CISSP. Soft Skills: Strong problem-solving and troubleshooting abilities. Excellent communication and documentation skills. Ability to work independently and collaboratively in a team. Strong attention to detail and security awareness.
Posted 3 months ago
10 - 15 years
20 - 27 Lacs
Bengaluru
Work from Office
ng-non-bindable> Description Security Product Architect We are seeking a talented and experienced Security Product Architect to join our team. The Security Product Architect will play a crucial role in designing and implementing robust security architecture for our Unified SASE Service. This individual will help translate existing and emerging threat vectors into engineering solutions. You will have - Master s degree in computer science , or equivalent work experience. 10 to 15 years of software engineering experience, with significant experience in developing security products. You will definitely possess these skills - Proficiency in designing secure architectures for applications, networks, and systems. Hands on experience with Linux based software development using C/C++/Java/Python/Go. Strong background in networking and distributed systems. Experience in Web Security, Secure Architecture/Code Reviews. Good understanding of existing and emerging security threat landscape. Experience in designing engineering solutions for emerging threats. Subject matter expertise in cybersecurity and software development. Experience with PKI, OpenSSL, IDPS, Secure Web Gateways, CASB and DLP. Experience with securing cloud environments (e.g., AWS, Azure, Google Cloud) including knowledge of cloud security frameworks and tools. Deep understanding of network protocols, firewalls, VPNs, IDS/IPS, and network segmentation. Familiarity with SIEM, log management, threat detection, and incident response processes. Experience in analyzing and visualizing large security related data sets. Experience with opens source security packages like Suricata, ModSecurity and OWASP. Self-starter with strong communication and leadership skills. Bird s eye view of your role - Map current and emerging threats into existing software architecture and identify architectural gaps in protecting enterprises against an evolving security threat landscape. Derive the observability and usability requirements from a security perspective to provide end customers with a seamless user experience. Help define workflows for managing security signatures from various vendors, identifying gap in existing signatures and building internal signature repository. Architecture and Code reviews to identify security gaps and to drive security awareness throughout the engineering organization. Drive the discussion with Product Management and Customers on secure architecture, CVEs and related security aspects. Work closely with support to help address customer issues related to security vulnerability . Employee Value Proposition (EVP): At Aryaka, we offer a dynamic and innovative work environment where you will have the opportunity to make a significant impact in the network security industry. Our commitment to cutting-edge technology and customer satisfaction provides a platform for continuous learning and professional growth. Who Are we - Aryaka is the leader in delivering Unified SASE as a Service, a fully integrated solution combining networking, security, and observability. Built for the demands of Generative AI as well as today s multi-cloud hybrid world, Aryaka enables enterprises to transform their secure networking to deliver uncompromised performance, agility, simplicity, and security. Aryaka s flexible delivery options empower businesses to choose their preferred approach for implementation and management. Hundreds of global enterprises, including several in the Fortune 100, depend on Aryaka for their secure networking solutions. For more on Aryaka, please visit www.aryaka.com Why Aryaka - We have won Great Places to Work World-Wide for 4 consecutive years because we have an amazing company culture that is inviting, collaborative, supportive, and inclusive to our employees. We encourage our employees to expand their knowledge base and provide the tools to help them get there. We are always innovating and looking at ways to improve and expand, and we listen to our employees and their ideas. We have an amazing group of very respected Thought Leaders who are always open to mentoring. We consider ourselves great Corporate Citizens which we show through our Women In Technology Program and AryakaCares Program as well as others. Our Benefits are World-Class and we offer a flexible work structure to allow you to maximize on your work/life balance. As Aryakans , we are 100% dedicated to being an equal opportunity employer and supporter of Diversity, Inclusion, and Belonging. Third-Party Agency Notice : Aryaka does not accept unsolicited resumes from 3rd party agencies. Should any agency send a resume to any employee within Aryaka without explicit invitation, the resume will be considered a gift, and no fee will be paid. All agencies must have a signed contract from Talent Acquisition management prior to any engagement.
Posted 3 months ago
4 - 8 years
9 - 14 Lacs
Bengaluru
Work from Office
Overview Join our leading AI-driven Global Supply Chain Solutions Software Product Company recognized as one of Glassdoor s Best Places to Work. In this pivotal role, you will be responsible for scanning and securing our global infrastructure, spanning data centres and cloud environments. As a key member of our centralized information security team, your expertise will drive the continuous enhancement of our security posture through proactive vulnerability management, cloud security posture improvements, and advanced automation. Scope : Global Coverage: Assess and remediate vulnerabilities across assets in multiple regions and data centers worldwide. Centralized Role: Act as a strategic member of the information security team, influencing secure architecture and control implementations across the organization. Automation Efficiency: Leverage automation and scripting to streamline vulnerability scanning, threat analysis, and remediation processes integrated within our DevSecOps pipeline for improved efficiency and rapid incident response. What you will Do: Vulnerability Threat Management Conduct comprehensive vulnerability scans on both on-premise and cloud networks using tools such as Retina, Qualys, Nessus, and Nexpose. Discover and continuously monitor global cloud assets to detect security vulnerabilities and misconfigurations. Analyze scan results, document findings, and develop actionable remediation plans to address identified risks. Publish periodic vulnerability status reports to senior management, tracking progress on remediation efforts. Identify and assess potential threats to the organization s infrastructure and information assets. Define, implement, and monitor security architecture and controls across on-prem and cloud environments. Collaborate with internal teams to ensure compliance with security frameworks (e.g., NIST, ISO 27001/2, SSAE-18) and regulatory requirements. Automation Develop and maintain automated scripts (using Python, PowerShell, Bash, etc.) to execute regular vulnerability scans and parse outputs efficiently. Implement automation tools for prioritizing vulnerabilities, generating alerts, and triggering remediation workflows to minimize manual intervention. Leverage real-time data aggregation and analytics to build dynamic dashboards, delivering actionable insights and detailed metrics for management reporting. Incident Response Continuous Improvement Participate in and support the incident response team to address emerging security events promptly. Evaluate, select, and integrate new security tools to enhance threat detection and prevention capabilities. Proactively identify security gaps and recommend enhancements to fortify the overall security posture. Prepare and present comprehensive system security reports by analyzing and summarizing security data trends. What are we looking for: Experience Education Experience: 6+ years in Vulnerability Management, Vulnerability Assessment Penetration Testing (VAPT), or a closely related field. Education: Bachelor s degree in information security, Information Technology, Computer Science, or a related field. Certifications: Preferred certifications include CISM, CEH, CISSP, or equivalent. Technical Skills Vulnerability Threat Management: Proven expertise in utilizing vulnerability management tools (e.g., Retina, Qualys, Nessus, Nexpose) to assess and remediate security risks. Network System Security: Strong experience in architecting and implementing secure network designs, including firewalls, IDS/IPS, SIEM, and endpoint protection. Automation Scripting: Proficient in developing automation scripts (Python, Bash, PowerShell) and integrating security processes within CI/CD pipelines. Security Frameworks: Familiarity with industry-standard frameworks and regulatory requirements such as NIST, ISO 27001/2, and SSAE-18. Soft Skills Excellent written and verbal communication skills, with the ability to distill complex security issues into clear, actionable recommendations. Detail-oriented and analytical with a strong aptitude for interpreting data trends to manage risks effectively. Proven ability to work collaboratively with cross-functional teams in a fast-paced, dynamic environment. Shift Flexibility Ability to work the 2nd shift to overlap with global customer hours and ensure continuous security coverage. Our Values If you want to know the heart of a company, take a look at their values. Ours unite us. They are what drive our success - and the success of our customers. Does your heart beat like oursFind out here: Core Values All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.
