Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
4.0 years
0 Lacs
Calcutta
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security - DPP- Risk – Consulting – Senior As part of our EY-Cyber security in the Risk Consulting team, your role will be primarily responsible for the daily monitoring and/or maintenance of the enterprise Data Protection tools/solutions. The main duties of the person in this role will include proper care and administration of the Data Protection tools, monitoring and responding to the alerts that generate from the tool. This person will interface with IT Operations, Network Operations, Infrastructure teams, Legal, Risk Management, etc. The opportunity We’re looking for Security Analyst in the Risk Consulting team to work on various privacy/data protection related projects for our customers across the globe. In line with EY’s commitment to quality, consultant shall confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, consultant shall help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your key responsibilities Build DATA PROTECTION solution concepts and deployment requirements Deploying DATA PROTECTION tools and implementation of endpoint protection. Work with vendors to support the DATA PROTECTION technology (troubleshooting, upgrades, etc.) Administration of the Data Protection tools which includes configuring policies, upgrading and patching, etc. Monitor and respond to alerts generated from the Data Protection systems and other technologies Understand and follow the incident response process through event escalations Respond to escalations by the Incident Response Team Follow processes to maintain the leading DATA LOSS PREVENTION/CASB system Assisting clients in privacy related incident response activities. Supporting the client’s team by acting as an interim team member (e.g., security officer, security manager, security analyst.) Skills and attributes for success Should be a good team player. Excellent verbal and written communication skill. Proficient Documentation and Power Point skills Good social, communication and technical writing skills Should interface with internal and external clients. Strong analytical/problem solving skills. Ability to prioritize tasks and work accurately under pressure to meet deadlines. Should understand and follow workplace policies and procedures. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. To qualify for the role, you must have Bachelor's or Master’s degree in Computer Science, Information Systems, Engineering or a related field. At least 4-6 years of experience in supporting Data Security Technology. At least 4-6 years of experience in two or more of the following: Information Security concepts related to Governance, Risk & Compliance Data Loss Prevention, CASB Technology support and Event Handling Experience of Administration of the DLP, CASB tools which includes configuring policies, upgrading and patching for leading vendors. (Digital Guardium, McAfee, Forcepoint, Netskope, Symantec CloudSOC, MCAS etc.) MS Purview/ CASB (Netskope/MS/Symantec). Knowledge of Digital Guardium is a Must. Technical/Vendor certification will be added advantage. Experience in utilizing and good knowledge of other data protection technology like Endpoint Security Suite, EDR, ATP will be added advantage. Maintain current data protection and privacy expertise, skills and competences. Ability to independently research and solve technical issues. Demonstrated integrity in a professional environment. Knowledge of core Information Security concepts related to Governance, Risk & Compliance. Ability to work in and adapt to a changing environment. Extend required support for any reported data protection and privacy incidents such as information breaches and leakages. Ability to communicate in a clear and concise manner. Ideally, you’ll also have Professional certificate or be actively pursuing related professional certifications such as the CompTia Security+, CEH, CISSP or Vendor/Technical certification. If not, certified candidates are expected to complete one of the business required certifications within 12 months of hire. To expect some weekend work and 20%-30% travel based on job requirement. What we look for A Team of people with commercial acumen, technical experience and enthusiasm to learn new things in this fast-moving environment with consulting skills. An opportunity to be a part of market-leading, multi-disciplinary team of 1400 + professionals, in the only integrated global transaction business worldwide. Opportunities to work with EY Consulting practices globally with leading businesses across a range of industries What working at EY offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 1 week ago
6.0 - 11.0 years
11 - 15 Lacs
Bengaluru
Work from Office
Senior Cybersecurity Analyst with a minimum of 6+ years of experience in thefield of Operation technology, particularly focusing on Endpoint Detection andResponse (EDR) and Intrusion Detection System #40;IDS#41; monitoringtools. The ideal candidate will have demonstrated expertise in Carbon Black AppControl. Carbon Black, MS Defender for Endpoints (EDR/ATP),Data Network Security - IDS, Unix Administration, Windows, Carbon Black, MS Defender for Endpoints (EDR/ATP), Data Network Security - IDS, Unix Administration, Windows. Senior Cybersecurity Analyst with a minimum of 6+ years of experience in the field of Operation technology, particularly focusing on Endpoint Detection and Response (EDR) and Intrusion Detection System (IDS) monitoring tools. The ideal candidate will have demonstrated expertise in Carbon Black App Control.
Posted 1 week ago
5.0 - 8.0 years
0 Lacs
Pune, Maharashtra, India
On-site
TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. About the Role : Endpoint Security Responsibilities : Deep technical expertise in Endpoint security technology domain with demonstrated expertise in one or more of the following areas – EDR, HIPS, Anti-Malware, FIM, Server Protection Proven experience in maintaining endpoint security solutions across enterprise environments. Provide compliance reports (monthly and based on need) Performing analysis of end-point security needs that contribute to the design, integration, and installation of hardware and software. Analysis, troubleshooting and development of solutions to end-point security problems. Excellent troubleshooting skills Creation of SOPs for daily operations of endpoint security tools and services Monitoring security advisory groups to ensure all necessary security updates, patches and preventive measures are in place. Support forensics activities and requirements. Qualifications : Experience Range: 5 to 8 years Required Skills : Any: McAfee, Trellix, Symantec, EDR, Carbon Joining Location : PAN India We are currently planning to do a Walk-In Interview on 14th June 2025 at TCS Pune & Bangalore Date - 14th June 2025 (Saturday) Venue - Bangalore : Tata Consultancy Services, Think Campus, JRD Auditorium Cafteria, Electronic City, Bangalore Pune : Tata Consultancy Services, Sahyadri Park SP1, A1 Auditorium & Zone 3, Rajiv Gandhi Infotech Park, Hinjewadi Phase 3, Pune - 411057 ``` Show more Show less
Posted 1 week ago
5.0 - 8.0 years
0 Lacs
Pune, Maharashtra, India
On-site
TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. Role**: Endpoint Security Desired Skill Set Any: McAfee, Trellix, Symantec, EDR, Carbon Black Experience Range : 5 to 8 years Joining Location : PAN India We are currently planning to do a Walk-In Interview on 14th June 2025 at TCS Pune. Date - 14th June 2025 (Saturday) Venue - Tata Consultancy Services, Sahyadri Park SP1 , A1 Auditorium & Zone 3, Rajiv Gandhi Infotech Park, Hinjewadi Phase 3, Pune - 411057 Job Description Role & Responsibilities: Deep technical expertise in Endpoint security technology domain with demonstrated expertise in one or more of the following areas – EDR, HIPS, Anti-Malware, FIM, Server Protection Proven experience in maintaining endpoint security solutions across enterprise environments. Provide compliance reports (monthly and based on need) Performing analysis of end-point security needs that contribute to the design, integration, and installation of hardware and software. Analysis, troubleshooting and development of solutions to end-point security problems. Excellent troubleshooting skills Creation of SOPs for daily operations of endpoint security tools and services Monitoring security advisory groups to ensure all necessary security updates, patches and preventive measures are in place. Support forensics activates and requirements. Show more Show less
Posted 1 week ago
5.0 - 8.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. Role**: Endpoint Security Desired Skill Set Any: McAfee, Trellix, Symantec, EDR, Carbon Black Experience Range : 5 to 8 years Joining Location : PAN India We are currently planning to do a Walk-In Interview on 14th June 2025 at TCS Bengaluru. Date - 14th June 2025 (Saturday) Venue - Tata Consultancy Services, Think Campus , JRD Auditorium Cafteria, Electronic City, Bangalore. Job Description Role & Responsibilities: Deep technical expertise in Endpoint security technology domain with demonstrated expertise in one or more of the following areas – EDR, HIPS, Anti-Malware, FIM, Server Protection Proven experience in maintaining endpoint security solutions across enterprise environments. Provide compliance reports (monthly and based on need) Performing analysis of end-point security needs that contribute to the design, integration, and installation of hardware and software. Analysis, troubleshooting and development of solutions to end-point security problems. Excellent troubleshooting skills Creation of SOPs for daily operations of endpoint security tools and services Monitoring security advisory groups to ensure all necessary security updates, patches and preventive measures are in place. Support forensics activates and requirements. Show more Show less
Posted 1 week ago
2.0 - 5.0 years
0 Lacs
India
On-site
Overview: ormation Security Analyst: Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Researches attempted or successful efforts to compromise systems security and designs countermeasures. Maintains hardware, software and network firewalls and encryption protocols. Administers security policies to control physical and virtual access to systems. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Job Code Tip: May be internal or external, client-focused, working in conjunction with Professional Services and outsourcing functions. May include company-wide, web-enabled solutions. Individuals whose primary focus is on developing, testing, debugging and deploying code or processing routines that support security protocols for an established system or systems should be matched to the appropriate Programmer or Programmer/Analyst family in the Information Technology/MIS functional area. Responsibilities: Should have process knowledge and technical knowledge on any of the SIEM tools ( like Qradar, LogRhythm, AlienVault, Splunk…etc). L2/L3 level is added advantage. Should have process knowledge and technical knowledge in AV tools like Symantec, McAfee, Trend Micro…etc. L2/L3 level is added advantage. Should have knowledge in managing Vulnerability tools and various remediation efforts. Review security logs generated by applications, devices and other systems, taking action or escalating to appropriate teams as needed. Enforce incident response service level agreement. Work with the global IT Security team to analyze, test and recommend tools to strengthen the security posture of the company Create and maintain operational reports allowing IT management team to understand the current and historical landscape of the IT security risks Vulnerability management assessment and remediation Participate in daily and ad-hoc meetings related to cyber security, controls and compliance, processes and documentation related tasks Research the latest information technology (IT) security trends Help plan and carry out an organization’s way of handling security Develop security standards and best practices for the organization Recommend security enhancements to management or senior IT staff Document security breaches and assess the damage they cause. Performs other duties as assigned Qualifications: B. Tech, B.E or M.C.A 2-5 years’ Experience working in a Security Operations Center 2 years minimum in the computer industry Knowledge working with complex Windows environments Knowledgeable in various security frameworks such as NIST 800-53 / NIST 800-171 / ISO27001 Knowledge in design and administration of security tools Good written and verbal communication skills
