Home
Jobs
Companies
Resume

44 Mimecast Jobs

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

0 years

0 Lacs

Maharashtra, India

On-site

Linkedin logo

System Administrator Brennan. Where true performance thrives. At Brennan, we believe that how technology is delivered is every bit as important as what the technology is. We focus on creating real and relevant value for customers with solutions that fit their specific needs and always reflect their true interests. It’s a claim backed by our True Performance System - a way of working engineered to get us closer, and deliver better, for our customers and their actual experience of technology. Why join Brennan True performance for our customers starts with a true belief in our people. It’s why we’ve structured our business to help our teams, and their talents, shine bright. It's why we’ve created a workplace where people of all backgrounds, beliefs and experiences are welcomed and empowered. And it’s why we’ve built an organisation where real innovation makes a genuine impact and generates true rewards for our team members. True rewards In addition to competitive remuneration, Brennan offers extensive benefits, including: Training and certification bonuses Culture Awards that recognise excellence Brennan Daredevils - our annual, all-expenses paid trip awarded to our top performers and outstanding contributors Vibrant, fun social activities Discounted hardware and software An environment that embraces learning and development The Role To provide 1st, 2nd or 3rd level technical support to Brennan IT clients, engineers and staff, 1st level monitoring and technical support to Brennan IT clients and staff. To coordinate, collaborate and escalate incidents within stipulated timelines, maintain existing cloud/infrastructure services and ensure that environment runs in an optimal way. and Continuously Improve the Efficiency and Excellence of Service Delivery as Measured by Client facing Surveys and Ratings in every department you are part of. 2-5 yrs minimum experience in Windows Server Administration / System Administration / Wintel Administration / Hyper V Administration / IT Technical Support role/ for international clients, preferably in Managed Services IT provider / IT Companies. Role Responsibilities Maintaining/contributing to KMS for client and internal team, for both technical & processes Server monitoring using SCOM, N-ABLE, Logic Monitor, Basic Intune / SCCM configurations Understanding of O365, Mimecast, Intune, Azure integration Vendor Management (hardware and Software vendors - HP, Dell, MS, VM, Citrix and others) Storage understanding NAS, SAN e.g., data domain, IBM, Netapp, Hitachi, Fujitsu, HP 3par Administration of Windows Server, groups, group policies, DNS, DHCP Understanding of backups, replications for Veeam, Symantec, Zetro, Commvault On premises backup alert management, monitoring and restoration SSL certificate renewal and installation on various roles (IIS, ADFS, ADC-Netscaler, Apache, SQL Reporting Services, WAS, Load Balancers) Smooth and timely customer engagement Disk, CPU, Snapshot management provisioning Monitor, manage experience with ESXI/Hyper-V hosts, Nutanix, Dell, HP SimpliVity Manage understand Failover Cluster, NLB Citrix/RDS/WVD knowledge with application publishing, upgrading, managing securely Manage windows update compliance. Antivirus Management, Sophos, Defender. Patching ESXi hosts and vCenter updates Knowledge of vulnerability management and critical remediation Change management, performing RCA and able to clearly articulate the actions/outcomes Key Competencies and Qualifications required Knowledge of as many more technologies like VMware, Windows Hypervisors, Azure Administrations, O365, Mimecast, SQL Administration, Windows Administration. Should have experience in VM Deployment, VM Migration, managing host clusters Extremely high-level attention to detail with methodical troubleshooting process Good verbal and written communication skills Must have knowledge of Storage technologies like HP, IBM, Dell, Cisco servers, O365, Azure Administration) Proactive vs Reactive approach ITIL Service Management Foundation accreditation Essential Skills Windows Server including 2016/2019, DNS, DHCP, Group Policy Active Directory 2012 and above VMware / Virtualization (Hyper - V, VMware) O365, Azure Administration Desired Skills Exposure to Backup tools like Veeam/Commvault/Backup exec Windows Administration certifications 2012 and above Exposure to SAN /NAS MS Azure and Office 365 Administration Symantec Endpoint or McAfee or Sophos or Sentinel One or CrowdStrike Exposure to Blade servers and configurations ITIL Foundation and ServiceNow ITSM tool Brennan is an equal opportunity employer Show more Show less

Posted 16 hours ago

Apply

0 years

0 Lacs

Mumbai Metropolitan Region

On-site

Linkedin logo

Brennan. Where true performance thrives. At Brennan, we believe that how technology is delivered is every bit as important as what the technology is. We focus on creating real and relevant value for customers with solutions that fit their specific needs and always reflect their true interests. It’s a claim backed by our True Performance System - a way of working engineered to get us closer, and deliver better, for our customers and their actual experience of technology. Why join Brennan True performance for our customers starts with a true belief in our people. It’s why we’ve structured our business to help our teams, and their talents, shine bright. It's why we’ve created a workplace where people of all backgrounds, beliefs and experiences are welcomed and empowered. And it’s why we’ve built an organisation where real innovation makes a genuine impact and generates true rewards for our team members. True rewards In addition to competitive remuneration, Brennan offers extensive benefits, including: Training and certification bonuses Culture Awards that recognise excellence Brennan Daredevils - our annual, all-expenses paid trip awarded to our top performers and outstanding contributors Vibrant, fun social activities Discounted hardware and software An environment that embraces learning and development The Role : This role is responsible for ensuring efficient and reliable IT service delivery through effective resource alignment, ticket management, and operational oversight. This includes collaborating closely with L1, L2, and L3 support teams to manage incidents, problems, and changes in line with ITIL best practices. Acting as a key point of contact for internal teams, clients, and stakeholders, the Technical Lead drives clear communication, timely escalation handling, and high service availability and quality. The role also includes performance management, mentoring, and delivering actionable insights through regular business reviews and reporting to senior management. Flexible to manage after hours escalation and lead the team most effective and efficient manner The Responsibility In your role you will be responsible for the team supporting mix of below technologies in 24x7 Managed Services support capacity Maintaining/contributing to KMS for client and internal team, for both technical & processes Server monitoring using SCOM, N-ABLE, Logic Monitor, Basic Intune / SCCM configurations Understanding of O365, Mimecast, Intune, Azure integration Manage security settings on Microsoft ATP Knowledge of endpoint security at CSP level for Sophos, SentinelOne, CrowdStrike etc. Ability to perform initial investigation on security breach alerts Vendor Management (hardware and Software vendors - HP, Dell, MS, VM, Citrix and others)\ Storage understanding NAS, SAN e.g., data domain, IBM, Netapp, Hitachi, Fujitsu, HP 3par Administration of Windows Server, groups, group policies, DNS, DHCP Understanding of backups, replications for Veeam, Symantec, Zetro, Commvault On premises backup alert management, monitoring and restoration Execution of maintenance tasks, App upgrades, patch escalations etc. Key Competencies Knowledge of as many more technologies like VMware, Windows Hypervisors, Azure Administrations, O365, Mimecast, SQL Administration, Windows Administration. Knowledge of as many more technologies like VMware, Windows Hypervisors, Azure Administrations, O365, Mimecast, SQL Administration, Windows Administration. Must have secondary and tertiary technical skills. Good to have experience in VM Deployment, VM Migration, managing host clusters Extremely high-level attention to detail with methodical troubleshooting process Independent time management skills Good to have understanding of Storage technologies like HP, IBM, Dell, Cisco servers Demonstrable Industry based technical aptitude (E.g., Microsoft, Citrix, HP, VMware, Hyperv, Nutanix, O365, Azure Administration) Proactive vs Reactive approach ITIL Service Management Foundation accreditation Understand the performance management function to lead team with unbiased approach Windows Server including 2016/2019, DNS, DHCP, Group PolicyActive Directory 2012 and above VMware / Virtualization (Hyper - V, VMware),O365, Azure Administration Brennan is an equal opportunity employer. Show more Show less