Posted 3 months ago
4 - 10 years
12 - 13 Lacs
Gurgaon
Work from Office
about the role Primary responsibility is to provide Tier 2 network security support of Firewall/Proxy/LB environments supporting multiple customers. This position interfaces with external clients and is highly visible. Responsible for general architecture, initial configurations and subsequent management of one or more Firewall/VPN based/IPS/Proxy/DLP/Sandbox systems. Provide 24x7 production support to accept, operate and maintain security elements. There are off shift activities and pager rotation. Troubleshoot end to end network security issues and find the root cause. Conduct risk assessments on all work performed. Conduct daily, weekly, and monthly proactive maintenance activities including configuration changes and version upgrades as per business directive. Good to have certification on security domain like ITIL,Firewall, Proxy, Cloud Security etc. Good written and verbal communication skills / fluent English. 4-10 years of experience. about you Leading Industry security Certifications (CCSA, CCNP Security, PCNSA/PCNSE, BCCPA, ZCCA-IA, ZCCP-IA, ZCCA-PA) Proxy:- Zscaler (ZIA, ZPA, ZDX)- PAC file, NSS, MCAS, Various Policy Types- URL Cloud app, DLP, Sandbox, Advance Cloud Firewall etc. APP Segment, APP Connector. Blue Coat Proxy (SG-800,900, 9000 )- Policy, PAC File Firewalls:- Checkpoint advanced Firewall solution design - implementation and administration. Check Point Security Gateway on R81/80 Checkpoint UTM (2073,3073, 3075) Secure Platform and VSX platform, Juniper SSG (140, 520, 550) and SRX (100, 210, 240), . Palo Alto- (5220, 5240, 5310) (Firewall, Panaroma, Prisma, Global Protect) IDP:- McAfee IPS Load Balancers:- F5 (1600,3600,3900,6400) Event Management:- HP Arc Sight SIEM Express Logger (7200) UTM:- Fortinet (80,110,300, 1000, 1500) department Global Delivery Operations Orange Business is a network and digital integrator that understands the entire value chain of the digital world, freeing our customers to focus on the strategic initiatives that shape their business. Every day, you will collaborate with a team dedicated to providing consistent, sustainable global solutions, no matter where our customers operate. With over 30,000 employees across Asia, the Americas, Africa, and Europe, we offer a dynamic environment to develop and perfect your skills in a field filled with exciting challenges and opportunities.
Posted 3 months ago
3 - 6 years
5 - 8 Lacs
Chennai, Pune, Delhi
Work from Office
Helping careers take flight. Reshaping an industry. Enable your career to be Made on Duck Creek. WHO WE ARE Authenticity, purpose, and transparency are core to Duck Creek, and we believe insurance should be there for individuals and businesses when, where, and how they need it most. Our market-leading solutions are available on a standalone basis or as a full suite, and all are available via Duck Creek OnDemand. With more than 1,000 successful implementations to date, Duck Creek removes the IT burden for insurers so they can focus on the business of insurance. If working in a fast-paced, rapidly evolving company that is transforming one of the world s oldest and largest industries sounds exciting, let us know. We are excited you are considering Duck Creek as a future employer and hope you decide to join The Flock ! To learn more about us, visit www.duckcreek.com and follow us on our social channels for the latest information - LinkedIn and Twitter . WHAT YOU LL DO The Sr. Network Administration Analyst is responsible for a variety of important network tasks within Duck Creek Technologies. They will work closely with the Network Engineer team in supporting, maintaining, and monitoring network infrastructure to meet the needs of the company. The Sr. Analyst will have both demonstrated experience with supporting and maintaining a variety of network infrastructure both on-premises and in cloud environments. Installation and Configuration: Assisting network engineers in configuring and installing network devices; including switches, routers, wireless controllers, and firewalls. Cloud Support: Assisting network engineers with the implementation and support of Azure network infrastructure, including subnets, Virtual Networks (VNets), Network Security Groups (NSGs), VNet peering, User Defined Routes (UDRs), Public IPs, load balancers, and Virtual Network Gateways. Troubleshooting and User Support: Assisting in diagnosing and resolving network connectivity issues, including outages and end-user issues. Coordinating with other IT teams or vendors as needed to resolve issues. Network Monitoring and Optimization: Monitoring network performance and availability, identifying and resolving issues proactively, and optimizing network configurations for improved efficiency. Network Backup and Recovery: Assisting with network backup and recovery operations, as well as disaster recovery planning and testing Maintaining Documentation: Keeping detailed records of network configuration and changes, as well as create and update network diagrams Perform all other duties and activities as required. Act in accordance with and as a good steward of Duck Creek Technologies mission, vision, and core values Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice. WHAT YOU VE DONE QUALIFICATIONS/REQUIREMENTS Education and Work Experience: Bachelors degree or higher or equivalent additional years of experience 4+ years of relevant network administration experience in a corporate environment 2+ years of Azure cloud network experience 2+ years Hands-on Zscaler experience Must be willing to travel from time to time to various offices in order to complete projects. Detail oriented with excellent technical, verbal, and written