Posted 1 week ago
2.0 - 5.0 years
4 - 8 Lacs
Noida
On-site
Job Description Summary In our global IT software delivery centers, we are looking System Admins and Cyber Security Engineers. The System Admin will work with teams comprised of Software Engineers, Quality Engineers, User Interaction Design Engineers, Infrastructure/Platform team, and the Product Owners to help lead the technical insight and industry perspective in the creation, delivery, and integration of complex and comprehensive security solutions. You will be a security evangelist helping engineers in secure implementation of technology stack in a cloud environment. This position will be working on multiple projects as a technical expert or internal consultant. You will work on projects for components of the domain. You will work on multiple technical or functional domains. Job Description In this role you will: Participate in the domain technical and business discussions relative to future architect direction. Assist in the analysis, design and development of a roadmap and implementation based upon a current vs. future state in a cohesive architecture viewpoint. Gather and analyze data and develop architectural requirements at project level. Participate in the infrastructure architecture governance model. Support design and deployment of infrastructure solutions meeting standardization, consolidation, TCO, security, regulatory compliance and application system qualities, for different businesses. Support in the technical authority ongoing administration and incident management support of core infrastructure [network, security, and virtualization, patching, monitoring, backups] technologies that underpin Software Solutions Factories; Support for operating and maintaining security tools. Running and analyzing vulnerability and compliance scans to support continuous monitoring reporting and vulnerability management. Improve the effectiveness and efficiency of IT operations and drive significant operational, risk management, and economic benefits for their organization. Quality process: Ensure all tasks are carried out with respect to applicable processes and procedures [e.g. ISO9001 and ISO27001] applicable to site[s] and functions within job scope Desired Characteristics Technical Expertise: Ability and willingness to travel Fluent English speaker; Degree in Computer Science or equivalent knowledge with 2 to 5 years experience Proven track record of problem analysis, identification and resolution Excellent communication skills, commitment, discipline, positive attitude, following management prioritization, accountability and flexibility Strong understanding of ITIL and change management policies and procedures Strong IT experience in a technical hands-on position Basic knowledge about anti-virus implementations (McAfee EPO, Bitdefender, Microsoft Forefront, etc.) Basic knowledge working with IPAMs and password solutions Basic knowledge about Cyber/Security foundation Basic Knowledge in design of computing or network or storage to meet business application system qualities Basic Understands technical and business discussions relative to future architecture direction aligning with business goals. Basic Understands concepts of setting and driving architecture direction. Familiar with elements of gathering architecture requirements. Understands architecture standards concepts to apply to project work. Personal Attributes: Applies values, policies, procedures and precedent to make timely, routine decisions of limited, clear choice. Reacts open-mindedly to new perspectives or ideas. Considers different or unusual solutions when appropriate. Resolves day-to-day issues related to strategy implementation. Escalates issues that impact the client and/or strategic initiatives. Additional Information Relocation Assistance Provided: Yes
Posted 1 week ago
2.0 years
0 Lacs
Gurugram, Haryana, India
On-site
Amazing oppurtunity for candidates who can join our team by JULY end !!! JD for the Position: Analyst/Consultant/ Associate Consultant Individual must have a high-level of understanding of HITRUST Common Security Framework (CSF) Controls and HIPAA. Will have responsibilities that include standard project execution and client service activities. Responsibilities and Duties: Plan and execute engagements under the direction of a member of the management team Lead assessments and onsite testing Lead scoping discussions about system boundaries Communicate clearly with clients regarding evidences/ required documentation Experience Requirements: Excellent interpersonal and written communication skills Demonstrated ability to work effectively with a multi-disciplinary set of stakeholders with minimal supervision Strong project management skills with demonstrated ability to effectively manage multiple initiatives and priorities Strong understanding of the business impact of processes, policies, tools, as well as high proficiency in how to assess risk and business impact Ability to evaluate issues/problems of high complexity and make required decisions Strong team player skills with demonstrated experience to work collaboratively and effectively, across various levels in an organization Strong understanding of processes, technology, and operational concepts related to IT and Information risk management 2+ years of relevant Information Security / IT Audit and compliance experience Experience of 1-2 HITRUST/ HIPAA assessments Good knowledge of incident management, disaster recovery, and business continuity management, cryptography, third party risk management, SDLC standards/frameworks, anti-virus solutions (e.g., Symantec, McAfee, etc.) Good to have prior Big-4 experience Preferred Qualification Familiarity with the HITRUST CSF or another security framework methodology, such as NIST,ISO, COBIT, ITIL, etc. Bachelor's degree or equivalent work experience Preferred but Optional Professional certifications: HITRUST CCSF , HITRUST CHQP, CISA, and CISSP. Show more Show less
Posted 1 week ago
3.0 years
0 Lacs
New Delhi, Delhi, India
Remote
Deadline for applications is 23/06/2025: at 12.00 hours (midday, Brussels time). WE ARE The European External Action Service (EEAS) is the EU's diplomatic service. The EEAS supports the High Representative in the exercise of her mandate to conduct and implement an effective and coherent Union’s Common Foreign and Security Policy (CFSP), to represent the EU and to chair the Foreign Affairs Council. It also supports the High Representative in her capacity as Vice-President of the Commission with regard to her responsibilities within the Commission in the external relations field, including the coordination of other aspects of the EU's external action. The EEAS works in close cooperation with the EU Member States, the General Secretariat of the Council, the services of the Commission and the Secretariat General of the European Parliament. The EU currently has 145 Delegations, 9 of which are to international organisations. In all, 6000 staff are currently serving in these Delegations. The Delegations are placed under the authority of the High Representative of the Union for Foreign Affairs and Security Policy, who is also Vice President of the European Commission. The work of a Delegation varies from country to country but, in general, covers political matters, press and information, trade, aid management and the external aspects of internal EU policies. The main mission of the Digital Solutions Division is to assist the European External Action Service and the worldwide network of EU Delegations in achieving its strategic objectives by supporting administrative and core business processes with modern Information and Communication Technology tools. The unit is composed of 50 officials and more than 200 experts and is organised in four sections: Management, IT Operations, Services and Security. WE PROPOSE The position of Regional IT Officer (RITO), contract agent FG III as per article 3a of the Conditions of Employment of Other Servants of the European Union (hereafter, the “CEOS”). PLACE OF EMPLOYMENT City, COUNTRY: Addis Ababa, ETHIOPIA LCA: 35% POST AVAILABLE: immediately LEGAL BASIS The vacancy is to be filled in accordance with the conditions foreseen in the relevant provisions of the CEOS[1], in particular Article 82 thereof. Subject to having passed the CAST[2] exam, the successful candidate will be offered a contract agent position (Function Group III), as per Article 3a of the Conditions of Employment of Other Servants of the European Union (CEOS), on the basis of a contract with an initial duration of 3 years. This contract may be renewed not more than once for a fixed period of not more than 5 years. Any further renewal shall be for an indefinite period.[3] WE LOOK FOR Under the authority of the Head of Delegation (HOD) and under the direct responsibility of the Head of Administration (HOA), and the direct instructions of the Digital Solutions Division EEAS.RM.SCS.5, the RITO will be responsible for the day-to-day running of the IT infrastructure and IT support of the users of the Delegation and other Delegations in the region. The Main Tasks To Be Executed Are End-User Support Provide level 1 to level 3 IT support to staff in the assigned Delegations and (if applicable) support and supervise local IT staff. Ensure defined processes are well followed by the IT staff (proper use of ITSM tools). Responsible for normal/expected IT operations for users, with minimal business impact and according to the urgency of the incident. Ensure the proper registration, by using the ticketing tool, all IT incidents and service requests reported to the IT Officer, whenever unable to provide a solution, escalate to the appropriate higher level of support. Ensure, follow-up, implement solutions, and in general, participate in the Incident and Request Fulfillment processes actively. Resolve incidents or service requests, both rapidly and in a satisfactory way (through either a permanent fix or a temporary workaround). Maximise the number of tickets resolved without 2nd/3rd level intervention. Assist, if requested, in the configuration of the PABX (Private Automatic Branch Exchange) system and assist with telephone handsets (change of name, hunt group, voicemail) and in using the telephone system. To monitor the ICT status of the Delegation using the provided monitoring tools: SolarWinds, McAfee reports, SCCM patching reports, etc. ICT infrastructure management Ensure the implementation and perform daily operations of the server infrastructure, their maintenance, upgrades, updates, backups, restores, capacity planning, security and audit, incident and problem management. Manage shared resources (disks, printers); assign rights to users; create and maintain necessary automation scripts. Manage the internal LAN, the IP address allocation and other network equipment. In general, take the necessary measures to ensure a high level of quality and availability in the ICT infrastructure. Monitor closely the status of the IT infrastructure and react properly to incidents and outages. Install and manage the Wifi infrastructure of the Delegations. ICT equipment management Deploy the new PC/Laptops Reference configurations, software updates, etc. via the provided tools and procedures (SCCM) in coordination with HQ support and local IT Support. Manage the stock of laptops for staff members going on missions – recuperation and clean-up of laptops when returned after the missions. ICT security management Apply the security policies decided by the Headquarter and propose additional measures if necessary. Manage whenever necessary the accounts, keeping updated the different directories. Ensure that all precautions are taken concerning sensitive information. In general, implement the necessary measures to keep a high level of IT security in the office. ICT advice and management