Posted 16 hours ago

Apply

30.0 years

4 - 9 Lacs

Bengaluru

On-site

DevOps Engineer Help Build the Next Generation of Cloud-Scalable AI-Based Security Products Have a passion for software security? Excel at implementing public cloud at scale? Desire to apply Machine Learning to solve complex problems? This may well be the role for you. Our Communication and Collaboration Security products are cutting edge solutions that empower Mimecast customers to Work Protected™ at tremendous scale. Why Join Our Team? “Join us for the opportunity, stay and thrive because of the culture and community. Mimecasters take pride in building high performing teams that embody the Mimecast Way, a code of values that guide how we operate and enable our collective success. In my 30 years of high tech, this is the most positive and constructive culture I’ve ever experienced.” – Larry V, Senior Director of Quality Engineering What You’ll Do As a DevOps Engineer within the Communication and Collaboration Security team, you’ll play an integral role in ensuring our code, tools, and deployments are consistent, high quality, and continually optimized. Your responsibilities will include: Implement Jenkins pipelines with modern CI/CD workflows Create properly tuned alerts and dashboards to effectively monitor infrastructure and service health in production Champion and leverage Infrastructure as Code technologies as a way of life Contribute strongly to cloud migration efforts, bringing more and more capabilities into our standard AWS infrastructure Write scripts and automated tests to ensure the resilience and quality of Mimecast solutions Innovate and champion improvements in QE and CI/CD processes and tools What You’ll Bring Domain experience in Quality Engineering and/or DevOps Understanding of CI/CD principles, automation technologies, and associated tools and how to optimize them for public cloud Hands-on experience deploying, scaling, monitoring, and maintaining services in AWS Solid scripting/automation experience, with command of two or more scripting languages used for DevOps and/or Test Automation Excellent interpersonal, communication and collaboration skills that enable you to work effectively across teams Bias for action and problem solving – eagerness to take initiative and make things happen What We Bring Join our Communication and Collaboration Security team to accelerate your career journey, working with cutting-edge technologies and contributing to projects that have real customer impact. You will be immersed in a dynamic environment that recognizes and celebrates your achievements. Mimecast is on a path of steady and healthy growth as a company, investing in people like you who bring the skills and expertise to raise our technical expertise, operational maturity, and customer success to the next level. Your contributions are important! Every voice and action matters. Mimecast offers formal and on-the-job learning opportunities, maintains a comprehensive benefits package that helps our employees and their family members to sustain a healthy lifestyle, and importantly – opportunities to work with cross-functional teams to build your knowledge! Our Hybrid Model: We provide you with the flexibility to live balanced, healthy lives through our hybrid working model that champions both collaborative teamwork and individual flexibility. Employees are expected to come to the office at least two days per week, because working together in person: Fosters a culture of collaboration, communication, performance, and learning Drives innovation and creativity within and between teams Introduces employees to priorities outside of their immediate realm Ensures important interpersonal relationships and connections with one another and our community! #LI-GK1 DEI Statement Cybersecurity is a community effort. That’s why we’re committed to building an inclusive, diverse community that celebrates and welcomes everyone – unless they’re a cybercriminal, of course. We’re proud to be an Equal Opportunity and Affirmative Action Employer, and we’d encourage you to join us whatever your background. We particularly welcome applicants from traditionally underrepresented groups. We consider everyone equally: your race, age, religion, sexual orientation, gender identity, ability, marital status, nationality, or any other protected characteristic won’t affect your application. Due to certain obligations to our customers, an offer of employment will be subject to your successful completion of applicable background checks, conducted in accordance with local law.

Posted 2 days ago

Apply

2.0 years

0 Lacs

Delhi, India

Remote

Linkedin logo

Description: Job Description- IT Service Desk Analyst Job Location: Delhi-NCR WHO ARE WE LOOKING FOR: As part of our continued improvement plan for Information Services we are seeking an enthusiastic IT Service Desk Analyst with great technical and customer service skills to be part of our Service Delivery team and support our members of staff and wider user community across the M+C Saatchi network. We are focused on providing the best customer service for our users. Working as part of this highly motivated team you will help ensure the delivery of high-quality services in line with SLAs and best practice. As an IT Service Desk Analyst, you will be working in an ITIL aligned environment providing a range of support to desktops, laptops, mobiles, tables and printers and a range of hardware and software applications. This role is an opportunity for you to grow and develop your experience in 1st and 2nd line support within a large environment across both Mac and Windows technologies DESCRIPTION: Reporting to the IT Service Delivery Manager. Core objective is to provide first and second line support to staff within the agency; assisting them with hardware and software problems via phone, email, remotely and in person, with a focus on service restoration and communicating with the customer on progress. WHAT WILL YOU BE RESPONSIBLE FOR: To provide technical support; dealing with support queries in person, via phone, email and the IT help desk system To maintain a high degree of customer service for all support queries and adhere to all service management principles Diagnose and resolve problems accurately making sure they are logged correctly and either closed successfully or escalated appropriately to 2nd/3rd Line support teams Respond to all calls on the call logging system or as instructed by the management team. Log all reported incidents or service requests in the IT ticketing system (Fresh Service) Respond to enquiries from clients and offsite staff and help them resolve any hardware or software problems Correctly log, prioritise, assign, track and respond to incidents and service requests in a timely manner, meeting agreed SLAs, and according to agreed standards and procedures Escalate high priority incidents to both internal and external teams, as appropriate Keep customers and other interested parties informed of progress throughout the lifecycle and ensure that corrective action is taken to avoid or minimise delays Perform Active Directory administration: Creating user accounts, reset passwords, create groups, etc. To take ownership of user problems and be proactive when dealing with user issues Provide incident management ownership of all incidents, and oversight of requests to track status and communicate progress in a timely manner to the reporting customers. To arrange for external technical support where problems cannot be resolved in house Liaise with external suppliers and vendors to order hardware and software for customers Maintaining the knowledge base for end user self-help and Service desk first line incident resolution and request fulfilment. Support customers in the use of computer equipment by providing necessary training and advice Carry out any ad hoc tasks/duties which may reasonably be expected as requested by IT Management WHAT ARE THE REQUIREMENTS OF THE ROLE: Minimum 2 Years of Experience in similar role. Strong logical thinking and the ability to troubleshoot any kind of problem and apply context to assess priority. Strong interpersonal skills with the ability to deal with the business at all levels. A strong and comprehensive understanding of PC/Mac hardware set-up and configuration, networking principles and specialist tools as used in the agency. A strong knowledge of Microsoft/Mac operating systems and productivity tools. Previous Service Desk experience Excellent verbal and written communication skills, ability to retain instruction, and push forward Experience of using call logging software Desire to progress, high motivation and good team working essential WHAT SKILLS DO WE NEED FOR THIS ROLE: Microsoft Windows versions 10 - 11 Apple IOS installation, configuration, and troubleshooting Active Directory user and group administration Audio Visual and video conference technologies and hardware Anti-virus installation and centralised deployment/management tools (e.g. Sophos) Remote/Secure access & VPN solutions (particularly FortiClient) WAN/LAN Technologies Service Desk call logging software (Fresh Service) Wi-Fi Technologies (specifically Meraki) Desktop Imaging (Windows & Mac) Email management/security (particularly Mimecast) Microsoft Office 365 administration Mobile Telephony (IOS and Android) MDM - Intune Secure file sharing system (particularly Egnyte) Four shift patterns working between the hours of Monday – Friday 03:00AM – 12:00PM IST (AUS Shift) 09:00AM – 06:00PM IST (APAC Shift) 02:00PM – 11:00PM IST (UK Shift) 06:30PM – 03:30AM IST (US Shift) Occasional overtime may be available to meet the demands of the business. Willing to work weekends and out of hours/unsociable hours on occasion What Can you look forward to: Being a part of the world’s largest independent advertising holding group. Family Health Insurance Coverage. Flexible Working Hours. Regular events including Reece Lunch & indoor games. Employee Training/Learning Programs About M+C Saatchi Group: M+C Saatchi Group has pledged its commitment to create a company that values difference, with an inclusive culture brought to life through equity with business-wide activity across people, culture, industry and society. As part of this, M+C Saatchi Group continues to be an Equal Opportunity Employer which does not and shall not discriminate, celebrates diversity and bases all hiring and promotion decisions solely on merit, without regard for any personal characteristics. All employee information is kept confidential according to General Data Protection Regulation (GDPR). Additional Description: N/A " M+C Saatchi Group was founded in 1995 and is now the biggest Independent creative agency group in the World. Founded on one core principle, Brutal Simplicity. Show more Show less

Posted 4 days ago

Apply

2.0 years

0 Lacs

Delhi, India

Remote

Linkedin logo

Description: Job Description- IT Service Desk Analyst Job Location: Delhi-NCR WHO ARE WE LOOKING FOR: As part of our continued improvement plan for Information Services we are seeking an enthusiastic IT Service Desk Analyst with great technical and customer service skills to be part of our Service Delivery team and support our members of staff and wider user community across the M+C Saatchi network. We are focused on providing the best customer service for our users. Working as part of this highly motivated team you will help ensure the delivery of high-quality services in line with SLAs and best practice. As an IT Service Desk Analyst, you will be working in an ITIL aligned environment providing a range of support to desktops, laptops, mobiles, tables and printers and a range of hardware and software applications. This role is an opportunity for you to grow and develop your experience in 1st and 2nd line support within a large environment across both Mac and Windows technologies DESCRIPTION: Reporting to the IT Service Delivery Manager. Core objective is to provide first and second line support to staff within the agency; assisting them with hardware and software problems via phone, email, remotely and in person, with a focus on service restoration and communicating with the customer on progress. WHAT WILL YOU BE RESPONSIBLE FOR: To provide technical support; dealing with support queries in person, via phone, email and the IT help desk system To maintain a high degree of customer service for all support queries and adhere to all service management principles Diagnose and resolve problems accurately making sure they are logged correctly and either closed successfully or escalated appropriately to 2nd/3rd Line support teams Respond to all calls on the call logging system or as instructed by the management team. Log all reported incidents or service requests in the IT ticketing system (Fresh Service) Respond to enquiries from clients and offsite staff and help them resolve any hardware or software problems Correctly log, prioritise, assign, track and respond to incidents and service requests in a timely manner, meeting agreed SLAs, and according to agreed standards and procedures Escalate high priority incidents to both internal and external teams, as appropriate Keep customers and other interested parties informed of progress throughout the lifecycle and ensure that corrective action is taken to avoid or minimise delays Perform Active Directory administration: Creating user accounts, reset passwords, create groups, etc. To take ownership of user problems and be proactive when dealing with user issues Provide incident management ownership of all incidents, and oversight of requests to track status and communicate progress in a timely manner to the reporting customers. To arrange for external technical support where problems cannot be resolved in house Liaise with external suppliers and vendors to order hardware and software for customers Maintaining the knowledge base for end user self-help and Service desk first line incident resolution and request fulfilment. Support customers in the use of computer equipment by providing necessary training and advice Carry out any ad hoc tasks/duties which may reasonably be expected as requested by IT Management WHAT ARE THE REQUIREMENTS OF THE ROLE: Minimum 2 Years of Experience in similar role. Strong logical thinking and the ability to troubleshoot any kind of problem and apply context to assess priority. Strong interpersonal skills with the ability to deal with the business at all levels. A strong and comprehensive understanding of PC/Mac hardware set-up and configuration, networking principles and specialist tools as used in the agency. A strong knowledge of Microsoft/Mac operating systems and productivity tools. Previous Service Desk experience Excellent verbal and written communication skills, ability to retain instruction, and push forward Experience of using call logging software Desire to progress, high motivation and good team working essential WHAT SKILLS DO WE NEED FOR THIS ROLE: Microsoft Windows versions 10 - 11 Apple IOS installation, configuration, and troubleshooting Active Directory user and group administration Audio Visual and video conference technologies and hardware Anti-virus installation and centralised deployment/management tools (e.g. Sophos) Remote/Secure access & VPN solutions (particularly FortiClient) WAN/LAN Technologies Service Desk call logging software (Fresh Service) Wi-Fi Technologies (specifically Meraki) Desktop Imaging (Windows & Mac) Email management/security (particularly Mimecast) Microsoft Office 365 administration Mobile Telephony (IOS and Android) MDM - Intune Secure file sharing system (particularly Egnyte) Four shift patterns working between the hours of Monday – Friday 03:00AM – 12:00PM IST (AUS Shift) 09:00AM – 06:00PM IST (APAC Shift) 02:00PM – 11:00PM IST (UK Shift) 06:30PM – 03:30AM IST (US Shift) Occasional overtime may be available to meet the demands of the business. Willing to work weekends and out of hours/unsociable hours on occasion What Can you look forward to: Being a part of the world’s largest independent advertising holding group. Family Health Insurance Coverage. Flexible Working Hours. Regular events including Reece Lunch & indoor games. Employee Training/Learning Programs About M+C Saatchi Group: M+C Saatchi Group has pledged its commitment to create a company that values difference, with an inclusive culture brought to life through equity with business-wide activity across people, culture, industry and society. As part of this, M+C Saatchi Group continues to be an Equal Opportunity Employer which does not and shall not discriminate, celebrates diversity and bases all hiring and promotion decisions solely on merit, without regard for any personal characteristics. All employee information is kept confidential according to General Data Protection Regulation (GDPR). Additional Description: N/A " Show more Show less