communication skills. Proficiency in English. Ability to work well under pressure. Great at organizing, prioritizing, and multitasking. Ability to collaborate with internal and external technology partners. Must be able to complete complex projects with minimal to no supervision. Strong troubleshooting and diagnostic skills Other Requirements: Travel: 0-10 Work Authorization: Legally authorized to work in the country of the job location. Wok Hours: Must be available to work US business hours (typically 9:00 AM - 6:00 PM EST) to align with team schedules and support needs WHAT WE STAND FOR To learn more about our inclusive company culture, values, DE&I initiatives, and people, please visit: https: / / www.duckcreek.com / life-at-duck-creek / Please let us know if you encounter accessibility barriers with our web content by sending an email to accessibility@duckcreek.com . Duck Creek Technologies does not accept, nor will we pay a fee for any hires resulting from unsolicited headhunter or agency resumes. #LI-DD1 Remote India
Posted 3 months ago
5 - 10 years
8 - 9 Lacs
Bengaluru
Work from Office
We are looking for a dynamic and highly technical Network Security engineer to join our fast-paced, high-growth organization. This role requires expertise in Network Security products and services. The ideal candidate will drive the architecture, implementation and support of network security solutions. This individual will collaborate closely with cross-functional teams to deliver robust, scalable, and network security solutions. Your Impact Design, implement, and maintain network security architectures and security controls. Develop and enforce security policies, standards, and procedures. Configure and manage network security devices (firewalls, IPS / IDS, etc). Troubleshoot network security issues and implement solutions. Provide technical expertise and guidance to other IT staff. Your Experience Bachelors degree in technical, Information Technology, or a related field, or equivalent military experience required 5 to 10 years of experience in network security roles, with a focus on designing, implementing, and maintaining secure network infrastructures. Experience with security certifications (eg, CISSP, CEH, CCIE Security) is a plus. Extensive experience with network security technologies (firewalls, IPS/IDS, VPNs, SASE security etc). Experience with security protocols and standards (eg, TCP/IP, DNS, DHCP, AD etc). Experience with designing, deploying, configuring, maintaining and troubleshooting Palo Alto VM Series, and Physical Firewalls Experience designing and integrating with Panorama Experience designing and integrating with Prisma Access Working knowledge of routing ( OSPF / BGP) & switching. Strong understanding of network security concepts and best practices. Familiarity with cloud security concepts and technologies. Soft Skills: Excellent communication and interpersonal skills. Strong problem-solving and analytical skills. Ability to work independently and as part of a team. Ability to prioritize tasks and manage time effectively.
Posted 3 months ago
2 - 4 years
4 - 6 Lacs
Bengaluru
Work from Office
Maintain the assets of pcs and laptop. Monitor network communication. Apply operating system updates, patches and make configuration changes to tighten security. Troubleshooting network issues and optimizing network performance. Setup security policy for users. Say firewalls and intrusion detection systems. Maintain internal infrastructure requirements including laptop, desktops, internet, intranet, LAN s WAN s and network segments. Office 365 administration like email user creation in Azure AD, License assigning, group id creation and providing permission. Should know how ticketing tools will work. Manage SLA for all the tickets and preparing a document to the management on how we can improve better in support services. Experience in Implementing Network Security Solutions including Firewall, VPN, IDS, and IPS. Experience in installation of Windows, configuration, technical troubleshooting, operating systems, Microsoft application software and peripherals. Having experience in working in International call centers is an added advantage
Posted 3 months ago
2 - 6 years
6 - 10 Lacs
Mumbai
Work from Office
Develop Security Policies & Standards and reference Architecture for Network design and deployment. Proactive analysis of Network for secure deployments, secure configurations against Global Security Best Practices. Assisting network design team with security inputs while designing an architecture for new offices/ branches/ data centres etc. for Security by Design. Developing network security standards and guiding network design to meet corporate requirements. Strategize and formulate high and low-level monitoring mechanism for security posture of network deployments and advise measures to improve them. Possess and maintain technical and business knowledge of aspects of Networking, Firewall, IPS, VPN, Wi-Fi etc. Possess and maintain broad technical and business knowledge of aspects of Infrastructure technologies including, Authentication Mechanisms, Cloud Computing, Cryptographic technologies etc. Conducting analysis of network security and Strategize and formulate high and low-level monitoring mechanism for IDS/IPS, Firewall systems, VPN etc. Taking proactive measures for enhancing the security posture of the Bank's network by studying the vulnerabilities issued/ published by various OEMs, internal and external agencies such as CERTetc. Working with internal and external business stakeholders on ensuring that IT infrastructure meet global network security standards. Produce and track metrics for the effectiveness and maturity of Secure network deployments.