Organise and/or attend meetings on day-to-day matters related with the IT operation, participate in discussions, assessing the impact of changes and make recommendations. Assist the Head of Administration with budget related expenditure estimates, in the preparation, maintaining of office budgets and servicing costs. Assist in the negotiation with suppliers, associated agencies with regard to equipment, cabling, access to Internet etc. Maintain necessary budgetary control records. Prepare a quarterly activity report. Ensure business continuity by remotely managing the ICT infrastructure during absences or missions of other RITOs for the Delegations. Perform missions to Delegations within the region or exceptionally on demand to other regions. Participate in one or more “Centres of Expertise” (COE), according to own expertise on specific IT fields, and provide effective level 1 to 3 IT support to all Delegations. In parallel, participate in global IT projects, related to own expertise, as requested by EEAS RM.SCS.5. Optionally and when requested by EEAS RM.SCS.5, act as "Service Owner" i.e. responsible for the delivery of specific IT services, at global scale. Eligibility criteria [4] According To The Conditions Set Out In Article 82 Of The CEOS And In Article 2 Of The Commission Decision C(2017) 6760 Final[5], Which Is Applicable To The EEAS By Virtue Of The Decision ADMIN(2018) 4 Of The High Representative[6], In Order To Be Eligible For This Post Of Contract Agent FG III, Candidates Must have passed a valid EPSO CAST in FG III; or be registered in the EPSO Permanent CAST for FG III (https://epso.europa.eu/en/job-opportunities/open-for-application). In the latter case, while the registration will render the candidate eligible for the selection procedure, the recruitment of a candidate on this vacant post will be subject to his/her successfully passing the CAST exam; meet the minimum qualifications for engagement as contract agent FG III: (i) Have a level of post-secondary education attested by a diploma; or (ii) a level of secondary education attested by a diploma giving access to post-secondary education, and appropriate professional experience of at least three years; or (iii) where justified in the interest of the service, professional training or professional experience of an equivalent level (related to the nature of the tasks and qualifications indicated in the job description). have the capacity to work in languages of CFSP and external relations (English and French) necessary for the performance of their duties; be a national of one of the Member States of the EU and enjoy full rights as a citizen. Selection criteria Proven Experience In The Following Areas End-user support in front and back office – including ITIL processes. Installation and maintenance of datacentre infrastructure. Knowledge and management of Microsoft OS for endpoints and servers, virtualisation and storage (VMWARE and/or HyperV). Installation and maintenance of enterprise networks (LAN, router, firewalls, wifi, fibre and coper cabling, VOIP technologies, telephony, videoconferencing…). Configuration, maintenance, patching and support of workplace equipment (laptops, desktops, printers, smartphone, tablets) in a large environment including software distribution and (remote) support. General Skills And Competencies Candidates should demonstrate (and will be evaluated on): being service minded; strong communication skills – capacity to translate complex technical matters into “user language”; a sense of initiative, autonomy and hands-on approach; very good organisational skills; capacity to assure quality, speed and accuracy in performing complex tasks in a multicultural environment. Furthermore Experience in handling secure communications and classified information; Knowledge of IT tools used in EU institutions (ARES, MIPS, Sysper2, Syslog, etc.); Experience of working in a team in multi-disciplinary and multi-cultural environment will be considered as assets. Working languages Fluent in English (written and orally); Knowledge of French and other EU languages, and knowledge of the language(s) of the country of the Delegation will be considered an asset. POSTING POLICY EEAS career development policy places the need for staff to develop a mix of competences at its core, e.g. working in various fields of expertise and responsibilities in the course of a person's career, including postings at Headquarters and Delegations. Contract staff in Delegations is usually posted for 2, 3, 4 or 6 years in a given EU Delegation. Call for interest to apply for postponement or early mobility will be launched annually prior to the publication of the mobility exercise. Staff are reminded that extension and early mobility are not a right. Contract staff assigned to a post where the living conditions allowance (LCA) determined in accordance with Article 10 of Annex X to the Staff Regulations of Officials of the EU (SR) is 30% or 35% may participate in the mobility exercise after 4 years . Contract staff assigned to a post where the LCA is 40% may participate in the mobility exercise after 3 years . Contract staff assigned to a non-family post may participate in the mobility exercise after 2 years . For candidates currently posted in compound-confined, non-family posting, please refer to Article 6, point 2(g) of the Decision ADMIN(2021) 221. Within the mobility exercise, contract staff may be temporarily assigned to the EEAS Headquarters in Brussels; such assignment shall remain exceptional and depends on the availability of posts. The assignment shall be for no less than two years, unless a derogation is granted by the Head of the Division RM.BHR.3 ‘Selection and Recruitment’ in the interest of the service. The assignment shall be for no more than four years, in accordance with Article 118 of the CEOS and Article 3 of Annex X to the SR. The member of contract staff temporarily assigned to the EEAS Headquarters shall be included in the mobility exercise in time to be reassigned to a Union Delegation before he/she reaches the maximum period of 4 years. Candidates currently in the EEAS Headquarters are expected to have served at least three years in the Headquarters by the expected time of posting in Delegation. Derogation to this rule may only be granted by the competent Authority Authorised to Conclude Contracts of Employment (AACC) in the interest of the service. External candidates may also apply to any vacancy position published for posts in Delegations. It is in the interest of the service to ensure that staff members in Delegations are able to complete full postings before reaching the age of retirement. Before taking any final decisions on nominations, the competent AACC will ensure on a case-by-case basis, in accordance with the SR and CEOS, that the successful candidates will indeed be able to complete the relevant full posting for the post for which they are selected. As stated in Article 6(2)(a) of the Decision ADMIN(2020) 35, applications from candidates not fulfilling this requirement will be examined by the AACC for exceptional and justified reasons and in the interest of the service. CONDITIONS OF RECRUITMENT AND EMPLOYMENT CONFLICT OF INTEREST AND SECURITY RISKS As a matter of policy, applications of individuals who have the dual nationality of the host country or whose family member has the nationality of the host country will be considered eligible for a posting in that host country only as a positive result of a case-by-case assessment. In that regard, the EEAS examines if there could be a conflict of interest and a risk of a possible refusal by the host country to grant diplomatic immunity to the staff member and or his/her partner and/or family, as well as possible security risks. In this context, candidates shall fill in with their application a declaration of potential conflict of interest (see the annex to this vacancy notice). PERSONNEL SECURITY CLEARANCE The requested level of security clearance for this post is: SECRET UE/EU SECRET. A description of the EU classified information levels is available under Article 2 of Annex A of the Decision ADMIN(2023) 18 on the security rules of the EEAS[7]. The selected candidate should hold, or be in the position to obtain, a valid Personnel Security Clearance (PSC)[8] issued by the competent authority of the Member State concerned. Candidates who do not already have a valid PSC will be required to go through the security clearance vetting procedure of their Member State to obtain this clearance in accordance with national laws and regulations and with the procedure laid down in the Decision ADMIN(2019) 7 of the Director General for Budget and Administration of the EEAS on Security Clearance Requirements and Procedures for the EEAS[9] and in Annex A I of the Decision ADMIN(2023) 18 on the security rules of the EEAS. Until the PSC is issued by the competent authority of the Member State concerned, the selected candidate will not be authorised to access EUCI at the level of CONFIDENTIEL UE/EU CONFIDENTIAL or above, or to participate in any meetings or workflow where EUCI is processed. Please note that the necessary procedure for obtaining a PSC can be initiated on request of the employer only, and not by the individual candidate. In case of failure to obtain or renew the required PSC, the AACC may take the appropriate measures in accordance with Article 3(3) of the Decision ADMIN(2019) 7. MEDICAL CLEARANCE The signature of the contract will be subject to prior favourable opinion of the Medical Service . On that occasion, the candidate should indicate any serious health problems or requirements for specialised medical treatment for themselves and/or for the individuals who will accompany them. If staff members withhold such information they will not benefit from a reimbursement by the institution of certain costs, e.g. expenses relating to medical evacuation, or to a return to Headquarters in the case of early mobility. Prior to recruitment, the successful candidate will be contacted by our services in order to fulfil the relevant medical requirements for the post as appropriate, including a psychological assessment which the AACC reserves the right to request. Other Candidates are deemed to be fully aware of the provisions of Annex X to the Staff Regulations, which applies to staff serving in Delegations located outside the EU, regarding their rights and obligations (i.e. leave entitlements, allowances, reimbursement of expenses, social security benefits). Candidates are deemed to be fully aware of the local living conditions , including inter alia information concerning security, health care, education, social acceptance of sexual orientation, employment opportunities for spouses and the accommodation provided (Annex X to the SR, Article 5 or 23), before applying. Candidates are strongly encouraged to consult the relevant Country Post reports which are available from the Division RM.01 ‘Coordination’: RM-01-COORDINATION@eeas.europa.eu All postings will in principle be aligned with the mobility cycle and have the 31 August of a given year as end date. Successful candidates shall participate in all compulsory pre-posting training . All posts in an EU Delegation require the successful completion of BASE, a security e-learning. The ‘Hostile Environment Awareness Training’ (HEAT) is compulsory before taking up duty/going on mission in some countries. The EEAS will provide the selected candidate with that possibility in case she or he has not yet followed the training. EQUAL OPPORTUNITIES The EEAS is committed to an equal opportunities policy for all its employees and applicants for employment. As an employer, the EEAS is committed to promoting gender equality and to preventing discrimination on any grounds. It actively welcomes applications from all qualified candidates from diverse backgrounds and from the broadest possible geographical basis amongst the EU Member States. We aim at a service which is truly representative of society, where each staff member feels respected, is able to give their best and can develop their full potential. Candidates with disabilities are invited to contact the Functional mailbox CONTRACTAGENTS-DELEGATIONS@eeas.europa.eu in order to accommodate any special