Posted 4 days ago

Apply

20.0 years

0 Lacs

Gurgaon, Haryana, India

On-site

Linkedin logo

About Rackspace Cyber Defence Rackspace Cyber Defence is our next generation cyber defence and security operations capability that builds on 20+ years of securing customer environments to deliver proactive, risk-based, threat-informed and intelligence driven security services. Our purpose is to enable our customers to defend against the evolving threat landscape across on-premises, private cloud, public cloud and multi-cloud workloads. Our goal is to go beyond traditional security controls to deliver cloud-native, DevOps-centric and fully integrated 24x7x365 cyber defence capabilities that deliver a proactive , threat-informed , risk-based , intelligence-driven approach to detecting and responding to threats. Our mission is to help our customers: Proactively detect and respond to cyber-attacks – 24x7x365 Defend against new and emerging risks that impact their business Reduce their attack surface across private cloud, hybrid cloud, public cloud, and multi-cloud environments Reduce their exposure to risks that impact their identity and brand Develop operational resilience Maintain compliance with legal, regulatory and compliance obligations What we’re looking for To support our continued success and deliver a Fanatical Experience™ to our customers, Rackspace Cyber Defence is looking for an Indian based Security Operations Analyst (L3) to support Rackspace’s strategic customers. This role is particularly well-suited to a self-starting, experienced and motivated Sr. Sec Ops Analyst, who has a proven record of accomplishment in the cloud security monitoring and incident detection domain. As a Security Operations Analyst(L3), you will be responsible for detecting, analysing, and responding to threats posed across customer on-premises, private cloud, public cloud, and multi-cloud environments. The primary focus will be on triaging alerts and events (incident detection), which may indicate malicious activity, and determining if threats are real or not. You will also be required to liaise closely with the customer’s key stakeholders, which may include incident response and disaster recovery teams as well as information security. Key Accountabilities Should have experience of 10 years in SOC and 5 years in Azure Sentinel. Ensure the Customer’s operational and production environment remains secure at all the times and any threats are raised and addressed in a timely manner. Critical incident handling & closure. Escalation management and handling escalations from L2 Analysts. Proactive discovery of threats based on MITRE ATT&CK framework. Deep investigation and analysis of critical security incidents. Post breach forensic incident analysis reporting. Review the weekly and monthly reports. Review new use cases created by L2 and implement in cloud-native SIEM (Security Information and Event Management). Assist with customer onboarding (such as use case development, identifying data sources, configuring data connectors etc) Advanced threat hunting. Develop custom dashboards and reporting templates. Develop complex to customer specific use cases. Advanced platform administration. Solution recommendation for issues. Co-ordinate with vendor for issue resolution. Basic and intermediate playbook and workflow enhancement. Maintain close working relationships with relevant teams and individual key stakeholders, such as incident response and disaster recovery teams as well as information security etc. Develop the custom parsers for the incident and alert enrichment. Problem specific playbook and workflow creation and enhancements Required to work flexible timings. Skills & Experience Existing experience as a Security Operations Analyst, or equivalent Experience of working in large scale, public cloud environments and with using cloud native security monitoring tools such as: - Microsoft Sentinel Microsoft 365 Defender Microsoft Defender for Cloud Endpoint Detection & Response (EDR) tools such as Crowdstrike, Microsoft Defender for Endpoint Firewalls and network security tools such as Palo Alto, Fortinet, Juniper, and Cisco Web Application Firewall (WAF) tools such as Cloudflare, Akamai and Azure WAF Email Security tools such as Proofpoint, Mimecast and Microsoft Defender for Office Data Loss Prevention (DLP) tools such as Microsoft Purview, McAfee and Symantec Nice to have skills/experience includes: Google Cloud Platform (GCP) security tools such as Chronicle and Security Command Centre Amazon Web Services (AWS) security tools such as Security Hub, AWS Guard Duty, AWS Macie, AWS Config and AWS CloudTrail Experience of analysing malware and email headers, and has skills in network security, intrusion detection and prevention systems; operating systems; risk identification and analysis; threat identification and analysis and log analysis Experience of security controls, such as network access controls; identity, authentication, and access management controls (IAAM); and intrusion detection and prevention controls Knowledge of security standards (good practice) such as NIST, ISO27001, CIS (Center for Internet Security), OWASP and Cloud Controls Matrix (CCM) etc Experience with scripting and coding with languages such as Terraform, python, javascript, golang, bash and/or powershell Experience with DevOps practices and tools such as Backlogs, Repo’s, Pipelines, Artifacts, CI/CD, JIRA, Azure DevOps, CircleCI, GitHub Actions, Ansible and/or Jenkins Computer science, engineering, or information technology related degree (although not a strict requirement) Holds one, or more, of the following certificates (or equivalent): - Certified Information Security Systems Professional (CISSP) Microsoft Certified: Azure Security Engineer Associate (AZ500) Microsoft Certified: Security Operations Analyst Associate (SC-200) CREST Practitioner Intrusion Analyst (CPIA) CREST Registered Intrusion Analyst (CRIA) CREST Certified Network Intrusion Analyst (CCNIA) Systems Security Certified Practitioner (SSCP) Certified Cloud Security Professional (CCSP) GIAC Certified Incident Handler (GCIH) GIAC Security Operations Certified (GSOC) A highly self-motivated and proactive individual who wants to learn and grow and has an attention to detail A great analyser, trouble-shooter and problem solver who understands security operations, programming languages and security architecture Highly organised and detail oriented. Ability to prioritise, multitask and work under pressure An individual who shows a willingness to go above and beyond in delighting the customer Show more Show less