Posted 3 months ago
2 - 4 years
4 - 6 Lacs
Pune
Work from Office
We re looking for a Senior Engineer- Cyber Security Engineer to join our ever-evolving Cyber Security Platform Operations team to help us unleash the potential of every business. About the team We are seeking a talented Senior Lead Engineer -Cyber Security Platform Support to join our cyber security operations Team. The team oversees the lifecycle of security tools, including upgrades, and decommissioning, while providing ongoing support and maintenance to ensure these tools function optimally and remain up to date. We collaborate with other security teams to understand their operational needs and ensure that we deliver their products to colleagues within the organization. In this role, you will play a crucial role in safeguarding our organizations endpoints from cyber threats and ensuring the overall security posture of our systems. You will be responsible for maintaining the stability and efficiency of our security platforms and services. You will be responsible for operational activities for security platforms like ticket resolution, ensuring rapid resolution of ongoing critical issues and incident handling. This role will require candidates to work on-call support on a rotating basis for high-severity incidents. What you ll own Monitor and action ticket queue, rapidly resolve technology incident issues for internal users. Maintain/monitor security platforms and services, resolve issues and support SOC/IR (Incident Response) as needed. Provide analysis, review and reporting of operating state for security platforms, make recommendations for any environmental changes to reduce incident volumes and downtime. Maintain, test and implement security policies and procedures to ensure compliance with company policy, industry standards and regulatory requirements. Tune, configure and optimize security tools to defend against new TTPs (tactics, techniques, and procedures) as requested by SOC/IR teams. Rapidly fulfill any SOC/IR requests in response to security incidents. Collaborate with cross-functional teams to integrate security solutions into existing infrastructure and workflows. Mentor junior team members to enhance their skills. Stay up to date with the latest cybersecurity threats, trends, and technologies, and recommend appropriate security controls and countermeasures What you bring Bachelor s degree in Computer Science, Information Security, Electronics & Communication or related field, or the combination of demonstrable relevant experience and skills. 2+ years of proven experience in operating and managing security solutions in enterprise environments. In-depth knowledge of the most of the following security technologies: Web Application Firewall, WAF, Network DLP, IDS/IPS, SWG/Proxy, CASB, CSPM, SASE, SSE, SIEM and forensic network collection. Understanding of cybersecurity principles, best practices, and industry requirements and frameworks (e.g., NIST CSF, ISO 27001, PCI DSS Mitre Attack and Defend). Understanding of operating system technology, including Microsoft Windows, MacOS and various Linux distributions. Knowledge of virtualization platforms both centrally managed as well as locally managed as well as the means to provide visibility and control to guest systems. An understanding of cloud-based endpoint security solutions and experience with public cloud platforms such as AWS, Azure, or Google Cloud Platform. Excellent analytical and problem-solving skills, with the ability to troubleshoot complex network security issues. Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams
Posted 3 months ago
3 - 5 years
5 - 7 Lacs
Mumbai
Work from Office
Job Summary The Endpoint MSS L2 is responsible for advanced endpoint security analysis, incident response, and proactive threat hunting within the managed security services (MSS) environment. The role involves deep-dive investigations, managing complex incidents, and mentoring L1 analysts. An L2 Analyst ensures endpoint security tools are effectively utilized to detect, respond to, and prevent endpoint threats, aligning with organizational security objectives. Tools: EDR, Mailing Gateway, DLP, VPN, Proxy setup, Network security tool: Firewall, IPS, WAF Key Responsibilities Incident Response Lead the investigation and remediation of complex endpoint security incidents, proxy, DLP, VPN, Mailing gateway Perform root cause analysis of advanced threats and recommend containment and recovery measures. Collaborate with IT and SOC teams to resolve escalated incidents from L1 analysts. Threat Hunting and Analysis Conduct proactive threat hunting using Endpoint Detection and Response (EDR) tools like SentinelOne, CrowdStrike, or similar solutions. Analyze malware behavior, including static and dynamic analysis. Endpoint Security Operations Ensure optimal configuration of endpoint security tools(EDR, DLP, mailing gateway) to enhance detection capabilities. Review and fine-tune policies and rules within endpoint security platforms. Coordinate with vendors for troubleshooting or enhancement of endpoint security solutions. Documentation and Reporting Document detailed findings, actions taken, and lessons learned for each incident. Prepare periodic security reports and contribute to compliance audits. Maintain and update incident response playbooks and standard operating procedures (SOPs). Mentorship and Knowledge Sharing Guide and mentor L1 analysts to enhance their skills and understanding of endpoint security. Provide training sessions or knowledge-sharing workshops on endpoint security best practices. Collaboration and Coordination Work closely with SOC, threat intelligence, and vulnerability management teams to improve overall security posture. Escalate unresolved or critical incidents to L3 or security engineering teams. Required Qualifications Education Bachelor s degree in Computer Science, Information Technology, Cybersecurity, or a related field. Certifications (Preferred) CEH (Certified Ethical Hacker), CCNA, EDR-focused certifications (e.g., Certified SentinelOne Analyst, CrowdStrike Certified Expert), GIAC Certified Incident Handler (GCIH), or equivalent. Technical Skills Strong knowledge of endpoint security tools and EDR platforms like SentinelOne, CrowdStrike, Carbon Black, etc. Hands-on experience with malware analysis, reverse engineering, and threat hunting techniques. Proficiency in scripting (e.g., Python, PowerShell) for automating tasks. Familiarity with MITRE ATT&CK Framework and its application in threat detection. Experience analyzing logs and alerts using SIEM platforms. Soft Skills Excellent problem-solving and critical-thinking abilities. Strong communication and teamwork skills, with the ability to articulate technical details to non-technical stakeholders. Proactive and detail-oriented with a focus on continuous improvement. Preferred Experience 3-5 years of experience in endpoint security, incident response, or SOC roles. Hands-on experience in MSS or similar managed service environments. Work Schedule Mostly week days but support on weekends as well (sometimes)
Posted 3 months ago
4 - 6 years
20 - 25 Lacs
Hyderabad
Work from Office
Automate and streamline deployment processes using CI/CD tools. Manage and monitor cloud infrastructure and services. Implement security measures and compliance in DevOps processes. Collaborate with development and operations teams to improve system performance. Troubleshoot and resolve infrastructure and deployment issues. Qualifications Automate and streamline deployment processes using CI/CD tools. Manage and monitor cloud infrastructure and services. Implement security measures and compliance in DevOps processes. Collaborate with development and operations teams to improve system performance. Troubleshoot and resolve infrastructure and deployment issues. Skills Strong knowledge of firewalls, VPNs, IDS/IPS, and security protocols. Experience with SIEM tools (Splunk, QRadar). Proficiency in risk assessment and management. Understanding of compliance standards (ISO, NIST, GDPR). Excellent analytical and problem-solving abilities.
Posted 3 months ago
2 - 7 years
10 - 14 Lacs
Chennai, Pune, Delhi
Work from Office
Articulate the benefits of Menlo Security solutions for both technical and non-technical audiences. Research technical requirements of an opportunity to scope and architect a solution that meets the customer s needs. Understand the customer s business drivers and how to map these to a Menlo Security solution that meets both their needs and budget. Lead Proof of Concept engagements on regional sales opportunities. This includes deployment and configuration of Menlo Security services or software, training individuals on the use of Menlo Security solutions, act as an interface between the Sales organization and technical staff to resolve outstanding issues. Provide reporting and feedback on customer accounts and field activities to Sales, Product Management and Engineering. Work closely with regional Menlo Security Partners to enable partner self-sufficiency and drive partner-led opportunities. Work closely with customers to grow and expand the implementation/integration of Menlo Security products. Requirements Bachelor Degree or Masters Degree in Computer Science or related discipline or Equivalent Experience 5+ years pre-sales experience in the computer networking or security space Excellent knowledge and experience with a wide variety of IT technologies and security solutions. Day-to-day operations and interactions will involve the following focus areas: Web Proxy Technologies Malware Analysis - Static, Delta, and Dynamic / Runtime approaches Host-based Forensics and Windows Internals Network Forensics - Packet Capture and Analysis Email Security and Email Flow - Exchange / Domino, Cloud Solutions, AV and Anti-SPAM products Incident Response - Workflow procedures, evidence gathering, chain of custody handling Sandboxing - Open Source and Commercial solutions: GFI, Cuckoo, Sandboxie Network Engineering - the OSI model, IPv4/6, Routing, Switching, DNS, VLANs and Subnetting, Taps, Load Balancers Network Security - Firewalls, IDS / IPS, HTTP/SSL Proxies Enterprise Architecture - Active Directory, SCCM, LDAP / RADIUS / TACACS+, 2-Factor Auth. Virtualization Technology - VMware, Citrix, Virtual Desktop Infrastructure Overnight travel throughout the region is required. Additional Qualifications Strong leadership skills with the ability to independently prioritize and execute project tasks in a methodical and disciplined manner. Set and manage expectations with senior stake-holders and team members. Exceptional written and oral communication skills. This role requires an ability to understand and articulate both the business benefits (value proposition) and technical advantages of Menlo Security products and solutions. Understand and be conversant about Menlo Security competitors, their solutions, strengths, weaknesses, opportunities and threats.