needs and provide assistance to ensure the possibility to pass the selection procedure in equality of opportunities with other candidates. If a candidate with a disability is selected for a vacant post, the EEAS is committed to providing reasonable accommodation in accordance with Art 1d(4) of the SR. APPLICATION AND SELECTION PROCEDURE [10] The Procedure Will Take Place In Three Steps Application Before submitting their application, candidates should carefully check whether they meet all the eligibility criteria in order to avoid automatic exclusion from the selection procedure. Equally, candidates are deemed to be fully aware of the local living conditions, including information concerning the accommodation, before applying. Individual post reports are available from the Division RM.01 ‘Coordination’: RM-01-COORDINATION@eeas.europa.eu Candidates should also ensure that they are fully aware of the relevant security provisions; Personal Security Clearance at the level SECRET UE/EU SECRET is requested in all EU Delegations. Successful candidates will be required to undergo security vetting if they do not already hold security clearance to the appropriate level in accordance with the EEAS relevant security provisions (for more information, see Section “Personal Security Clearance” below). During the application procedure, candidates are required to send the following documents: an up-to-date Curriculum Vitae (preferably using the Europass CV format), in either English or French, indicating clearly your EPSO CAST number; a letter of motivation (maximum 2 pages), in either English or French; declaration of potential conflict of interest (annexed to this vacancy note). Applications should be submitted to the EEAS Digital Solutions Division, RM.SCS.5, at the following email address: RM-SCS-5-HR@eeas.europa.eu Deadline for applications is 23/06/2025: at 12.00 hours (midday, Brussels time) . Candidates are strongly advised to submit their application as early as possible. Late applications will not be accepted. For correspondence concerning the selection procedure, please use the following email address: CONTRACTAGENTS-DELEGATIONS@eeas.europa.eu Pre-selection The selection panel will make a pre-selection on the basis of the qualifications and the professional experience described in the CV and motivation letter, and will produce a shortlist of eligible candidates who best meet the selection criteria for the post. Please note that only shortlisted candidates will be informed about the outcome of the pre-selection phase. Selection The candidates who have been preselected will be invited for an interview by a selection panel. The selection panel may decide, in addition to the interview, to organise written tests, either for all pre-selected candidates or to the best ranked ones. The content of such written tests will be defined by the selection panel and may include, but not be limited to, multiple choice questions, open questions and/or topics for a short essay. Pre-selected candidates without a valid CAST shall be invited to sit the CAST exam before or after the interview stage (in accordance with the eligibility criteria set out above). The panel will recommend a shortlist of candidates for a final decision by the AACC. The AACC may decide to interview the candidates on the final shortlist before taking this decision. It is recalled that the selection procedure may be terminated at any stage in the interest of the service. In the interest of the service, the AACC may also establish a reserve list of candidates. These candidates shall be informed that the reserve list shall remain valid for a period of one year from when it is established and that it may be used to fill an equivalent post in the EEAS having the same job profile. ADDRESS FOR INQUIRIES CONTRACTAGENTS-DELEGATIONS@eeas.europa.eu [1] The Text Of The Staff Regulations Of Officials Of The EU And The CEOS Is Accessible At The Following Link https://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1570023902133&uri=CELEX:01962R0031-20190101 [2] Contract Agent Selection Tool. [3] In accordance with Article 85(1) of the CEOS. [4] All the eligibility criteria must be met on the closing date for applications to this post. [5] Commission Decision C(2017) 6760 final of 16 October 2017 on the general provisions for implementing Article 79(2) of the CEOS, governing the conditions of employment of contract staff employed by the Commission under the terms of Articles 3a and 3b. [6] Decision ADMIN(2018) 4 of the High Representative of the Union for Foreign Affairs and Security Policy of 12 March 2018 amending Annex I of the Decision of the High Representative PROC HR(2011) 013 on General Implementing Provisions for giving effect to the Staff Regulations and to the Conditions of Employment of Other Servants. [7] OJ C 263, 26 July 2023, p.16. [8] The ‘Personnel Security Clearance’ is defined under point 2 of Annex A I of the Decision ADMIN(2023) 18 on the security rules of the EEAS as “a statement by a competent authority of a Member State which is made following completion of a security investigation conducted by the competent authorities of a Member State and which certifies that an individual may, provided his ‘need-to-know’ has been determined, be granted access to EUCI up to a specified level (CONFIDENTIEL UE/EU CONFIDENTIAL or above) until a specified date; the individual thus described is said to be ‘security cleared’.” [9] Decision ADMIN(2019) 7 of the Director General for Budget and Administration of the EEAS of 8 March 2019 on Security Clearance Requirements and Procedures for the EEAS. [10] Your personal data will be processed in accordance with Regulation (EU) 2018/1725, as implemented by the Decision ADMIN(2019) 8 of the High Representative of the Union for Foreign Affairs and Security Policy on implementing rules relating to the protection of personal data by the EEAS and the application of Regulation. The privacy statement is available on the Europa website (https://www.eeas.europa.eu/eeas/eeas-privacy-statement-data-protection-notice-purpose-processing-personal-data-related-public_en) and on the EEAS Intranet (https://intranet.eeas.europa.eu/page/eeas-work/data-protection/privacy-statements-dp-notices). Show more Show less
Posted 1 week ago
2.0 - 5.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Job Description Summary In our global IT software delivery centers, we are looking System Admins and Cyber Security Engineers. The System Admin will work with teams comprised of Software Engineers, Quality Engineers, User Interaction Design Engineers, Infrastructure/Platform team, and the Product Owners to help lead the technical insight and industry perspective in the creation, delivery, and integration of complex and comprehensive security solutions. You will be a security evangelist helping engineers in secure implementation of technology stack in a cloud environment. This position will be working on multiple projects as a technical expert or internal consultant. You will work on projects for components of the domain. You will work on multiple technical or functional domains. Job Description In this role you will: Participate in the domain technical and business discussions relative to future architect direction. Assist in the analysis, design and development of a roadmap and implementation based upon a current vs. future state in a cohesive architecture viewpoint. Gather and analyze data and develop architectural requirements at project level. Participate in the infrastructure architecture governance model. Support design and deployment of infrastructure solutions meeting standardization, consolidation, TCO, security, regulatory compliance and application system qualities, for different businesses. Support in the technical authority ongoing administration and incident management support of core infrastructure [network, security, and virtualization, patching, monitoring, backups] technologies that underpin Software Solutions Factories; Support for operating and maintaining security tools. Running and analyzing vulnerability and compliance scans to support continuous monitoring reporting and vulnerability management. Improve the effectiveness and efficiency of IT operations and drive significant operational, risk management, and economic benefits for their organization. Quality process: Ensure all tasks are carried out with respect to applicable processes and procedures [e.g. ISO9001 and ISO27001] applicable to site[s] and functions within job scope Desired Characteristics Technical Expertise Ability and willingness to travel Fluent English speaker; Degree in Computer Science or equivalent knowledge with 2 to 5 years experience Proven track record of problem analysis, identification and resolution Excellent communication skills, commitment, discipline, positive attitude, following management prioritization, accountability and flexibility Strong understanding of ITIL and change management policies and procedures Strong IT experience in a technical hands-on position Basic knowledge about anti-virus implementations (McAfee EPO, Bitdefender, Microsoft Forefront, etc.) Basic knowledge working with IPAMs and password solutions Basic knowledge about Cyber/Security foundation Basic Knowledge in design of computing or network or storage to meet business application system qualities Basic Understands technical and business discussions relative to future architecture direction aligning with business goals. Basic Understands concepts of setting and driving architecture direction. Familiar with elements of gathering architecture requirements. Understands architecture standards concepts to apply to project work. Personal Attributes Applies values, policies, procedures and precedent to make timely, routine decisions of limited, clear choice. Reacts open-mindedly to new perspectives or ideas. Considers different or unusual solutions when appropriate. Resolves day-to-day issues related to strategy implementation. Escalates issues that impact the client and/or strategic initiatives. Additional Information Relocation Assistance Provided: Yes Show more Show less
Posted 1 week ago
2.0 - 5.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Job Description Summary In our global IT software delivery centers, we are looking System Admins and Cyber Security Engineers. The System Admin will work with teams comprised of Software Engineers, Quality Engineers, User Interaction Design Engineers, Infrastructure/Platform team, and the Product Owners to help lead the technical insight and industry perspective in the creation, delivery, and integration of complex and comprehensive security solutions. You will be a security evangelist helping engineers in secure implementation of technology stack in a cloud environment. This position will be working on multiple projects as a technical expert or internal consultant. You will work on projects for components of the domain. You will work on multiple technical or functional domains. Job Description In this role you will: Participate in the domain technical and business discussions relative to future architect direction. Assist in the analysis, design and development of a roadmap and implementation based upon a current vs. future state in a cohesive architecture viewpoint. Gather and analyze data and develop architectural requirements at project level. Participate in the infrastructure architecture governance model. Support design and deployment of infrastructure solutions meeting standardization, consolidation, TCO, security, regulatory compliance and application system qualities, for different businesses. Support in the technical authority ongoing administration and incident management support of core infrastructure [network, security, and virtualization, patching, monitoring, backups] technologies that underpin Software Solutions Factories; Support for operating and maintaining security tools. Running and analyzing vulnerability and compliance scans to support continuous monitoring reporting and vulnerability management. Improve the effectiveness and efficiency of IT operations and drive significant operational, risk management, and economic benefits for their organization. Quality process: Ensure all tasks are carried out with respect to applicable processes and procedures [e.g. ISO9001 and ISO27001] applicable to site[s] and functions within job scope Desired Characteristics Technical Expertise Ability and willingness to travel Fluent English speaker; Degree in Computer Science or equivalent knowledge with 2 to 5 years experience Proven track record of problem analysis, identification and resolution Excellent communication skills, commitment, discipline, positive attitude, following management prioritization, accountability and flexibility Strong understanding of ITIL and change management policies and procedures Strong IT experience in a technical hands-on position Basic knowledge about anti-virus implementations (McAfee EPO, Bitdefender, Microsoft Forefront, etc.) Basic knowledge working with IPAMs and password solutions Basic knowledge about Cyber/Security foundation Basic Knowledge in design of computing or network or storage to meet business application system qualities Basic Understands technical and business discussions relative to future architecture direction aligning with business goals. Basic Understands concepts of setting and driving architecture direction. Familiar with elements of gathering architecture requirements. Understands architecture standards concepts to apply to project work. Personal Attributes Applies values, policies, procedures and precedent to make timely, routine decisions of limited, clear choice. Reacts open-mindedly to new perspectives or ideas. Considers different or unusual solutions when appropriate. Resolves day-to-day issues related to strategy implementation. Escalates issues that impact the client and/or strategic initiatives. Additional Information Relocation Assistance Provided: Yes Show more Show less