Posted 5 days ago

Apply

3.0 - 4.0 years

0 Lacs

Delhi, India

On-site

Linkedin logo

Our Company We’re Hitachi Digital, a company at the forefront of digital transformation and the fastest growing division of Hitachi Group. We’re crucial to the company’s strategy and ambition to become a premier global player in the massive and fast-moving digital transformation market. Our group companies, including GlobalLogic, Hitachi Digital Services, Hitachi Vantara and more, offer comprehensive services that span the entire digital lifecycle, from initial idea to full-scale operation and the infrastructure to run it on. Hitachi Digital represents One Hitachi, integrating domain knowledge and digital capabilities, and harnessing the power of the entire portfolio of services, technologies, and partnerships, to accelerate synergy creation and make real-world impact for our customers and society as a whole. Imagine the sheer breadth of talent it takes to unleash a digital future. We don’t expect you to ‘fit’ every requirement – your life experience, character, perspective, and passion for achieving great things in the world are equally as important to us. Meet Our Team: We are the Global SOC team, part of Global Information Security at Hitachi Digital. Our mission is to protect the company's and its customers' vital information systems and data while responding to attacks, intrusions, and other security incidents. As passionate advocates of information security, we are a team of out-of-the-box thinkers, innovators, and collaborative problem-solvers. We continuously seek new and better ways to enhance our practices and strive for nothing less than excellence in our cybersecurity operations. We are looking for highly motivated individuals with a positive attitude who want to be part of something exceptional. What You’ll Be Doing: As an Email Security Engineer, you will be working as an individual contributor to work with a dynamic team of Threat hunters working 24x7. You should have 3-4 years of experience in cyber security. Your role will include: Act as a Primary contact for Mimecast implementation and operation support work. Strong problem-solving and troubleshooting skills include performing root cause analysis for preventative investigation. Working experience of understanding of email protocols like SMTP, SPF, DKIM and DMARC. Proficient in Header analysis. Administration of Mimecast, creation and modification of email policies, spam rules as per service tickets for specific security requirements Investigation, Triage, remediate and find RCA of Compromised accounts, e-mail threats, and abuse reports from various sources. Ensure Email Security gateway are configured with advanced cyber security features and rules. Investigate, document, and report on information security issues and emerging trends. Experience with GSUITE and O365. What You Bring to the Team: At least 4 years of experience in working in a 24x7 Security Operation Center (SOC) environment. Strong knowledge of Email Security protocols, including safe listing, block listing, domain on/off boarding, URL/attachment’s defense and phishing analysis Provide design and configuration support for implementation of Mimecast email security gateway. Provide operational support for tickets related to Email Security. Knowledge of Cloud Infrastructure, and Cloud Security (GCP, AWS, Azure) Knowledge of MITRE ATT&Ck, Cyber Kill Chain, Threat Hunting & Attack Forensics. Knowledge of Security Fundamentals, Security Frameworks and implementation of Security controls. Knowledge of DLP and CASB is a plus Knowledge of various operating system flavors including but not limited to Windows, MacOS, Linux. Certifications: Security certifications such as GSEC, CEH, CySA, are advantageous. Communication and Teamwork: Strong ability to articulate complex concepts clearly, be a collaborative team player, admit mistakes, support your statements with data and analysis, and continuously seek growth opportunities. If you are passionate about cybersecurity and ready to work with a top-tier SOC team, we invite you to join us at Hitachi Digital. About Us We’re a global, 1000-stong, diverse team of professional experts, promoting and delivering Social Innovation through our One Hitachi initiative (OT x IT x Product) and working on projects that have a real-world impact. We’re curious, passionate and empowered, blending our legacy of 110 years of innovation with our shaping our future. Here you’re not just another employee; you’re part of a tradition of excellence and a community working towards creating a digital future. Championing diversity, equity, and inclusion Diversity, equity, and inclusion (DEI) are integral to our culture and identity. Diverse thinking, a commitment to allyship, and a culture of empowerment help us achieve powerful results. We want you to be you, with all the ideas, lived experience, and fresh perspective that brings. We support your uniqueness and encourage people from all backgrounds to apply and realize their full potential as part of our team. How We Look After You We help take care of your today and tomorrow with industry-leading benefits, support, and services that look after your holistic health and wellbeing. We’re also champions of life balance and offer flexible arrangements that work for you (role and location dependent). We’re always looking for new ways of working that bring out our best, which leads to unexpected ideas. So here, you’ll experience a sense of belonging, and discover autonomy, freedom, and ownership as you work alongside talented people you enjoy sharing knowledge with. We’re proud to say we’re an equal opportunity employer and welcome all applicants for employment without attention to race, colour, religion, sex, sexual orientation, gender identity, national origin, veteran, age, disability status or any other protected characteristic. Should you need reasonable accommodations during the recruitment process, please let us know so that we can do our best to set you up for success. Show more Show less

Posted 5 days ago

Apply

8.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Senior System Administrator Location: Pune, Maharashtra, India Onit, Inc. is seeking a Senior Systems Administrator to manage and optimize a diverse global IT cloud infrastructure. The role focuses on Microsoft 365, Entra ID, SSO, Exchange administration, Email Security (Mimecast), and IT governance while contributing to cross-functional initiatives. Key Responsibilities: Microsoft 365 & Exchange Administration: Manage user accounts, licensing, permissions, and roles across multiple M365 tenants. Manage Exchange Online mail flow, retention policies, and security measures (Mimecast). Implement security protocols like MFA, Conditional Access, and threat management. Migrate and Manage One Drive, SharePoint and MS Teams. Ensure compliance with regulations (e.g., GDPR) and manage eDiscovery and audit logs. Platform Optimization: Monitor platform performance and usage, recommend cost-saving optimizations. Develop governance policies and stay updated on the Microsoft roadmap. Backup, Recovery, and Security: Configure backup solutions and update disaster recovery plans. Utilize Mimecast for filtering, encryption, archiving, and continuity. IT Infrastructure Support: Manage hosting, domain, and Cloudflare. Collaborate on AWS infrastructure projects. Required Skills: 8+ years as Global Admin for M365, Entra ID & Exchange administration, including automation and migrations. Proficiency in PowerShell for scripting and administration. Expertise in email security (Mimecast), protocols (SMTP, POP3, IMAP) & Security Standards (SPF, DKIM, DMARC) Experience with Azure AD, IAM, and compliance frameworks (NIST, GDPR, ISO 27001). Knowledge of CrowdStrike, Cloudflare, and Zero-Trust principles. Preferred Certifications: MS-102: Microsoft 365 Administrator Microsoft 365 Certified : Messaging Administrator Associate SC-300: Microsoft Identity and Access Administrator About Onit: Onit is a global leader in enterprise workflow solutions, transforming business processes in Legal, IT, HR, and Finance with cutting-edge platforms and smarter workflows. Show more Show less

Posted 5 days ago

Apply

0.0 years

0 Lacs

Pune, Maharashtra

On-site

Indeed logo

Senior System Administrator Location: Pune, Maharashtra, India Onit, Inc. is seeking a Senior Systems Administrator to manage and optimize a diverse global IT cloud infrastructure. The role focuses on Microsoft 365, Entra ID, SSO, Exchange administration, Email Security (Mimecast), and IT governance while contributing to cross-functional initiatives. Key Responsibilities: Microsoft 365 & Exchange Administration: Manage user accounts, licensing, permissions, and roles across multiple M365 tenants. Manage Exchange Online mail flow, retention policies, and security measures (Mimecast). Implement security protocols like MFA, Conditional Access, and threat management. Migrate and Manage One Drive, SharePoint and MS Teams. Ensure compliance with regulations (e.g., GDPR) and manage eDiscovery and audit logs. Platform Optimization: Monitor platform performance and usage, recommend cost-saving optimizations. Develop governance policies and stay updated on the Microsoft roadmap. Backup, Recovery, and Security: Configure backup solutions and update disaster recovery plans. Utilize Mimecast for filtering, encryption, archiving, and continuity. IT Infrastructure Support: Manage hosting, domain, and Cloudflare. Collaborate on AWS infrastructure projects. Required Skills: 8+ years as Global Admin for M365, Entra ID & Exchange administration, including automation and migrations. Proficiency in PowerShell for scripting and administration. Expertise in email security (Mimecast), protocols (SMTP, POP3, IMAP) & Security Standards (SPF, DKIM, DMARC) Experience with Azure AD, IAM, and compliance frameworks (NIST, GDPR, ISO 27001). Knowledge of CrowdStrike, Cloudflare, and Zero-Trust principles. Preferred Certifications: MS-102: Microsoft 365 Administrator Microsoft 365 Certified : Messaging Administrator Associate SC-300: Microsoft Identity and Access Administrator About Onit: Onit is a global leader in enterprise workflow solutions, transforming business processes in Legal, IT, HR, and Finance with cutting-edge platforms and smarter workflows. koH11szTgI

Posted 5 days ago

Apply

2.0 years

0 Lacs

Delhi, India

Remote

Linkedin logo

Description: Job Description- IT Service Desk Analyst Job Location: Delhi-NCR WHO ARE WE LOOKING FOR: As part of our continued improvement plan for Information Services we are seeking an enthusiastic IT Service Desk Analyst with great technical and customer service skills to be part of our Service Delivery team and support our members of staff and wider user community across the M&C Saatchi network. We are focused on providing the best customer service for our users. Working as part of this highly motivated team you will help ensure the delivery of high-quality services in line with SLAs and best practice. As an IT Service Desk Analyst, you will be working in an ITIL aligned environment providing a range of support to desktops, laptops, mobiles, tables and printers and a range of hardware and software applications. This role is an opportunity for you to grow and develop your experience in 1st and 2nd line support within a large environment across both Mac and Windows technologies DESCRIPTION: Reporting to the IT Service Delivery Manager. Core objective is to provide first and second line support to staff within the agency; assisting them with hardware and software problems via phone, email, remotely and in person, with a focus on service restoration and communicating with the customer on progress. WHAT WILL YOU BE RESPONSIBLE FOR: To provide technical support; dealing with support queries in person, via phone, email and the IT help desk system To maintain a high degree of customer service for all support queries and adhere to all service management principles Diagnose and resolve problems accurately making sure they are logged correctly and either closed successfully or escalated appropriately to 2nd/3rd Line support teams Respond to all calls on the call logging system or as instructed by the management team. Log all reported incidents or service requests in the IT ticketing system (Fresh Service) Respond to enquiries from clients and offsite staff and help them resolve any hardware or software problems Correctly log, prioritise, assign, track and respond to incidents and service requests in a timely manner, meeting agreed SLAs, and according to agreed standards and procedures Escalate high priority incidents to both internal and external teams, as appropriate Keep customers and other interested parties informed of progress throughout the lifecycle and ensure that corrective action is taken to avoid or minimise delays Perform Active Directory administration: Creating user accounts, reset passwords, create groups, etc. To take ownership of user problems and be proactive when dealing with user issues Provide incident management ownership of all incidents, and oversight of requests to track status and communicate progress in a timely manner to the reporting customers. To arrange for external technical support where problems cannot be resolved in house Liaise with external suppliers and vendors to order hardware and software for customers Maintaining the knowledge base for end user self-help and Service desk first line incident resolution and request fulfilment. Support customers in the use of computer equipment by providing necessary training and advice Carry out any ad hoc tasks/duties which may reasonably be expected as requested by IT Management WHAT ARE THE REQUIREMENTS OF THE ROLE: Minimum 2 Years of Experience in similar role. Strong logical thinking and the ability to troubleshoot any kind of problem and apply context to assess priority. Strong interpersonal skills with the ability to deal with the business at all levels. A strong and comprehensive understanding of PC/Mac hardware set-up and configuration, networking principles and specialist tools as used in the agency. A strong knowledge of Microsoft/Mac operating systems and productivity tools. Previous Service Desk experience Excellent verbal and written communication skills, ability to retain instruction, and push forward Experience of using call logging software Desire to progress, high motivation and good team working essential WHAT SKILLS DO WE NEED FOR THIS ROLE: Microsoft Windows versions 10 - 11 Apple IOS installation, configuration, and troubleshooting Active Directory user and group administration Audio Visual and video conference technologies and hardware Anti-virus installation and centralised deployment/management tools (e.g. Sophos) Remote/Secure access & VPN solutions (particularly FortiClient) WAN/LAN Technologies Service Desk call logging software (Fresh Service) Wi-Fi Technologies (specifically Meraki) Desktop Imaging (Windows & Mac) Email management/security (particularly Mimecast) Microsoft Office 365 administration Mobile Telephony (IOS and Android) MDM - Intune Secure file sharing system (particularly Egnyte) Four shift patterns working between the hours of Monday – Friday 03:00AM – 12:00PM IST (AUS Shift) 09:00AM – 06:00PM IST (APAC Shift) 02:00PM – 11:00PM IST (UK Shift) 06:30PM – 03:30AM IST (US Shift) Occasional overtime may be available to meet the demands of the business. Willing to work weekends and out of hours/unsociable hours on occasion What Can you look forward to: Being a part of the world’s largest independent advertising holding group. Family Health Insurance Coverage. Flexible Working Hours. Regular events including Reece Lunch & indoor games. Employee Training/Learning Programs About M+C Saatchi Group: M+C Saatchi Group has pledged its commitment to create a company that values difference, with an inclusive culture brought to life through equity with business-wide activity across people, culture, industry and society. As part of this, M+C Saatchi Group continues to be an Equal Opportunity Employer which does not and shall not discriminate, celebrates diversity and bases all hiring and promotion decisions solely on merit, without regard for any personal characteristics. All employee information is kept confidential according to General Data Protection Regulation (GDPR). Additional Description: N/A M+C Saatchi Group was founded in 1995 and is now the biggest Independent creative agency group in the World. Founded on one core principle, Brutal Simplicity. Show more Show less