Posted 3 months ago
8 - 13 years
18 - 90 Lacs
Bengaluru
Work from Office
"> About Us About Company . Roles and Responsibility Being part of Delivery team of scalable Linux-based server(Security product) Design , develop and sustain software that can run in avirtual and cloud environment as well as on high-end platforms, which canhandle multi-gigabyte traffic. Responsibility: New feature design and development Enhance existing features Design and performance optimization Handling customer/deployment specific issues Work with support team on live deployments C++ Programing and data structures Linux - Threads, IPC mechanisms Good understanding of TCP/IP Hands on experience in L7 Networking protocols ( HTTP, DNS. SIP, LDAP etc) Exposure to Linux debugging environment using gdb Good analytical and problem solving skills Desired Skills: Exposure to IPS/IDS, WAF, TLS products Exposure to routing protocols BGP/OSPF Good in communication Self motivated and pro-active
Posted 3 months ago
8 - 12 years
14 - 18 Lacs
Gurgaon
Work from Office
about the role Interlocks with your security organization. Helps in the planning of major changes / projects. Analysis Custom reports, Usage patterns, Trends Analysis, Security review Governance & Audits Risks assessments, audits Configuration. Policies optimizations, mapping sites with Zscaler SSE nodes, policies cleanup. Provide recommendations, Vulnerability management, Maintain secure posture. To act as an end-to-end point of contact for the customer for critical changes. To provide expertise support on escalated incidents. Work towards reducing escalations to higher management by following the incident & change management process guidelines & by providing the best quality of service to customer. Participate in meetings and training session on time and ensure recording the minutes or necessary details where applicable. Continually improve skills / tools usage and contribute to guidelines, knowledge base - QRGs for complex or repeated incidents / changes. Adherence for compliances with ISO, ISAE 3402, SOC2 and customer audits related to policy and configurations. Follow the standard escalation matrix, when required. Provide Tier 3 network security support of Firewall/Proxy/LB environments supporting multiple customers. This position interfaces with external clients and is highly visible. Responsible for general architecture, initial configurations and subsequent management of one or more Firewall/VPN based/IPS/Proxy/DLP/Sandbox systems. Provide 24x7 production support to accept, operate and maintain security elements. There are off shift activities and pager rotation. Conduct daily, weekly, and monthly proactive maintenance activities including configuration changes and version upgrades as per business directive. Remediate vulnerabilities on Microsoft Defender Cloud. Good to have certification on security domain like ITIL, Firewall, Proxy, Cloud Security etc. Good written and verbal communication skills / fluent English. 8-12 years of experience. about you Leading Industry security Certifications (CISSP, CCSA, CCNP Security, PCNSA/PCNSE, BCCPA, ZCCA-IA, ZCCP-IA, ZCCA-PA) Proxy:- Zscaler (ZIA, ZPA, ZDX)- PAC file, NSS, MCAS, Various Policy Types- URL & Cloud app, DLP, Sandbox, Advance Cloud Firewall etc. APP Segment, APP Connector. Blue Coat Proxy (SG-800,900, 9000 )- Policy, PAC File Firewalls:- Checkpoint advanced Firewall solution design - implementation and administration. Check Point Security Gateway on R81/80 Checkpoint UTM (2073,3073, 3075) Secure Platform and VSX platform, Juniper SSG (140, 520, 550) and SRX (100, 210, 240), . Palo Alto- (5220, 5240, 5310) (Firewall, Panaroma, Prisma, Global Protect) IDP:- McAfee IPS Load Balancers:- F5 (1600,3600,3900,6400) Event Management:- HP Arc Sight SIEM Express & Logger (7200) UTM:- Fortinet (80,110,300, 1000, 1500) department Global Delivery & Operations Orange Business is a network and digital integrator that understands the entire value chain of the digital world, freeing our customers to focus on the strategic initiatives that shape their business. Every day, you will collaborate with a team dedicated to providing consistent, sustainable global solutions, no matter where our customers operate. With over 30,000 employees across Asia, the Americas, Africa, and Europe, we offer a dynamic environment to develop and perfect your skills in a field filled with exciting challenges and opportunities.