Posted 1 week ago
0 years
2 - 6 Lacs
Hyderābād
Remote
Job Information Date Opened 06/30/2025 Job Type Full time Industry IT Services City Hyderabad State/Province Telangana Country India Zip/Postal Code 500081 About Us About DATAECONOMY: We are a fast-growing data & analytics company headquartered in Dublin with offices inDublin, OH, Providence, RI, and an advanced technology center in Hyderabad,India. We are clearly differentiated in the data & analytics space via our suite of solutions, accelerators, frameworks, and thought leadership. Job Description Primary Responsibilities Installing, configuring, and troubleshooting of all Windows and mac OS. Securing the network by installing & troubleshooting Antivirus related issues & regularly updating the Antivirus Configuring and Troubleshooting Local & Network Printers. Resolving hardware related issues in printers and other peripherals. Providing the admin rights, Remote desktop access, file and folder access to the users as per the request. Trouble shooting all end-to-end technical problems through the remote tools. Monitoring the compliance status of all the desktops/servers in terms of patch/DAT’s status. Troubleshooting issues on Office365 and escalate to proper team Identifying and solving issues on Microsoft products (EXCEL, POWEPOINT, WORD, TEAMS) Troubleshooting issues on Citrix connections, Client VPN’s. Add devices to AzureAD, create, deploy and managing Intune MDM. Create, deploy, manage the app protection policies, device configuration policies from Intune endpoint manager. Create and manage security firewall, Switches, and ILL. Manage and update McAfee web controls and firewall rules. Maintain and monitor CCTV camera’s, Access control eSSL. Identify the causes of networking problems, using diagnostic testing software and equipment. Resolve IT tickets regarding computer software, hardware, and application issues on time. Set up equipment for employee use, performing or ensuring proper installation of cables, operating systems, or appropriate software. Install and perform minor repairs to hardware, software, or peripheral equipment. Requirements Requirements Good Experience in System administration Technical Support Experience Experience in ITIL process Experience in RIM (Remote Infrastructure Mgmt.) Good knowledge in Virtualization and cloud concepts with VMware and/or Open stack Excellent communication skills Benefits Benefits Standard Company Benefits
Posted 1 week ago
8.0 years
4 - 4 Lacs
Bengaluru
On-site
Join our Team About this opportunity: We are now looking for a Senior Security Engineer professional for our Managed Security team. This job role has accountability for researching, designing, engineering, implementing, and supporting security solutions in partnership with the respective stakeholders within Ericsson and / or customer organization and / or 3rd Party Providers. The professional will work alongside a highly skilled, diverse team, making sure that the information assets, that we are responsible to protect, are secured. What you will do: Design, implement, manage, monitor, and troubleshoot cybersecurity defenses, including configuration management, network security, systems security, and monitoring systems / tools. Participate in planning and audit scope development as well as project execution as a critical team member on complex technology related assessments. Play an active role in the design and execution of infrastructure initiatives to ensure an evolving adherence to industry best practices for information security. Lead the execution of the assessment of specific technical areas of a project, supervising other team members and providing coaching where needed. Perform Security Incident Management, including but not limited to: supporting SIEM tools, integrating logs into the tool, creating and modifying rules, investigating and resolving alerts, automating tasks. Research new and emerging threats to gain insight into the evolving threat landscape, and share knowledge with the team. Promote new ideas and new ways of executing projects and internal infrastructure enhancements. Innovate and automate repetitive activities and corrective actions, including broader automation initiatives. Analyzes and recommends security controls and procedures in business processes related to use of information systems and assets, and monitors for compliance Responds to information security incidents, including investigation of countermeasures to and recovery from computer-based attacks, unauthorized access, and policy breaches; interacts and coordinates with third-party incident responders, including law enforcement The skills you bring: Strong knowledge of information security Strong knowledge of SIEM tools (such as McAfee ESM, QRadar, ArcSight, Splunk, etc.), scanning tools (Nessus, Qualys, IBM AppScan, etc.) and PAM tools (BeyondTrust, CyberArk, etc.) Strong knowledge of both Linux-based and MS Windows-based system platforms with a strong technical understanding and aptitude for analytical problem-solving Strong understanding of enterprise, network, system and application level security issues Strong understanding of enterprise computing environments, distributed applications, and a strong understanding of TCP/IP networks along with available security controls (technical & process controls) for respective layers Good understanding of the system hardening processes, tools, guidelines and benchmarks Fundamental understanding of encryption technologies Participate in the out-of-hours on call rotation, providing technical support to the business for incidents Strong knowledge sharing and collaboration skills Deliver results and meet customer expectations Excellent communication skills; English is a must Key Qualifications: Education: BE/ B.Tech (Telecommunication/ Computer Science) Minimum years of relevant experience: 8 to 15 years experience with at least 8 years in IT and 7 years in Security ITIL certification, CCSP, OSCP, Security +, CISSP or similar will be an advantage Basic knowledge of telecommunications networks will be an added advantage Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? Click Here to find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. Primary country and city: India (IN) || Bangalore Req ID: 768176
Posted 1 week ago
5.0 - 8.0 years
4 - 8 Lacs
Noida
On-site
Job Description Summary In our global IT software delivery centers, we are looking System Admins and Cyber Security Engineers. The System Admin and Cybersecurity Engineer will work with teams comprised of Software Engineers, Quality Engineers, User Interaction Design Engineers, Infrastructure/Platform team, and the Product Owners to help lead the technical insight and industry perspective in the creation, delivery, and integration of complex and comprehensive security solutions. You will be a security evangelist helping engineers in secure implementation of technology stack in a cloud environment. This position will be working on multiple projects as a technical expert or internal consultant. You will work on projects for components of the domain. You will work on multiple technical or functional domains. Job Description In this role you will: Participate in the domain technical and business discussions relative to future architect direction. Assist in the analysis, design and development of a roadmap and implementation based upon a current vs. future state in a cohesive architecture viewpoint. Gather and analyze data and develop architectural requirements at project level. Participate in the infrastructure architecture governance model. Support design and deployment of infrastructure solutions meeting standardization, consolidation, TCO, security, regulatory compliance and application system qualities, for different businesses. Serve as technical authority ongoing administration and incident management support of core infrastructure [network, security, and virtualization, patching, monitoring, backups] technologies that underpin Software Solutions Factories; Responsible for operating and maintaining security tools. Running and analyzing vulnerability and compliance scans to support continuous monitoring reporting and vulnerability management. Improve the effectiveness and efficiency of IT operations and drive significant operational, risk management, and economic benefits for their organization. Quality process: Ensure all tasks are carried out with respect to applicable processes and procedures [e.g. ISO9001 and ISO27001] applicable to site[s] and functions within job scope Desired Characteristics Technical Expertise: Ability and willingness to travel Fluent English speaker; Degree in Computer Science or equivalent knowledge with 5 to 8 years experience Proven track record of problem analysis, identification and resolution Excellent communication skills, commitment, discipline, positive attitude, following management prioritization, accountability and flexibility Strong understanding of ITIL and change management policies and procedures Strong IT experience in a technical hands-on position System administration: Windows and Linux - core competency to install, configure, manage Network hardware: Cisco enterprise hardware. VLAN, ACL, routing and VPN - install, configure, manage Security management: Enterprise firewall equipment e.g. Cisco’s ASA / Fortinet’s Fortigate or equivalent – install, configure, manage Windows / Active Directory Services – install, configure, manage Virtualization: VMware vSphere clusters, experience with HA, DRS, and vStorage backup APIs Storage: Shared NAS/SAN network storage e.g. HP 3PAR/MSA/EVA, EMC DataDomain Backup Technologies Incident response and vulnerability management (NetBackup, BackupExec, Veeam, Networker) Good knowledge about anti-virus implementations (McAfee EPO, Bitdefender, Microsoft Forefront, etc.) Good knowledge working with IPAMs and password solutions Experience in implementing and/or working with monitoring tools, log monitoring tools, log correlation tools.(Nagios, Graylog, Splunk, etc.) Very good Cyber/Security foundation Skilled level expertise in design of computing or network or storage to meet business application system qualities Understands technical and business discussions relative to future architecture direction aligning with business goals. Understands concepts of setting and driving architecture direction. Familiar with elements of gathering architecture requirements. Understands architecture standards concepts to apply to project work. Personal Attributes: Applies values, policies, procedures and precedent to make timely, routine decisions of limited, clear choice. Reacts open-mindedly to new perspectives or ideas. Considers different or unusual solutions when appropriate. Resolves day-to-day issues related to strategy implementation. Escalates issues that impact the client and/or strategic initiatives. Additional Information Relocation Assistance Provided: Yes