Posted 6 days ago

Apply

2.0 years

0 Lacs

Cochin

On-site

The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Requirements Must-haves: 2-3 Year Experience as SOC Analyst – (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Knowledge of creating and modifying the dashboards. Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows Deep Knowledge in SIEM, Ticketing tool, EDR, Vulnerability Management, MimeCast, DMARC tool. Excellent written and verbal communication skills. Good to have: · Good to have industry certifications on any SIEM Platform, CEH, C|SA, CompTIA Security+ & Others Main Responsibilities Tier 1 SOC analysts are incident responders, remediating serious attacks escalated from junior analyst, assessing the scope of the attack, and affected systems, and collecting data for further analysis. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments(CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Leading efforts to counter SLA breaches and anticipating the likelihood of future security alerts,incidents. Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone),based on the security event severity and suspicious activities, escalate to managed service support teams, tier 2 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats. Analyse the Events & incidents and identify the root cause. Assist in keeping the SIEM platform up to date and contribute to security strategies as an when newthreats emerge. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. · Document and maintain customer build documents, security procedures and processes. Document incidents to contribute to incident response and disaster recovery plans. Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Keep updated with the likes of OWASP Top 10 vulnerabilities, Bleeping Computer articles etc., for acquiring the knowledge over current threats in security perspective. Other responsibilities and additional duties as assigned by the security management team or service delivery manager. Skills: Excellent event or log analytical skills Proven experience as IT Security Monitoring or similar role Exceptional organizing and time-management skills Very good communication abilities ELK, Wazuh, Splunk, ArcSight SIEM management skills Reporting Job Types: Full-time, Permanent Pay: Up to ₹70,000.00 per month Benefits: Internet reimbursement Schedule: Day shift Supplemental Pay: Performance bonus Application Question(s): Do you have any experience in SIEM Tools? Experience: minimum: 2 years (Required) Language: English (Required) Location: Kochi, Kerala (Required) Work Location: In person

Posted 1 week ago

Apply

5.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Information Security is vital to the operation of Teleperformance. Teleperformance has developed and maintains an effective documented Information Security Management System based on the requirements of the ISO IEC 27001:2013, PCI DSS 3.2, SOC 2, Privacy Regulations, the General Data Protection Regulation (GDPR) and local regulations where appropriate, to ensure a documented method of control that protects Teleperformance, its clients and customers of its clients. As a Security Engineer, you will be responsible for managing the security infrastructure. You will play an essential part in designing and implementing different security services like SIEM, Vulnerability Management, Encryption/Decryption tools and more. You will be given the chance to work with cutting edge technologies and growing while learning will be an essential part of your daily job. Your responsibilities: Automate security deployment processes. Work with SOC teams to drive security improvements. Maintain a network of 200+ servers providing our security tools. Ensure security tools are running without downtimes. Monitor services performance and metrics and optimize alerts. Define and implement hardening process for our services. Take an active role in architectural decisions. Test and evaluate new security systems updates. Write documentation for all Security Engineering procedures. Your background 5+ years working as a system/infrastructure administrator. Advanced experience with Linux/Windows servers. Detailed knowledge of IT security principles and best practices. Experience with cloud environments such as Microsoft Azure. Strong scripting experience with Python. Advanced experience with SIEM tools like Splunk Possess in-depth knowledge of CyberArk solutions. Advanced experience with Vulnerability Assessment tools like Nessus, Qualys. Advanced experience with File Encryption. Experience with docker containers. Configuration management (Ansible, Puppet, Chef). Advanced experience with managing databases, both MySQL and MSSQL. Experience with monitoring tools like Prometheus, PRTG. Advanced Experience with Jenkins or similar orchestration platforms. Experience with GIT and configuration control principles. Experience with email security platforms like Mimecast. Automation driven personality. Excellent problem solving & analytical attitude. Eager to learn, experiment and brake things (but not in production). Fluent in English, spoken and written. Bonus to have. Familiar with CI/CD processes Docker orchestration tools like Rancher, Kubernetes Ability to understand and write APIs. Experience with microservices Experience with Infrastructure as a Code What we can offer: Competitive salary Flexible working environment - office or home - your choice Latest hardware suiting your needs. Challenging, fast-growing and stress-free geek environment We always welcome new ideas and here you have the chance to make a difference. A team of wonderful and highly qualified colleagues from all around the globe who will always be ready to help you. Show more Show less

Posted 1 week ago

Apply

0.0 - 2.0 years

0 Lacs

Kochi, Kerala

On-site

Indeed logo

The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Requirements Must-haves: 2-3 Year Experience as SOC Analyst – (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Knowledge of creating and modifying the dashboards. Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows Deep Knowledge in SIEM, Ticketing tool, EDR, Vulnerability Management, MimeCast, DMARC tool. Excellent written and verbal communication skills. Good to have: · Good to have industry certifications on any SIEM Platform, CEH, C|SA, CompTIA Security+ & Others Main Responsibilities Tier 1 SOC analysts are incident responders, remediating serious attacks escalated from junior analyst, assessing the scope of the attack, and affected systems, and collecting data for further analysis. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments(CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Leading efforts to counter SLA breaches and anticipating the likelihood of future security alerts,incidents. Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone),based on the security event severity and suspicious activities, escalate to managed service support teams, tier 2 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats. Analyse the Events & incidents and identify the root cause. Assist in keeping the SIEM platform up to date and contribute to security strategies as an when newthreats emerge. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. · Document and maintain customer build documents, security procedures and processes. Document incidents to contribute to incident response and disaster recovery plans. Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Keep updated with the likes of OWASP Top 10 vulnerabilities, Bleeping Computer articles etc., for acquiring the knowledge over current threats in security perspective. Other responsibilities and additional duties as assigned by the security management team or service delivery manager. Skills: Excellent event or log analytical skills Proven experience as IT Security Monitoring or similar role Exceptional organizing and time-management skills Very good communication abilities ELK, Wazuh, Splunk, ArcSight SIEM management skills Reporting Job Types: Full-time, Permanent Pay: Up to ₹70,000.00 per month Benefits: Internet reimbursement Schedule: Day shift Supplemental Pay: Performance bonus Application Question(s): Do you have any experience in SIEM Tools? Experience: minimum: 2 years (Required) Language: English (Required) Location: Kochi, Kerala (Required) Work Location: In person