Posted 3 months ago
3 - 8 years
5 - 10 Lacs
Gurgaon
Work from Office
about the role Roles & Responsibilities: Network management (routing), Router Configuration and Troubleshooting, up gradation, Link Performance Management of Routers/ L3 and L2 Switch at SDC Network on day to day basis. Support to network security operations such as NexGen firewall, DDOS, IPS/IDS, WAF, SIEM etc. Responsible for uptime and performance reporting of network & security devices. Take backup of all network & security devices periodically. Follow up with OEM & vendors for different types of faults & RMAs. Support administration, Change Management, Liaison with Bandwidth provider officials and external vendors, bandwidth and facility management. Upgrade IOS/firmware(s) in network & security devices as per OEM recommendation/ operational requirement. Communications with field and key technical experts for quick restoration of services. Allocation & configuration of IP address for new requirements. Configuration of network/firewall policies, change management as per requirement. Prepare MIS report of network & security devices. Syslog monitoring of network & security devices SLA Management, Capacity Management & Audit Management. Proper Call Logging/Updation/Resolution in CA Tools. Responsible for the resolution of SR/incident within stipulated time frame. Training programs for team members. Compliance to ISO 20k & 27 k. about you Education - B.E./B.Tech/MCA, Certification - CCNP/JNCIP/CISSP or equivalent , 5+ Years of Experience Roles & Responsibilities: Network management (routing), Router Configuration and Troubleshooting, up gradation, Link Performance Management of Routers/ L3 and L2 Switch at SDC Network on day to day basis. Support to network security operations such as NexGen firewall, DDOS, IPS/IDS, WAF, SIEM etc. Responsible for uptime and performance reporting of network & security devices. Take backup of all network & security devices periodically. Follow up with OEM & vendors for different types of faults & RMAs. Support administration, Change Management, Liaison with Bandwidth provider officials and external vendors, bandwidth and facility management. Upgrade IOS/firmware(s) in network & security devices as per OEM recommendation/ operational requirement. Communications with field and key technical experts for quick restoration of services. Allocation & configuration of IP address for new requirements. Configuration of network/firewall policies, change management as per requirement. Prepare MIS report of network & security devices. Syslog monitoring of network & security devices SLA Management, Capacity Management & Audit Management. Proper Call Logging/Updation/Resolution in CA Tools. Responsible for the resolution of SR/incident within stipulated time frame. Training programs for team members. Compliance to ISO 20k & 27 k. department Orange Business International Orange Business is a network and digital integrator that understands the entire value chain of the digital world, freeing our customers to focus on the strategic initiatives that shape their business. Every day, you will collaborate with a team dedicated to providing consistent, sustainable global solutions, no matter where our customers operate. With over 30,000 employees across Asia, the Americas, Africa, and Europe, we offer a dynamic environment to develop and perfect your skills in a field filled with exciting challenges and opportunities.
Posted 3 months ago
3 - 8 years
5 - 10 Lacs
Ranchi
Work from Office
about the role Roles & Responsibilities: Network management (routing), Router Configuration and Troubleshooting, up gradation, Link Performance Management of Routers/ L3 and L2 Switch at SDC Network on day to day basis. Support to network security operations such as NexGen firewall, DDOS, IPS/IDS, WAF, SIEM etc. Responsible for uptime and performance reporting of network & security devices. Take backup of all network & security devices periodically. Follow up with OEM & vendors for different types of faults & RMAs. Support administration, Change Management, Liaison with Bandwidth provider officials and external vendors, bandwidth and facility management. Upgrade IOS/firmware(s) in network & security devices as per OEM recommendation/ operational requirement. Communications with field and key technical experts for quick restoration of services. Allocation & configuration of IP address for new requirements. Configuration of network/firewall policies, change management as per requirement. Prepare MIS report of network & security devices. Syslog monitoring of network & security devices SLA Management, Capacity Management & Audit Management. Proper Call Logging/Updation/Resolution in CA Tools. Responsible for the resolution of SR/incident within stipulated time frame. Training programs for team members. Compliance to ISO 20k & 27 k. about you Education - B.E./B.Tech/MCA, Certification - CCNP/JNCIP/CISSP or equivalent , 5+ Years of Experience Roles & Responsibilities: Network management (routing), Router Configuration and Troubleshooting, up gradation, Link Performance Management of Routers/ L3 and L2 Switch at SDC Network on day to day basis. Support to network security operations such as NexGen firewall, DDOS, IPS/IDS, WAF, SIEM etc. Responsible for uptime and performance reporting of network & security devices. Take backup of all network & security devices periodically. Follow up with OEM & vendors for different types of faults & RMAs. Support administration, Change Management, Liaison with Bandwidth provider officials and external vendors, bandwidth and facility management. Upgrade IOS/firmware(s) in network & security devices as per OEM recommendation/ operational requirement. Communications with field and key technical experts for quick restoration of services. Allocation & configuration of IP address for new requirements. Configuration of network/firewall policies, change management as per requirement. Prepare MIS report of network & security devices. Syslog monitoring of network & security devices SLA Management, Capacity Management & Audit Management. Proper Call Logging/Updation/Resolution in CA Tools. Responsible for the resolution of SR/incident within stipulated time frame. Training programs for team members. Compliance to ISO 20k & 27 k. department Orange Business International Orange Business is a network and digital integrator that understands the entire value chain of the digital world, freeing our customers to focus on the strategic initiatives that shape their business. Every day, you will collaborate with a team dedicated to providing consistent, sustainable global solutions, no matter where our customers operate. With over 30,000 employees across Asia, the Americas, Africa, and Europe, we offer a dynamic environment to develop and perfect your skills in a field filled with exciting challenges and opportunities.
Posted 3 months ago
3 - 8 years
9 - 13 Lacs
Mumbai
Work from Office
about the role Manage LEVEL 2 support for Security Must have HANDS-On experience on Firewall, IPS and Antivirus. Must have Knowledge of Firewall about you Manage LEVEL 2 support for Security Must have HANDS-On experience on Firewall, IPS and Antivirus. Must have Knowledge of Firewall department Orange Business International Orange Business manages and integrates the complexity of international communications, freeing our customers to focus on the strategic initiatives that drive their business. Our extensive experience and knowledge in global communication solutions, together with our understanding of multinational business and local support in 166 countries and territories, ensure that our customers receive a consistent, global solution wherever they do business.
Posted 3 months ago
4 - 8 years
14 - 18 Lacs
Bengaluru
Work from Office
Dealing challenges with AMS methodologies of Cadence: irun/xrun or Synopsys: XA-VCS or Mentor Eldo ADMS Job Description In your new role you will: Behavioral modeling: Verilog, Wreal or SV-RNM -Full AMS Verification for S oC or IPs -Full Test plan preparation as per the dynamics of product specifications - Full Dealing challenges with AMS methodologies of Cadence: irun/xrun or Synopsys: XA-VCS or Mentor Eldo ADMS -Partial Testcase Debug & proposing new scenarios - Partial Handling project dynamics on scope, schedule and effort - coming up with alternative verification plans- Full Self-motivated to drive new scope expansion proposals mapping to business value Mentoring junior engineers in creating problem solving mindset Establishing cross collaboration with other domains and coming up with proposals in enhancing product development working approaches Your Profile You are best equipped for this task if you have: Bachelors with 5+ years of experience Mentoring: Technical mentoring for junior engineers. Instigate thought-provoking culture. Analog: Functional spec understanding of standard power management blocks, clock circuits, and data converters. Loop analysis is an added advantage HDL/HVL: Verilog/Verilog-ams, SV/UVM added advantage Tools: Cadence Xcelium + spectre/ Synopsys XA-VCS/ Mentor Eldo ADMS Automation: Perl/python/shell Schedule and result oriented execution mindset, flexible in working as per the project scope needs, Exploring and experimentation for continuous methodology improvements Contact: swati.gupta@infineon.com #WeAreIn for driving decarbonization and digitalization. As a global leader in semiconductor solutions in power systems and IoT, Infineon enables game-changing solutions for green and efficient energy, clean and safe mobility, as well as smart and secure IoT. Together, we drive innovation and customer success, while caring for our people and empowering them to reach ambitious goals. Be a part of making life easier, safer and greener. Are you in? We are on a journey to create the best Infineon for everyone. This means we embrace diversity and inclusion and welcome everyone for who they are. At Infineon, we offer a working environment characterized by trust, openness, respect and tolerance and are committed to give all applicants and employees equal opportunities. We base our recruiting decisions on the applicant s experience and skills. Please let your recruiter know if they need to pay special attention to something in order to enable your participation in the interview process. Click here for more information about Diversity & Inclusion at Infineon.