Posted 1 week ago
5.0 - 8.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Job Description Summary In our global IT software delivery centers, we are looking System Admins and Cyber Security Engineers. The System Admin and Cybersecurity Engineer will work with teams comprised of Software Engineers, Quality Engineers, User Interaction Design Engineers, Infrastructure/Platform team, and the Product Owners to help lead the technical insight and industry perspective in the creation, delivery, and integration of complex and comprehensive security solutions. You will be a security evangelist helping engineers in secure implementation of technology stack in a cloud environment. This position will be working on multiple projects as a technical expert or internal consultant. You will work on projects for components of the domain. You will work on multiple technical or functional domains. Job Description In this role you will: Participate in the domain technical and business discussions relative to future architect direction. Assist in the analysis, design and development of a roadmap and implementation based upon a current vs. future state in a cohesive architecture viewpoint. Gather and analyze data and develop architectural requirements at project level. Participate in the infrastructure architecture governance model. Support design and deployment of infrastructure solutions meeting standardization, consolidation, TCO, security, regulatory compliance and application system qualities, for different businesses. Serve as technical authority ongoing administration and incident management support of core infrastructure [network, security, and virtualization, patching, monitoring, backups] technologies that underpin Software Solutions Factories; Responsible for operating and maintaining security tools. Running and analyzing vulnerability and compliance scans to support continuous monitoring reporting and vulnerability management. Improve the effectiveness and efficiency of IT operations and drive significant operational, risk management, and economic benefits for their organization. Quality process: Ensure all tasks are carried out with respect to applicable processes and procedures [e.g. ISO9001 and ISO27001] applicable to site[s] and functions within job scope Desired Characteristics Technical Expertise Ability and willingness to travel Fluent English speaker; Degree in Computer Science or equivalent knowledge with 5 to 8 years experience Proven track record of problem analysis, identification and resolution Excellent communication skills, commitment, discipline, positive attitude, following management prioritization, accountability and flexibility Strong understanding of ITIL and change management policies and procedures Strong IT experience in a technical hands-on position System administration: Windows and Linux - core competency to install, configure, manage Network hardware: Cisco enterprise hardware. VLAN, ACL, routing and VPN - install, configure, manage Security management: Enterprise firewall equipment e.g. Cisco’s ASA / Fortinet’s Fortigate or equivalent – install, configure, manage Windows / Active Directory Services – install, configure, manage Virtualization: VMware vSphere clusters, experience with HA, DRS, and vStorage backup APIs Storage: Shared NAS/SAN network storage e.g. HP 3PAR/MSA/EVA, EMC DataDomain Backup Technologies Incident response and vulnerability management (NetBackup, BackupExec, Veeam, Networker) Good knowledge about anti-virus implementations (McAfee EPO, Bitdefender, Microsoft Forefront, etc.) Good knowledge working with IPAMs and password solutions Experience in implementing and/or working with monitoring tools, log monitoring tools, log correlation tools.(Nagios, Graylog, Splunk, etc.) Very good Cyber/Security foundation Skilled level expertise in design of computing or network or storage to meet business application system qualities Understands technical and business discussions relative to future architecture direction aligning with business goals. Understands concepts of setting and driving architecture direction. Familiar with elements of gathering architecture requirements. Understands architecture standards concepts to apply to project work. Personal Attributes Applies values, policies, procedures and precedent to make timely, routine decisions of limited, clear choice. Reacts open-mindedly to new perspectives or ideas. Considers different or unusual solutions when appropriate. Resolves day-to-day issues related to strategy implementation. Escalates issues that impact the client and/or strategic initiatives. Additional Information Relocation Assistance Provided: Yes Show more Show less
Posted 1 week ago
2.0 - 5.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Overview ormation Security Analyst: Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Researches attempted or successful efforts to compromise systems security and designs countermeasures. Maintains hardware, software and network firewalls and encryption protocols. Administers security policies to control physical and virtual access to systems. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Job Code Tip: May be internal or external, client-focused, working in conjunction with Professional Services and outsourcing functions. May include company-wide, web-enabled solutions. Individuals whose primary focus is on developing, testing, debugging and deploying code or processing routines that support security protocols for an established system or systems should be matched to the appropriate Programmer or Programmer/Analyst family in the Information Technology/MIS functional area. Responsibilities Should have process knowledge and technical knowledge on any of the SIEM tools ( like Qradar, LogRhythm, AlienVault, Splunk…etc). L2/L3 level is added advantage. Should have process knowledge and technical knowledge in AV tools like Symantec, McAfee, Trend Micro…etc. L2/L3 level is added advantage. Should have knowledge in managing Vulnerability tools and various remediation efforts. Review security logs generated by applications, devices and other systems, taking action or escalating to appropriate teams as needed. Enforce incident response service level agreement. Work with the global IT Security team to analyze, test and recommend tools to strengthen the security posture of the company Create and maintain operational reports allowing IT management team to understand the current and historical landscape of the IT security risks Vulnerability management assessment and remediation Participate in daily and ad-hoc meetings related to cyber security, controls and compliance, processes and documentation related tasks Research the latest information technology (IT) security trends Help plan and carry out an organization’s way of handling security Develop security standards and best practices for the organization Recommend security enhancements to management or senior IT staff Document security breaches and assess the damage they cause. Performs other duties as assigned Qualifications B. Tech, B.E or M.C.A 2-5 years’ Experience working in a Security Operations Center 2 years minimum in the computer industry Knowledge working with complex Windows environments Knowledgeable in various security frameworks such as NIST 800-53 / NIST 800-171 / ISO27001 Knowledge in design and administration of security tools Good written and verbal communication skills Show more Show less
Posted 1 week ago
4.0 - 9.0 years
14 - 19 Lacs
Bengaluru
Work from Office
About Target As a Fortune 50 company with more than 400,000 team members worldwide, Target is an iconic brand and one of America's leading retailers. At Target, we have a timeless purpose and a proven strategy and that hasn t happened by accident. Some of the best minds from diverse backgrounds come together at Target to redefine retail in an inclusive learning environment that values people and delivers world-class outcomes. That winning formula is especially apparent in Bengaluru, where Target in India operates as a fully integrated part of Target s global team and has more than 4,000 team members supporting the company s global strategy and operations. Joining Target means promoting a culture of mutual care and respect and striving to make the most meaningful and positive impact. Becoming a Target team member means joining a community that values diverse backgrounds. We believe your unique perspective is important, and you'll build relationships by being authentic and respectful. At Target, inclusion is part of the core value. We aim to create equitable experiences for all, regardless of their dimensions of difference. As an equal opportunity employer, Target provides diverse opportunities for everyone to grow and win. About Target Tech Every time a guest enters a Target store or browses Target.com, they experience the impact of Target s investments in technology and innovation. We re the technologists behind one of the most loved retail brands, delivering joy to millions of our guests, team members, and communities. The Sr. Engineering Manager (SEM) is responsible for a managing a team of engineers. This role is accountable for leading a team, developing code, deploying and managing in production. You will be called upon to be the technical representative for your team during cross-team collaborative efforts and planning. Success in this role will require strong and innovative approaches to problem solving, great technical leadership, excellent communication (written and verbal, formal and informal), flexibility, accountability and a self-motivated working style with attention to detail. About Team Our mission is two-foldwe protect the hundreds of thousands of Target endpoints (such as user laptops, in store devices, distribution center technology, servers and containers) from cyber threats while balancing the stability and functionality needs of Target s technology environment. To do this, we use a combination of vendor tools, in-house developed utilities and strong organizational partnerships to achieve shared goals. Use your skills, experience and talents to be a part of groundbreaking thinking and visionary goals. As a Sr. Engineering Manager, you ll take the lead as you Optimize a suite of products to secure Target endpoints. Use innovation and critical thinking to solve complex security and technology problems. Test the efficacy of tools by leveraging adversary emulation tools. Establish good stakeholder relationships and work closely with Tech teams, influence the product roadmap and help drive requirements while being a strong advocate of agile and DevOps practices across the team. Execution of the team-developed strategy, solving enterprise-wide problems and addressing key security concerns. Provide career development and performance management to a team of engineers. Industry endpoint security domain expert, benchmarking with other retailers and companies, staying on top of new trends and technology in a quickly-moving space. About you 4 year degree in Computer Science or equivalent experience 9+ years of engineering experience 1-3 years of managing teams with a strong track record of delivery for cross-functional products Strong written and verbal communication skills with the ability to present complex technical information in a clear and concise manner to variety of audiences Team-orientated, passionate about developing others skills and capabilities Successful track record of working in large enterprise technology ecosystems leading complex technology teams Deep understanding of agile development processes and methodology including continuous integration and delivery, with a mindset of building incrementally and delivering business value quickly Strong collaboration skills, effective management of complex cross-team initiatives and leads with the desire to enable our engineering teams.