Posted 1 week ago

Apply

0.0 - 8.0 years

0 Lacs

Gujarat

On-site

Indeed logo

Location Gujarat,Maharashtra Ahmedabad,Pune Experience Range 8 - 10 Years Qualification BE (EEE) MCA (Computers) Job Description Senior Information Security Engineer Roles and Responsibilities Candidate will work as a member of the Corporate Security Team and assist in various day to day operational activities such as: Analyze findings from vulnerability scans and penetration tests, work with stakeholders to prioritize and remediate issues. Develop and maintain custom testing scripts and tools to simulate real-world attack scenarios. Oversee security architecture and implement advanced security controls to mitigate identified threats. Conduct email security risk assessments and manage email security solutions (e.g., Proofpoint, Mimecast, Microsoft Defender, Cisco Email Security). Monitor, detect, and respond to phishing, spoofing, and email-based attacks. Manage and tune SIEM, EDR, DLP, and other security technologies. Guide the organization's incident response efforts and participate in forensic investigations. Conduct risk assessments and security reviews for infrastructure and applications, both on-prem and in cloud environments. Ensure compliance with industry regulations and security standards (e.g., ISO 27001, NIST, PCI-DSS, GDPR). Contribute to secure SDLC practices by integrating security into CI/CD pipelines. Support vulnerability lifecycle management and recommend remediation strategies to IT and DevOps teams. Mentor junior staff and drive security awareness programs organization wide. Drive Corporate Security Program based on the NIST CSF – Identify, Detect, Protect, Respond and Recover. Develops, publishes, and maintains a comprehensive organization-wide information privacy and security plans, policies, procedures, and guidelines. Function as primary liaison with auditors, internal teams and vendors and be the resident expert on systems and services in use for PCI compliance and reporting Responsible for managing all aspects of the Vulnerability Risk Management Program including vulnerability identification, analysis, remediation coordination and reporting. Lead the development, implementation, and maintenance of security policies, standards, and guidelines. Identify and Monitor Corporate Networks to determine if there have been any attacks. Analyze network traffic to identify anomalies and test information security controls for weaknesses. Design and implement safeguards to protect the system with the help of network engineers and other members of the Technology Services team. Respond to threats by taking mitigating actions to contain the activity and minimize damage. Participate in risk assessments and breach readiness exercises for incident management. Facilitate forensics analysis to determine the source of the threat. Document lessons learned as well as identify process improvements. Communicate security issues to management via reports, dashboards. Provide weekly metrics on overall security posture. Research emerging threats and work with the Security Operations Center (SOC). Drive the Third-party vendor security evaluation. Participate in the security toll-gates on SSDLC projects. Implement innovative solutions to scale the program with emphasis on automation where applicable. Qualifications Basic Qualifications: Bachelor's Degree in Business, Computer Science or in a STEM major (Science, Technology, Engineering, or Math). Minimum of 8 years of experience in Information Security Experience in at least one full lifecycle supporting PCI compliance is a must have Experience in managing and maintaining a vulnerability management program using Qualys is a must have Experience in developing content in Splunk – searches, alerts (including POC and tuning), dashboards, Apps. Experience of Security Incident and Event Management (SIEM) tools (Splunk) – ingesting data (Forwarders, HTTP Event Collectors, add-ons), troubleshooting Splunk Installation. Experience in Endpoint security (EDR) – Detection and Response. Help create policies and SOP for Response workflow. Experience in Cortex XDR preferred. Experience in Security evaluation of third-party tools. Experience in Email Security and running phishing campaign Experience in Incident Management Experience in system and network security. Experience in Network Penetration testing. Knowledge of software development, computer networks and Internet threat activity. Programming experience in python, Perl and HTML/JS Previous enterprise or platform/cloud vulnerability management experience and Cloud Security is a plus Excellent written and verbal communication skills, including experience engaging with executive and technical audiences. Must be able to work in a fast paced, high profile environment.

Posted 1 week ago

Apply

12.0 - 15.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

Hi, We are having an opening for Senior Domain Lead-AD/IDAM & Email Lead/Architect at our Mumbai location Job Summary : We are seeking an accomplished and strategic Senior Domain Lead to oversee enterprise email and collaboration systems , Active Directory (AD) , Identity & Access Management (IDAM) , and their security and cloud integrations . The role focuses on end-to-end management and security governance across hybrid environments, ensuring scalable, secure, and compliant digital identity and collaboration infrastructure. Areas Of Responsibility : Key Responsibilities: 1. Infrastructure & Operations Management Manage daily operations for Microsoft 365 (Exchange Online, Teams, SharePoint), Active Directory (on-prem and Azure AD), and domain services. Ensure stability and performance of hybrid AD and collaboration systems through proactive monitoring and incident management. Maintain internal and public DNS, DHCP, certificates, and domain name configurations. 2. Identity & Access Management (IDAM) Own the implementation and operation of IDAM platforms supporting user lifecycle management, access provisioning, and deprovisioning. Design and manage SSO, MFA, conditional access , and privileged access controls (PAM) using tools like Azure AD, SailPoint, or Saviynt. Ensure proper RBAC models, access certifications, and policy enforcement across systems. 3. Email & AD Security Strengthen security posture of email systems by configuring and maintaining anti-phishing, DLP, spam filtering, and encryption tools (e.g., Microsoft Defender for Office 365, Mimecast, Proofpoint). Implement and maintain DMARC, DKIM, SPF , and secure mail flow policies. Lead AD security hardening , including Tiered Administration, Kerberos policies, ACL reviews, and delegation best practices. Enforce least privilege , admin account separation , and monitoring of high-privilege actions (via SIEM or native auditing tools). Key Responsibilities: 1. Infrastructure & Operations Management Manage daily operations for Microsoft 365 (Exchange Online, Teams, SharePoint), Active Directory (on-prem and Azure AD), and domain services. Ensure stability and performance of hybrid AD and collaboration systems through proactive monitoring and incident management. Maintain internal and public DNS, DHCP, certificates, and domain name configurations. 2. Identity & Access Management (IDAM) Own the implementation and operation of IDAM platforms supporting user lifecycle management, access provisioning, and deprovisioning. Design and manage SSO, MFA, conditional access , and privileged access controls (PAM) using tools like Azure AD, SailPoint, or Saviynt. Ensure proper RBAC models, access certifications, and policy enforcement across systems. 3. Email & AD Security Strengthen security posture of email systems by configuring and maintaining anti-phishing, DLP, spam filtering, and encryption tools (e.g., Microsoft Defender for Office 365, Mimecast, Proofpoint). Implement and maintain DMARC, DKIM, SPF , and secure mail flow policies. Lead AD security hardening , including Tiered Administration, Kerberos policies, ACL reviews, and delegation best practices. Enforce least privilege , admin account separation , and monitoring of high-privilege actions (via SIEM or native auditing tools). Partner with SOC and Security teams to respond to identity and email-related threats or incidents. 4. Cloud Integration & Identity Governance Administer and secure cloud identity solutions across Azure, Microsoft 365, and third-party SaaS platforms. Align hybrid AD and Azure AD with cloud security frameworks and Zero Trust principles. Manage B2B/B2C identities, OAuth/SAML integrations, and conditional access policies for external partners. 5. Projects & Transformation Lead initiatives such as: Email platform migration or consolidation (e.g., from on-prem to M365), Deployment of IDAM platforms, Secure collaboration tool rollouts, Cloud-first identity transformations. Define project scope, success metrics, resource plans, and stakeholder engagement strategy. 6. Compliance, Governance & Risk Management Define and maintain governance frameworks for collaboration, identity, and directory services. Ensure alignment with compliance standards (e.g., GDPR, ISO 27001, HIPAA, SOX). Conduct periodic access reviews, admin audits, and mailbox permissions checks. Own documentation, runbooks, and policy lifecycle management. 7. Vendor & License Management Manage third-party service providers and tools across email security, cloud identity, and collaboration suites. Oversee licensing, renewals, and performance reviews. Evaluate and onboard new solutions as per evolving enterprise needs. 8. Leadership & People Management Lead a team of email, AD, cloud, and IDAM specialists. Assign responsibilities, set goals, and promote cross-skilling and upskilling. Ensure availability through structured support models, escalation procedures, and documentation. Educational Qualification : Degree or appropriate professional qualification Specific Certification : Certification & Trainings on following technology domains: Microsoft Certified: Enterprise Administrator Expert Microsoft Certified: Identity and Access Administrator Associate Azure Administrator / Security Engineer Associate Certified Information Systems Security Professional (CISSP) optional but a plus ITIL Foundation / Intermediate Project Management Certification (PMP / Prince2) Experience : 12-15 Years of experience Skill (Functional & Behavioural): Technical Skills: Microsoft 365 administration: Exchange, Teams, SharePoint, Defender for O365 Hybrid AD and Azure AD, including AD Connect, GPOs, DNS, DHCP PowerShell scripting for automation and reporting Identity tools: SailPoint, Okta, Saviynt, Azure AD Premium Email security protocols: SPF, DKIM, DMARC Email filtering & security: Defender, Mimecast, Proofpoint AD security best practices and hardening (LAPS, tiering, auditing) Cloud identity and app integration (OAuth, SAML) Soft Skills: Strong leadership, communication, and cross-functional collaboration High attention to detail, especially around security and compliance Problem-solving under pressure and with complex systems Strategic thinking with a proactive mindset toward continuous improvement Pharma industry experience is an advantage. Show more Show less

Posted 1 week ago

Apply

3.0 - 5.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Our technology services client is seeking multiple Anti Spam Support Engineer to join their team on a contract basis. These positions offer a strong potential for conversion to full-time employment upon completion of the initial contract period. Below are further details about the role: Role: Anti Spam Support Engineer Mandatory Skills : Phishing, Threat Attack, Cyber Security Experience: 3 to 5 Years Location : Hyderabad Notice Period : Immediate to 15 Days Job Description: Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response: Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation: Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis: Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography: Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security: Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting: Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance: Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs): Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools: Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms: Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions: Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools: Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools If you are interested, share the updated resume to varshini.t@s3staff.com Show more Show less

Posted 1 week ago

Apply

8.0 - 12.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Our technology services client is seeking multiple SOC Analyst to join their team on a contract basis. These positions offer a strong potential for conversion to full-time employment upon completion of the initial contract period. Below are further details about the role: Role: SOC Analyst Mandatory Skills : Phishing, Threat Attack, Cyber Security Experience: 8-12 Years Location : Hyderabad Notice Period : Immediate to 15 Days Job Description: Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response: Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation: Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis: Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography: Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security: Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting: Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance: Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs): Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools: Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms: Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions: Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools: Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools If you are interested, share the updated resume to sushmitha.r@s3staff.com Show more Show less