Posted 3 months ago
4 - 9 years
12 - 16 Lacs
Hyderabad
Work from Office
About Role Mandatory Skills : Vlocity, Salesforce Connectors, and Integrations, Apex, Omnistudio (IPs, Data Raptors, Omniscripts, Calculation Matrix, Calculation Procedures), LWC, SOQL. Data modeling, Sales Cloud, Systems analysis, and design. Ability to technically lead complex projects throughout the complete IT lifecycle (Analysis, Architecture, Design, Build, Test and production).
Posted 3 months ago
10 - 15 years
40 - 70 Lacs
Bengaluru
Work from Office
"> About Us Roles and Responsibility 10+ Years ofexperience, BTech/MTech As Sr RTL DesignLead, the candidate is expected to have prior experience in defining the MicroArchitecture, methodology flow and RTL implementation IPs and SoC Integration. The candidate willmeet regularly with other functional team members such as Architects, RTL andDFT Engineers, Verification Engineers, Physical Designers, CAD Engineers,Product Engineers and Program Management to ensure successful and timelyproject completion. Responsibilities Participatein the development of SoC architecture solutions, and analyse implementationtrade-offs Evaluationof third party IP to check the functional feasibility and PPA targets Definearchitecture for next-gen ASICs (ARM Cortex M series) including processorsystem, IO Peripherals, platform management, interconnect, and memory subsystem Implementationof design in RTL, SoC Integration etc. Collaboratewith cross functional teams - DFT, DV and Physical Implementation teams Workwith other architects, design/verification, and software for the IP development& acquisition Desired Skills Strongfoundation in SoC architecture and processor systems with proven years ofexperience Provenexperience in ARM Cortex M based SoCs Goodunderstanding of Embedded Software architecture (Bare Metal) Excellentknowledge of CPU, AXI Interconnect, and I/O peripherals Goodanalytical problem solving, and attention to details Workingknowledge of C, SystemVerilog, and Python Excellentwritten and verbal communication skills Knowledgeof SOC development flow and accelerator IP Experiencein micro-architecture and digital design/verification Knowledgeof power management, boot, security and memory architectures Exposureto performance modelling and analysis will be a plus
Posted 3 months ago
1 - 3 years
4 - 8 Lacs
Pune
Work from Office
Why it s worth it: At ReliaQuest, we do things differently. We do not limit your professional growth with outdated job titles and responsibilities. Why be just a Security Analyst, Detection Developer, or Security Engineer when you can be all threeAs a GreyMatter Specialist, you will do all of that and more. This role is uniquely designed to combine skills of threat detection, engineering, and incident response. On our team, we give you the opportunity to make an impact starting from day one. In this role, you ll develop a diverse skill set which normally takes years to learn all within your first year. Our industry-leading security operations platform, GreyMatter and immersive training will afford you the tools, experience, and opportunities to grow your career. Whether you re conducting advanced investigations, troubleshooting technical challenges or providing customer recommendations, you ll be solving real-world challenges and driving impact daily for our enterprise customers. As part of the ReliaQuest team, you will receive mentorship and hands-on experiences while working alongside world-class teammates who share a high-performance mindset. In this environment, your expertise will propel you years ahead of your peers limited to traditional SOC roles. If you are looking for the monotony of manually working security alerts, this job is not for you; but if you are ready to be challenged, we are ready to invest in you. The everyday hustle: Be a trusted technical advisor, resolving customer challenges from start to finish. Provide analysis and recommendations to customers based on alert activity, response playbook availability, and investigations. Triage and fine-tune security alerts, Digital Risk Protection (DRP) alerts, and engineering health alerts to ensure optimal performance. Integrate and configure log sources for existing customers. Troubleshoot and resolve issues related to data parsing and ingestion to ensure smooth operations and data accuracy. Independently integrate and configure log sources, handling both administrative tasks and ad hoc requests to complete work efficiently. Deploy and fine-tune detection rules using GreyMatter Detect. Employ the Cyber Analysis Methodology to conduct investigations. Conduct advanced investigations, including Tier 3 incidents, ad-hoc threat hunts, and customer-requested analyses. Communicate effectively with customers regarding engineering and Incident Response (IR) escalations. Spend 75% of your day in front of the customer Do you have what it takes Bachelors degree in a related field Understanding of cybersecurity and IT disciplines including networking, operating systems, authentication protocols, general enterprise network, architecture, and security incident response. Knowledge of TCP/IP Protocols, network analysis, and network/security applications Basic knowledge of Linux/Unix operating systems Ability to blend your technical and communication skills to advise the customer Must demonstrate great attitude, energy, and effort Must be adaptable, focused, accountable, and helpful Must demonstrate excellent verbal and written communication skills (English language) What makes you uncommon(not required) Certifications such as Network+, Security+, CySA+ 1-3 years experience as a Security/Network Administrator or equivalent knowledge Prior SIEM experience and/or administration Hands-on experience with parsing data, log formats, regular expressions Scripting experience (bash, PowerShell, python) Multiple OS experience (mac, windows) Knowledge of various security methodologies and processes, and technical security solutions (SIEM, IDS/IPS, Firewall Solutions, Offensive Security tools)
Posted 3 months ago
6 - 10 years
13 - 17 Lacs
Hyderabad
Work from Office
Cprime, a Goldman Sachs and Everstone Capital portfolio company, is more than just a full-service consulting firm - we are your strategic partner for driving innovation and agility in your business. Cprime is trusted around the globe to provide strategic and technical consulting, coaching, and training to businesses leading their industry in digital transformation. With over two decades of experience, we have honed our expertise to help organizations adapt at the speed the market demands. In a world where every business is reliant on software, it s time to embrace change, or be left behind. We re more than consultants; we re passionate problem solvers on a mission to help your organisation thrive in a technology-driven world. We ve created a dynamic environment with strong innovation where growth is encouraged and diversity is celebrated. We continuously challenge each other to work smarter and adapt new ideas. Our Cprimers are given the flexibility to work, opportunities to collaborate, and have fun along the way. We are seeking an experienced Cybersecurity Lead to oversee and enhance our organizations security posture. The ideal candidate will be responsible for