Posted 1 week ago
8.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Join our Team About this opportunity: We are now looking for a Senior Security Engineer professional for our Managed Security team. This job role has accountability for researching, designing, engineering, implementing, and supporting security solutions in partnership with the respective stakeholders within Ericsson and / or customer organization and / or 3rd Party Providers. The professional will work alongside a highly skilled, diverse team, making sure that the information assets, that we are responsible to protect, are secured. What you will do: Design, implement, manage, monitor, and troubleshoot cybersecurity defenses, including configuration management, network security, systems security, and monitoring systems / tools. Participate in planning and audit scope development as well as project execution as a critical team member on complex technology related assessments. Play an active role in the design and execution of infrastructure initiatives to ensure an evolving adherence to industry best practices for information security. Lead the execution of the assessment of specific technical areas of a project, supervising other team members and providing coaching where needed. Perform Security Incident Management, including but not limited to: supporting SIEM tools, integrating logs into the tool, creating and modifying rules, investigating and resolving alerts, automating tasks. Research new and emerging threats to gain insight into the evolving threat landscape, and share knowledge with the team. Promote new ideas and new ways of executing projects and internal infrastructure enhancements. Innovate and automate repetitive activities and corrective actions, including broader automation initiatives. Analyzes and recommends security controls and procedures in business processes related to use of information systems and assets, and monitors for compliance Responds to information security incidents, including investigation of countermeasures to and recovery from computer-based attacks, unauthorized access, and policy breaches; interacts and coordinates with third-party incident responders, including law enforcement The skills you bring: Strong knowledge of information security Strong knowledge of SIEM tools (such as McAfee ESM, QRadar, ArcSight, Splunk, etc.), scanning tools (Nessus, Qualys, IBM AppScan, etc.) and PAM tools (BeyondTrust, CyberArk, etc.) Strong knowledge of both Linux-based and MS Windows-based system platforms with a strong technical understanding and aptitude for analytical problem-solving Strong understanding of enterprise, network, system and application level security issues Strong understanding of enterprise computing environments, distributed applications, and a strong understanding of TCP/IP networks along with available security controls (technical & process controls) for respective layers Good understanding of the system hardening processes, tools, guidelines and benchmarks Fundamental understanding of encryption technologies Participate in the out-of-hours on call rotation, providing technical support to the business for incidents Strong knowledge sharing and collaboration skills Deliver results and meet customer expectations Excellent communication skills; English is a must Key Qualifications: Education: BE/ B.Tech (Telecommunication/ Computer Science) Minimum years of relevant experience: 8 to 15 years experience with at least 8 years in IT and 7 years in Security ITIL certification, CCSP, OSCP, Security +, CISSP or similar will be an advantage Basic knowledge of telecommunications networks will be an added advantage Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? Click Here to find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. Primary country and city: India (IN) || Noida Req ID: 768174 Show more Show less
Posted 1 week ago
6.0 years
0 Lacs
Kolkata, West Bengal, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Threat Detection & Response Consulting - Security Orchestration, Automation and Response (SOAR) - Senior KEY Capabilities: Excellent teamwork skills, passion and drive to succeed and combat Cyber threats Working with the customer to identify security automation strategies and provide creative integrations and playbooks. Work collaboratively with other team members to find creative and practical solutions to customers’ challenges and needs. Expertise in design and implementation of SOAR solution such as Phantom (Preferable), Demisto or Resilient Responsible for execution and maintenance of SOAR related analytical processes and tasks Manage and administration of SOAR platforms Hands-on experience with Incident Response and Threat Intelligence tools. Creation of reusable and efficient Python-based Playbooks. Use Phantom platform to enable automation and orchestration on various tools and technologies by making use of existing or custom integration Partner with security operations teams, threat intelligence groups and incident responders. Should have worked in a security operations center and gained understanding of SIEM and other log management platforms. Having experience in Splunk content development will be an added advantage Should have solid experience in the design/build, test, implementation, and maintenance of integration with other security tools and platforms Willing to learn new technologies and take up new challenges. Assist in developing high-quality technical content such as automation scripts/tools, reference architectures, and white papers. Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in endpoint protection tools, techniques and platforms such as Carbon Black, Tanium, Microsoft Defender ATP, Symantec, McAfee or others Qualification & experience: Minimum of 6 years’ experience in cyber security with a depth of network architecture knowledge that will translate over to deploying and integrating a complicated SOAR solution in global enterprise environments. Strong oral, written and listening skills are an essential component to effective consulting. Strong background in network administration. Ability to work at all layers of the OSI models, including being able to explain communication at any level is necessary. Must have knowledge of Vulnerability Management, basic Windows setup, Windows Domains, trusts, GPOs, server roles, Windows security policies, basic Linux setup, user administration, Linux security and troubleshooting. Should have strong hands-on experience with scripting technologies like Python, REST, JSON, SOAP, ODBC, XML etc. Must have honours degree in a technical field such as computer science, mathematics, engineering or similar field Minimum 3 years of working in SOAR Certification in any one of the SIEM Solution such as IBM QRadar, Exabeam, Securonix and Splunk will be an added advantage Certifications in a core security related discipline will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 week ago
8.0 years
4 - 4 Lacs
Noida
On-site
Join our Team About this opportunity: We are now looking for a Senior Security Engineer professional for our Managed Security team. This job role has accountability for researching, designing, engineering, implementing, and supporting security solutions in partnership with the respective stakeholders within Ericsson and / or customer organization and / or 3rd Party Providers. The professional will work alongside a highly skilled, diverse team, making sure that the information assets, that we are responsible to protect, are secured. What you will do: Design, implement, manage, monitor, and troubleshoot cybersecurity defenses, including configuration management, network security, systems security, and monitoring systems / tools. Participate in planning and audit scope development as well as project execution as a critical team member on complex technology related assessments. Play an active role in the design and execution of infrastructure initiatives to ensure an evolving adherence to industry best practices for information security. Lead the execution of the assessment of specific technical areas of a project, supervising other team members and providing coaching where needed. Perform Security Incident Management, including but not limited to: supporting SIEM tools, integrating logs into the tool, creating and modifying rules, investigating and resolving alerts, automating tasks. Research new and emerging threats to gain insight into the evolving threat landscape, and share knowledge with the team. Promote new ideas and new ways of executing projects and internal infrastructure enhancements. Innovate and automate repetitive activities and corrective actions, including broader automation initiatives. Analyzes and recommends security controls and procedures in business processes related to use of information systems and assets, and monitors for compliance Responds to information security incidents, including investigation of countermeasures to and recovery from computer-based attacks, unauthorized access, and policy breaches; interacts and coordinates with third-party incident responders, including law enforcement The skills you bring: Strong knowledge of information security Strong knowledge of SIEM tools (such as McAfee ESM, QRadar, ArcSight, Splunk, etc.), scanning tools (Nessus, Qualys, IBM AppScan, etc.) and PAM tools (BeyondTrust, CyberArk, etc.) Strong knowledge of both Linux-based and MS Windows-based system platforms with a strong technical understanding and aptitude for analytical problem-solving Strong understanding of enterprise, network, system and application level security issues Strong understanding of enterprise computing environments, distributed applications, and a strong understanding of TCP/IP networks along with available security controls (technical & process controls) for respective layers Good understanding of the system hardening processes, tools, guidelines and benchmarks Fundamental understanding of encryption technologies Participate in the out-of-hours on call rotation, providing technical support to the business for incidents Strong knowledge sharing and collaboration skills Deliver results and meet customer expectations Excellent communication skills; English is a must Key Qualifications: Education: BE/ B.Tech (Telecommunication/ Computer Science) Minimum years of relevant experience: 8 to 15 years experience with at least 8 years in IT and 7 years in Security ITIL certification, CCSP, OSCP, Security +, CISSP or similar will be an advantage Basic knowledge of telecommunications networks will be an added advantage Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? Click Here to find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. Primary country and city: India (IN) || Noida Req ID: 768174
Posted 1 week ago
6.0 years
0 Lacs