Posted 1 week ago

Apply

2.0 years

0 - 0 Lacs

Cochin

On-site

Job Title: SOC Analyst (SA- Security Analyst – L1 Threat Hunt) Location: Kochi We are seeking a highly motivated Level 1 SOC Threat Hunte r to join our Security Operations Center team. This entry-level role is ideal for individuals with a foundational understanding of cybersecurity who are eager to grow their skills in proactive threat detection and response. As an L1 Threat Hunter, you will work closely with SOC analysts and incident responders to identify, analyze, and escalate suspicious activity using a variety of tools and threat intelligence sources. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Requirements Must-have: 2 - 3 Year Experience as SOC Analyst – (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Knowledge of creating and modifying the dashboards. Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows Deep Knowledge in SIEM, Ticketing tool, EDR, Vulnerability Management, MimeCast, Email security. Excellent written and verbal communication skills. Good to have: Good to have industry certifications on any SIEM Platform, CEH, C|SA, CompTIA Security+ & Others Main Responsibilities Monitor security alerts and events from SIEM and other security tools. Perform basic threat hunting across endpoints, network traffic, and log sources using predefined queries and playbooks. Investigate anomalies, potential indicators of compromise (IOCs), and low-fidelity alerts. Escalate verified threats to L2/L3 analysts with relevant context and documentation. Assist in identifying false positives and refining detection rules in collaboration with senior analysts. Document findings, maintain accurate logs of activities, and contribute to reports. Follow standard operating procedures and incident handling workflows. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments (CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Leading efforts to counter SLA breaches and anticipating the likelihood of future security alerts, incidents. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Keep updated with the likes of OWASP Top 10 vulnerabilities, Bleeping Computer articles etc., for acquiring the knowledge over current threats in security perspective. Other responsibilities and additional duties as assigned by the security management team or service delivery manager. Job Types: Full-time, Permanent Pay: ₹20,000.00 - ₹50,000.00 per month Benefits: Internet reimbursement Supplemental Pay: Performance bonus Application Question(s): Did you have worked in the role Threat Hunting and SIEM Tools ? Education: Bachelor's (Required) Experience: minimum: 2 years (Required) Language: English (Required) Location: Kochi, Kerala (Required) Work Location: In person

Posted 1 week ago

Apply

0.0 - 2.0 years

0 Lacs

Kochi, Kerala

On-site

Indeed logo

Job Title: SOC Analyst (SA- Security Analyst – L1 Threat Hunt) Location: Kochi We are seeking a highly motivated Level 1 SOC Threat Hunte r to join our Security Operations Center team. This entry-level role is ideal for individuals with a foundational understanding of cybersecurity who are eager to grow their skills in proactive threat detection and response. As an L1 Threat Hunter, you will work closely with SOC analysts and incident responders to identify, analyze, and escalate suspicious activity using a variety of tools and threat intelligence sources. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Requirements Must-have: 2 - 3 Year Experience as SOC Analyst – (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Knowledge of creating and modifying the dashboards. Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows Deep Knowledge in SIEM, Ticketing tool, EDR, Vulnerability Management, MimeCast, Email security. Excellent written and verbal communication skills. Good to have: Good to have industry certifications on any SIEM Platform, CEH, C|SA, CompTIA Security+ & Others Main Responsibilities Monitor security alerts and events from SIEM and other security tools. Perform basic threat hunting across endpoints, network traffic, and log sources using predefined queries and playbooks. Investigate anomalies, potential indicators of compromise (IOCs), and low-fidelity alerts. Escalate verified threats to L2/L3 analysts with relevant context and documentation. Assist in identifying false positives and refining detection rules in collaboration with senior analysts. Document findings, maintain accurate logs of activities, and contribute to reports. Follow standard operating procedures and incident handling workflows. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments (CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Leading efforts to counter SLA breaches and anticipating the likelihood of future security alerts, incidents. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Keep updated with the likes of OWASP Top 10 vulnerabilities, Bleeping Computer articles etc., for acquiring the knowledge over current threats in security perspective. Other responsibilities and additional duties as assigned by the security management team or service delivery manager. Job Types: Full-time, Permanent Pay: ₹20,000.00 - ₹50,000.00 per month Benefits: Internet reimbursement Supplemental Pay: Performance bonus Application Question(s): Did you have worked in the role Threat Hunting and SIEM Tools ? Education: Bachelor's (Required) Experience: minimum: 2 years (Required) Language: English (Required) Location: Kochi, Kerala (Required) Work Location: In person

Posted 1 week ago

Apply

10.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Job Title/Role : Senior System Engineer Location : Chennai, Thoraipakkam Experience : 10+ Years Position Summary Executes day-to-day maintenance tasks including problem determination and resolution and root- cause analysis. Plans and coordinates the design, installation, administration, and usage of server, storage, virtualization, and other distributed technologies. Conducts system analysis and development to keep systems current with changing technologies. Coordinates communication and support between user-community and the technical/operations functions of IT in relationship with all Windows/Linux functions. Provides recommendations and technology roadmaps to management in the research, design, and development of effective operating programs, systems, procedures, and practices. Ensures the use of performance data and historical metrics and provides and maintains related technology documentation. Job Duties Executes day-to-day maintenance tasks including problem determination and resolution and root-cause analysis. Responds to live site issues, and executes software, platform, and configuration changes. Ensures the use of performance data and historical metrics to plan effectively for growth needs including plan upgrades and optimizations, migrations, and new implementations; identifies and resolves efficiency issues, and improves functionality. Provides and maintains documentation of systems architecture, troubleshooting and support guidelines, system metrics, project information and plans, and training information. Participates in the development of best practice standards including capacity planning, monitoring, configuration, security, historical metrics, recovery strategies, and migration strategies. Validates and adheres to these defined best-practice standards. Works with Associate manager/ manager to set direction regarding authorized software (operating system and application) installed on servers and workstations. Oversee applications running and identifies and resolves problems; continues performance enhancements with measurable benchmarks. Research software updates and patches to supported applications and various operating systems; assists system engineers with installation and testing, as necessary. Interfaces with various areas of IT staff to support ongoing efforts, and works with external resources and vendors, giving and receiving information. Assists software engineers with complex or more difficult technical support inquiries related to hardware maintenance and/or repairs, as necessary. Provides technology stewardship for distributed technologies such as DNS, SMTP, DHCP domain controllers, active directory applications, printing, mail, web servers and FTP services for the Enterprise. Ensures that the SDLC environments (Development, QA, Production) are properly configured and synchronized. Recognizes and addresses potential areas where existing policies and procedures require change, or where new ones need to be developed; this is especially important when guiding and supporting future business lines and expansion. Education An undergraduate degree from an accredited college or university with a focus in Business Information Systems, Computer Science, Information Technology, or related discipline; or in the absence of a degree, directly-related job experience in planning, and coordinating the design, installation, administration, and usage of server, storage, virtualization, and other distributed technologies, where a number of years and proven knowledge may offset the degree requirement. Experience In addition to the education outlined above, at least 10 years of experience in troubleshooting hardware/software for servers and workstations; at least 3 years of systems engineering experience, designing and implementing VMWare and Microsoft server/workstation technologies. Thorough knowledge of and experience with Windows, VMware Virtualization software* (Lab Manager, ESX) Microsoft Active Directory; TCP/IP / DHCP / WINS / DNS, SharePoint, Email and SAN Technology. A proven track record of executing day-to-day maintenance tasks including problem determination/ resolution, and root-cause analysis. Requires broad technical capabilities to distinguish between hardware/software-related problems as well as effective communication skills with the ability work both independently ad as a member of a team as needed. Prefer a Microsoft Certified Systems Administrator (MCSA); Microsoft Certified Information Technology Professional (MCITP) Enterprise Administrator; however related experience may be substituted for the certification providing with intent and ultimate action to achieve certification. Ability to utilize performance data and historical metrics to plan for future Enterprise growth and to provide and maintain related technology documentation. Travel & Other Considerations Travel is rare; however this position must be available for 24-hour “on-call” service to respond to system emergencies. Discipline Addendum for OEConnection Senior System Engineer Configuration Management Disciplines - Required/Preferred Experience & Skills Management, configuration, and troubleshooting of Windows Server, Windows Desktop, 365 (Exchange, SharePoint, Entra AD, Intune),Active Directory (GPO, ADUC), telephony platform, MDM (Intune, SCCM, Jamf), patch management (SCCM, Azure ARC), mail flow (Exchange, Mimecast), file services (SharePoint, DFS), managing virtual servers using a hypervisor such as VMware or Hyper-V, and SSO/IDP. Writing and modifying PowerShell scripts and batch files, especially as it pertains to managing the 365 platform. Technical documentation, performing self-lead work, recording work in a ticketing platform and project management systems, training team members across regions. Internal Operations Disciplines - Required/Preferred Experience & Skills Linux and/or MacOS experience Microsoft Power Platform experience (PowerApps, Power Automate) creating apps and writing advanced flows. Advanced experience (5+ years) configuring everything above, especially Intune. Previous experience with rolling out RBAC, JITA ,and PIM Experience creating and managing a disaster recovery plan beyond just performing backups. Experience managing servers on a cloud platform such as Azure or AWS. Must-have skillset for the role: Windows Server 365 (Exchange, SharePoint, Entra AD, Intune) Active Directory Hyper-V/VMWare Perks and Benefits: Competitive salary and benefits Group Medical Insurance ICICI Bank Multi Wallet Collaborative workspace Flexible working hours Hybrid working model What Makes Working at OEC Awesome? We have a new OEC Technology Centre of Excellence in Chennai, India! Our team is beyond thrilled to work with the new office, but we’re even more excited for the innovation and creativity that this living space will certainly inspire! We believe in surrounding ourselves with not only the best and the brightest individuals, but those that are unique and purpose-driven in all that they do. OEC India has been selected as one of the ‘Top 25 Safest Workplaces in India’ by KelpHR. OEC provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, colour, religion, creed, gender, sex (including pregnancy, childbirth, and related medical conditions), sexual orientation, gender identity, national origin, age, disability, genetic information or characteristics, marital status, familial status, veteran or military status, status regarding public assistance, membership or activity in a local commission, or any other protected status in accordance with applicable federal, state and local law. Show more Show less