designing, implementing, and managing security strategies to protect our systems, networks, and data. This role involves leading security initiatives, collaborating with cross-functional teams, and staying ahead of emerging cyber threats. What you will do: Develop and implement comprehensive cybersecurity strategies and policies. Lead incident response efforts, including investigation, containment, and remediation. Conduct regular security assessments, vulnerability scans, and penetration tests. Manage security tools and technologies (firewalls, IDS/IPS, SIEM, EDR, etc.). Provide guidance and training to internal teams on security best practices. Monitor threat intelligence sources and proactively address potential risks. Collaborate with IT, DevOps, and delivery teams to embed security into the development lifecycle. Hands-on experience in dynamic malware analysis. Collect the suspicious files/scripts and perform malware analysis using sandboxing. Incident Investigation and RCA Reporting: Lead incident investigations, analyzing alerts, and conducting evidence collection and triage. Generate Root Cause Analysis (RCA) reports to document, incidents, providing detailed findings and recommendations for remediation. Windows Administration: Performed Windows Server administration, including system configurations, user account management, patching, and security hardening, ensuring compliance with security best practices. EDR Management: Implementing and managing CrowdStrike Endpoint Detection and Response (EDR), configuring and managing the solution to provide advanced protection for endpoints, detect threats, and respond to security incidents effectively. Real-time log monitoring across diverse sources, including firewalls, IDS/IPS, Windows/Linux operating systems, Windows Servers, system applications, databases, web servers, and networking devices, ensuring seamless operations and security. Direct prior experience with core security technologies (SIEM, firewalls, IDS/IPS, HIPS, proxies, vulnerability scanners, AV, etc.) Determine the scope of a security incident and its potential impact on the Client network recommend steps to handle the security incident with all information and supporting evidence of security events. Prepare and present security reports to executive leadership. Qualifications and Skills: 5+ years of experience in cybersecurity, with at least 2 years in a leadership role. Strong knowledge of security frameworks and threat modeling. Hands-on experience with security technologies and incident management. Relevant certifications (e.g., CISSP, CISM, CEH) are a plus. Excellent analytical, problem-solving, and communication skills. Education and Certifications: Bachelor s degree in computer science, Information Security, or related field. Should becertified in one out of the three certifications - CISSP, CISM, CEH. What We Believe In Equal Employment Opportunity Statement Cprime is an equal-opportunity employer that is committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by federal, state, or local laws.
Posted 3 months ago
2 - 7 years
16 - 21 Lacs
Mumbai
Work from Office
" Netflix is one of the worlds leading entertainment services, with 283 million paid memberships in over 190 countries enjoying TV series, films and games across a wide variety of genres and languages. Members can play, pause and resume watching as much as they want, anytime, anywhere, and can change their plans at any time. We are looking for a Creative and Strategic Marketing Manager to join our team for Brand initiatives, and Title marketing (Global IPs + Licensed). In this role, youre responsible for crafting and executing 360marketing campaigns promoting our brand, content, and product to consumers in the region - with the goal of identifying the right audiences, driving relevance, creating consumer value, and generating conversation. The ideal candidate is creatively strong and eager to create impactful, scaled work that gets people talking. You have a strategic mindset, using data and insights to guide your decisions but you also rely on your experience and intuition. You have a proven track record of leading brand projects from strategy inception through to successful launch. Your passion for entertainment, whether itseries, films, or Live content, allows you to understand and connect deeply with different types of audiences across India. You have an entrepreneurial mindset and a bias towards taking action, and you can socialise easily in a team with lots of cross-functional partnerships. You are a collaborative team player who fosters positive dynamics within the team and with partners, contributing selflessly to Netflixsuccess in India. You are an unusually responsible professional that will thrive in our unique
Posted 3 months ago
6 - 9 years
13 - 17 Lacs
Kalyani, Pune
Work from Office
About the Role: As an IT Security Analyst, you will contribute significantly to our cybersecurity efforts through diligent monitoring and risk management. You will be responsible for routine security tasks, assisting in maintaining a robust information security framework. Your role is pivotal in identifying and addressing security vulnerabilities to protect our digital assets. Responsibilities: Perform regular monitoring for potential security breaches and vulnerabilities. Conduct detailed security audits and vulnerability assessments. Implement and manage security software and protocols. Provide second-line response to security incidents and breaches. Configure and manage access controls and user permissions. Support the development and maintenance of security policies and procedures. Assist in running phishing simulations and other security trainings. Evaluate emerging security technologies and products for potential use. Maintain up-to-date security documentation and logs. Assist in conducting risk assessments and mitigation planning. Skills: Intermediate Network Knowledge: Deeper understanding of network structures, protocols, and security. Security Tools: Proficiency with security tools like firewalls, IDS/IPS. Vulnerability Assessment: Ability to conduct and analyze vulnerability assessments. Incident Response: Skills to respond and mitigate security incidents effectively. Policy Implementation: Competence in implementing security policies and procedures. Training Facilitation: Capability to conduct and facilitate security training sessions. Risk Assessment: Understanding of basic risk assessment methodologies. Technical Documentation: Proficiency in maintaining detailed security documentation. Level criteria T2 (for internal use only): Requires working knowledge and expanded conceptual knowledge in primary technical job family and broadens capabilities; has worked with and is proficient with current technologies Understands key business drivers and builds knowledge of the company, processes and customers Performs a range of technical assignments and solves moderately complex problems under guidance of established policies and procedures Receives a moderate level of guidance and direction Impacts quality of own work and the work of others on the team; may provide informal guidance to new team members Explains complex information to others in straightforward situations
Posted 3 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2