Kanayannur, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Threat Detection & Response Consulting - Security Orchestration, Automation and Response (SOAR) - Senior KEY Capabilities: Excellent teamwork skills, passion and drive to succeed and combat Cyber threats Working with the customer to identify security automation strategies and provide creative integrations and playbooks. Work collaboratively with other team members to find creative and practical solutions to customers’ challenges and needs. Expertise in design and implementation of SOAR solution such as Phantom (Preferable), Demisto or Resilient Responsible for execution and maintenance of SOAR related analytical processes and tasks Manage and administration of SOAR platforms Hands-on experience with Incident Response and Threat Intelligence tools. Creation of reusable and efficient Python-based Playbooks. Use Phantom platform to enable automation and orchestration on various tools and technologies by making use of existing or custom integration Partner with security operations teams, threat intelligence groups and incident responders. Should have worked in a security operations center and gained understanding of SIEM and other log management platforms. Having experience in Splunk content development will be an added advantage Should have solid experience in the design/build, test, implementation, and maintenance of integration with other security tools and platforms Willing to learn new technologies and take up new challenges. Assist in developing high-quality technical content such as automation scripts/tools, reference architectures, and white papers. Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in endpoint protection tools, techniques and platforms such as Carbon Black, Tanium, Microsoft Defender ATP, Symantec, McAfee or others Qualification & experience: Minimum of 6 years’ experience in cyber security with a depth of network architecture knowledge that will translate over to deploying and integrating a complicated SOAR solution in global enterprise environments. Strong oral, written and listening skills are an essential component to effective consulting. Strong background in network administration. Ability to work at all layers of the OSI models, including being able to explain communication at any level is necessary. Must have knowledge of Vulnerability Management, basic Windows setup, Windows Domains, trusts, GPOs, server roles, Windows security policies, basic Linux setup, user administration, Linux security and troubleshooting. Should have strong hands-on experience with scripting technologies like Python, REST, JSON, SOAP, ODBC, XML etc. Must have honours degree in a technical field such as computer science, mathematics, engineering or similar field Minimum 3 years of working in SOAR Certification in any one of the SIEM Solution such as IBM QRadar, Exabeam, Securonix and Splunk will be an added advantage Certifications in a core security related discipline will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 week ago
6.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Threat Detection & Response Consulting - Security Orchestration, Automation and Response (SOAR) - Senior KEY Capabilities: Excellent teamwork skills, passion and drive to succeed and combat Cyber threats Working with the customer to identify security automation strategies and provide creative integrations and playbooks. Work collaboratively with other team members to find creative and practical solutions to customers’ challenges and needs. Expertise in design and implementation of SOAR solution such as Phantom (Preferable), Demisto or Resilient Responsible for execution and maintenance of SOAR related analytical processes and tasks Manage and administration of SOAR platforms Hands-on experience with Incident Response and Threat Intelligence tools. Creation of reusable and efficient Python-based Playbooks. Use Phantom platform to enable automation and orchestration on various tools and technologies by making use of existing or custom integration Partner with security operations teams, threat intelligence groups and incident responders. Should have worked in a security operations center and gained understanding of SIEM and other log management platforms. Having experience in Splunk content development will be an added advantage Should have solid experience in the design/build, test, implementation, and maintenance of integration with other security tools and platforms Willing to learn new technologies and take up new challenges. Assist in developing high-quality technical content such as automation scripts/tools, reference architectures, and white papers. Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in endpoint protection tools, techniques and platforms such as Carbon Black, Tanium, Microsoft Defender ATP, Symantec, McAfee or others Qualification & experience: Minimum of 6 years’ experience in cyber security with a depth of network architecture knowledge that will translate over to deploying and integrating a complicated SOAR solution in global enterprise environments. Strong oral, written and listening skills are an essential component to effective consulting. Strong background in network administration. Ability to work at all layers of the OSI models, including being able to explain communication at any level is necessary. Must have knowledge of Vulnerability Management, basic Windows setup, Windows Domains, trusts, GPOs, server roles, Windows security policies, basic Linux setup, user administration, Linux security and troubleshooting. Should have strong hands-on experience with scripting technologies like Python, REST, JSON, SOAP, ODBC, XML etc. Must have honours degree in a technical field such as computer science, mathematics, engineering or similar field Minimum 3 years of working in SOAR Certification in any one of the SIEM Solution such as IBM QRadar, Exabeam, Securonix and Splunk will be an added advantage Certifications in a core security related discipline will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 week ago
0 years
0 Lacs
Hyderabad, Telangana, India
Remote
Primary Responsibilities Installing, configuring, and troubleshooting of all Windows and mac OS. Securing the network by installing & troubleshooting Antivirus related issues & regularly updating the Antivirus Configuring and Troubleshooting Local & Network Printers. Resolving hardware related issues in printers and other peripherals. Providing the admin rights, Remote desktop access, file and folder access to the users as per the request. Trouble shooting all end-to-end technical problems through the remote tools. Monitoring the compliance status of all the desktops/servers in terms of patch/DAT’s status. Troubleshooting issues on Office365 and escalate to proper team Identifying and solving issues on Microsoft products (EXCEL, POWEPOINT, WORD, TEAMS) Troubleshooting issues on Citrix connections, Client VPN’s. Add devices to AzureAD, create, deploy and managing Intune MDM. Create, deploy, manage the app protection policies, device configuration policies from Intune endpoint manager. Create and manage security firewall, Switches, and ILL. Manage and update McAfee web controls and firewall rules. Maintain and monitor CCTV camera’s, Access control eSSL. Identify the causes of networking problems, using diagnostic testing software and equipment. Resolve IT tickets regarding computer software, hardware, and application issues on time. Set up equipment for employee use, performing or ensuring proper installation of cables, operating systems, or appropriate software. Install and perform minor repairs to hardware, software, or peripheral equipment. Requirements Requirements Good Experience in System administration Technical Support Experience Experience in ITIL process Experience in RIM (Remote Infrastructure Mgmt.) Good knowledge in Virtualization and cloud concepts with VMware and/or Open stack Excellent communication skills Benefits Benefits Standard Company Benefits Show more Show less
Posted 1 week ago
0.0 years
0 Lacs
Hyderabad, Telangana
Remote
Job Information Date Opened 06/30/2025 Job Type Full time Industry IT Services City Hyderabad State/Province Telangana Country India Zip/Postal Code 500081 About Us About DATAECONOMY: We are a fast-growing data & analytics company headquartered in Dublin with offices inDublin, OH, Providence, RI, and an advanced technology center in Hyderabad,India. We are clearly differentiated in the data & analytics space via our suite of solutions, accelerators, frameworks, and thought leadership. Job Description Primary Responsibilities Installing, configuring, and troubleshooting of all Windows and mac OS. Securing the network by installing & troubleshooting Antivirus related issues & regularly updating the Antivirus Configuring and Troubleshooting Local & Network Printers. Resolving hardware related issues in printers and other peripherals. Providing the admin rights, Remote desktop access, file and folder access to the users as per the request. Trouble shooting all end-to-end technical problems through the remote tools. Monitoring the compliance status of all the desktops/servers in terms of patch/DAT’s status. Troubleshooting issues on Office365 and escalate to proper team Identifying and solving issues on Microsoft products (EXCEL, POWEPOINT, WORD, TEAMS) Troubleshooting issues on Citrix connections, Client VPN’s. Add devices to AzureAD, create, deploy and managing Intune MDM. Create, deploy, manage the app protection policies, device configuration policies from Intune endpoint manager. Create and manage security firewall, Switches, and ILL. Manage and update McAfee web controls and firewall rules. Maintain and monitor CCTV camera’s, Access control eSSL. Identify the causes of networking problems, using diagnostic testing software and equipment. Resolve IT tickets regarding computer software, hardware, and application issues on time. Set up equipment for employee use, performing or ensuring proper installation of cables, operating systems, or appropriate software. Install and perform minor repairs to hardware, software, or peripheral equipment. Requirements Requirements Good Experience in System administration Technical Support Experience Experience in ITIL process Experience in RIM (Remote Infrastructure Mgmt.) Good knowledge in Virtualization and cloud concepts with VMware and/or Open stack Excellent communication skills Benefits Benefits Standard Company Benefits
Posted 1 week ago
5.0 - 10.0 years
10 - 15 Lacs
Bengaluru
Hybrid
7+ years Overall experience in Data Security tools PKI, HSM, KMS and McAfee FRP and Data Classification tools like AIP, Titus. Design and implementation experience in MS CA, HSM, Thales CTM, McAfee FRP & AIP. Having experience in Certificate Life Cycle Management tools like Venafi/KeyOn/AppViewX. Having good knowledge in managing and overseeing day to day activities of Data Sec tools and ensure adherence to enterprise standards in project execution methodology, requirements gathering, quality assurance and continuous improvement. Good expertise in Cloud technology (Azure/AWS) Monitor emerging technology trends within assigned product/technology area. If applicable, manage relationship and interactions with vendors (software or contractors). Determine Protection controls required. Licenses requirements. Determine deployment roadmap Should have a classification strategy or use recommended labels. Hiring for multiple locations
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2