Posted 1 week ago

Apply

3.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Deliverability Engineer (Microsoft Dynamics 365 Customer Insights / Marketing) Role Summary This is a mid- to senior-level role responsible for ensuring that Dynamics customers could deliver emails to their customers’ inboxes reliably. As a Deliverability Engineer, you will optimize email delivery and inbox placement rates through expert management of email infrastructure, sender reputation, and content best practices. You’ll act as the subject matter expert on email deliverability within the organization, working closely with engineering and product management teams while strictly adhering to compliance standards. The role emphasizes hands-on deliverability expertise to maintain high sender reputation and legal compliance. Key Responsibilities · Optimize Email Deliverability: Monitor and analyze email performance metrics (delivery rates, bounce rates, open rates, spam complaints) to proactively identify issues and improve inbox placement. Develop and implement strategies (IP warming, throttling, content adjustments) to achieve maximum deliverability and sender reputation. · Troubleshot Deliverability Issues: Diagnose and resolve email delivery problems across major email providers and spam filters. This includes working on inbox placement challenges with top consumer ISPs like Gmail, Outlook.com/Office 365, Yahoo Mail, etc., as well as addressing issues with enterprise email gateways such as Cisco IronPort and Mimecast. Analyze bounce messages and email headers to pinpoint causes (blocks, spam filtering, DNS issues) and adjust sending tactics accordingly. · Infrastructure Management: Manage and tune the email delivery infrastructure. Configure and maintain high-volume email MTAs (e.g., PowerMTA, Halon, KumoMTA) to ensure efficient delivery. Oversee IP address pools, DNS records (SPF, DKIM, DMARC), and feedback loops to maintain a positive sender reputation and quickly remediate any blacklisting or throttling issues. · Authentication & Protocols: Ensure all outbound emails are properly authenticated and comply with technical standards. · Security and Compliance Oversight: Work closely with legal and product teams to guarantee that all email campaigns adhere to relevant laws and regulations (CAN-SPAM, GDPR, and other anti-spam/privacy laws). · Reporting and Communication: Provide regular reports and insights on deliverability performance to stakeholders. Highlight trends, inbox placement rates at major providers, and the health of sender reputation. Communicate any risks or incidents (such as spikes in bounce rates or complaints) promptly and recommend actionable solutions. Educate internal teams on the importance of deliverability and guide them in implementing best practices to maintain high inbox placement. · Abuse protection. Monitor customers’ activity and prevent abuse of the platform by proactively detecting and timely addressing phishing and spam attacks. Work together with engineering teams to continuously improve abuse protection measures. Required Qualifications and Skills · Experience: 3+ years of experience in email deliverability, email infrastructure, or a related field, preferably in high-volume email sending environments. In-depth understanding of how large-scale email campaigns are executed and monitored. · Email Infrastructure Expertise: Proven hands-on expertise with high-performance email delivery systems (MTAs and ESPs) such as PowerMTA, Halon, KumoMTA, Green Arrow. Ability to configure, optimize, and troubleshoot MTA platforms for optimal throughput and inbox success. · Email Protocols & Authentication: Strong knowledge of email protocols (SMTP, POP/IMAP) and deep expertise in email authentication standards (SPF, DKIM, DMARC). Capable of implementing and updating DNS records and policies to ensure outgoing emails are properly authenticated and trusted by receiving domains. · Deliverability & ISP Relations: Understanding of how major mailbox providers (Gmail, Microsoft Outlook/Exchange, Yahoo, etc.) handle inbound email and apply spam filtering. Experience using tools like Google Postmaster Tools and Microsoft SNDS to monitor sender reputation. Ability to manage ISP feedback loops and relationships, and to navigate postmaster support channels to resolve deliverability issues. · Analytical Skills: Strong analytical and problem-solving abilities, with experience interpreting email performance data and logs. Proficiency in analyzing bounce codes, spam reports, open/click metrics, and using that data to drive continuous improvement. Familiarity with deliverability monitoring platforms (e.g., Validity Return Path, 250ok) is a plus. · Technical Acumen: Comfortable with general networking and DNS concepts (IP addresses, DNS, hosting) as they relate to email. The ability to script or use tools (Python, PowerShell, or similar) to automate tasks such as log analysis, data extraction, or monitoring is highly valued. · Communication & Teamwork: Excellent communication skills to clearly explain deliverability concepts and issues to both technical and non-technical stakeholders. Proven ability to work cross-functionally and influence best practices in a collaborative environment. A proactive mindset to educate and inform teams about sender reputation and compliance requirements. Show more Show less

Posted 2 weeks ago

Apply

8.0 - 12.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Our technology services client is seeking multiple Anti Spam Support Engineer to join their team on a contract basis. These positions offer a strong potential for conversion to full-time employment upon completion of the initial contract period. Below are further details about the role: Role: Anti Spam Support Engineer Mandatory Skills : Phishing, Threat Attack, Cyber Security Experience: 8-12 Years Location : Hyderabad Notice Period : Immediate to 15 Days Job Description: Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response: Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation: Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis: Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography: Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security: Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting: Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance: Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs): Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools: Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms: Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions: Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools: Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools If you are interested, share the updated resume to rajesh.s@s3staff.com Show more Show less

Posted 2 weeks ago

Apply

3.0 - 5.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Our technology services client is seeking multiple Anti Spam Support Engineer to join their team on a contract basis. These positions offer a strong potential for conversion to full-time employment upon completion of the initial contract period. Below are further details about the role: Role: Anti Spam Support Engineer Mandatory Skills : Phishing, Threat Attack, Cyber Security Experience: 3 to 5 Years Location : Hyderabad Notice Period : Immediate to 15 Days Job Description: Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response: Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation: Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis: Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography: Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security: Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting: Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance: Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs): Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools: Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms: Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions: Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools: Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools If you are interested, share the updated resume to sushmitha.r@s3staff.com Show more Show less

Posted 2 weeks ago

Apply

8.0 - 12.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Our technology services client is seeking multiple Anti Spam Support Engineer to join their team on a contract basis. These positions offer a strong potential for conversion to full-time employment upon completion of the initial contract period. Below are further details about the role: Role: Anti Spam Support Engineer Mandatory Skills : Phishing, Threat Attack, Cyber Security Experience: 8-12 Years Location : Hyderabad Notice Period : Immediate to 15 Days Job Description: Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response: Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation: Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis: Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography: Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security: Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting: Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance: Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs): Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools: Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms: Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions: Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools: Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools If you are interested, share the updated resume to mukesh.s@s3staff.com Show more Show less

Posted 2 weeks ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Key Responsibilities: Incident Detection & Response: Monitor security alerts and events through SIEM tools to identify potential threats. Investigate security incidents and respond in a timely and effective manner. Leverage EDR (Endpoint Detection and Response) solutions for threat detection and incident analysis. Threat Analysis & Mitigation: Conduct thorough threat and malware analysis to identify and mitigate risks. Work closely with internal teams to investigate malware, viruses, and ransomware threats. Use CrowdStrike , Defender , and other endpoint security tools to prevent attacks. Email Security Management: Monitor and manage email security systems to prevent phishing, spam, and other malicious email threats. Respond to suspicious email alerts and work with other teams to resolve them. Continuous Monitoring & Alerting: Actively monitor systems, networks, and applications for any signs of suspicious activities. Utilize Endpoint Security solutions to continuously track and protect endpoints across the network. Collaboration & Reporting: Work closely with the IT and security teams to assess, analyze, and resolve security incidents. Maintain detailed documentation of incidents, findings, and responses for future reference. Regularly report on the status of ongoing security incidents and trends to senior management. Research & Knowledge Enhancement: Stay updated with the latest security threats, vulnerabilities, and trends. Participate in security training and development to improve skills in SIEM , EDR , and other security tools. Required Skills and Qualifications: Bachelor’s degree in Cybersecurity, Information Security, Computer Science, or a related field, or equivalent work experience. Strong experience with SIEM (e.g., Splunk, QRadar, ArcSight). Proficient in EDR and Endpoint Security tools (e.g., CrowdStrike, Microsoft Defender). Hands-on experience in threat and malware analysis . Familiarity with email security systems (e.g., Proofpoint, Mimecast). Strong understanding of network protocols, firewalls, and intrusion detection/prevention systems. Knowledge of security frameworks and industry standards (e.g., MITRE ATT&CK, NIST). Excellent analytical and problem-solving skills. Preferred Qualifications: Security certifications like CompTIA Security+ , CISSP , CEH , or GIAC are a plus. Experience with incident response and forensic investigation. Familiarity with cloud security in AWS, Azure, or Google Cloud. Show more Show less

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies