Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
0.0 - 2.0 years
0 Lacs
Kochi, Kerala
On-site
Job Title: SOC Analyst (SA- Security Analyst – L1 Threat Hunt) Location: Kochi We are seeking a highly motivated Level 1 SOC Threat Hunte r to join our Security Operations Center team. This entry-level role is ideal for individuals with a foundational understanding of cybersecurity who are eager to grow their skills in proactive threat detection and response. As an L1 Threat Hunter, you will work closely with SOC analysts and incident responders to identify, analyze, and escalate suspicious activity using a variety of tools and threat intelligence sources. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Requirements Must-have: 2 - 3 Year Experience as SOC Analyst – (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Knowledge of creating and modifying the dashboards. Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows Deep Knowledge in SIEM, Ticketing tool, EDR, Vulnerability Management, MimeCast, Email security. Excellent written and verbal communication skills. Good to have: Good to have industry certifications on any SIEM Platform, CEH, C|SA, CompTIA Security+ & Others Main Responsibilities Monitor security alerts and events from SIEM and other security tools. Perform basic threat hunting across endpoints, network traffic, and log sources using predefined queries and playbooks. Investigate anomalies, potential indicators of compromise (IOCs), and low-fidelity alerts. Escalate verified threats to L2/L3 analysts with relevant context and documentation. Assist in identifying false positives and refining detection rules in collaboration with senior analysts. Document findings, maintain accurate logs of activities, and contribute to reports. Follow standard operating procedures and incident handling workflows. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments (CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Leading efforts to counter SLA breaches and anticipating the likelihood of future security alerts, incidents. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Keep updated with the likes of OWASP Top 10 vulnerabilities, Bleeping Computer articles etc., for acquiring the knowledge over current threats in security perspective. Other responsibilities and additional duties as assigned by the security management team or service delivery manager. Job Types: Full-time, Permanent Pay: ₹20,000.00 - ₹50,000.00 per month Benefits: Internet reimbursement Supplemental Pay: Performance bonus Application Question(s): Did you have worked in the role Threat Hunting and SIEM Tools ? Education: Bachelor's (Required) Experience: minimum: 2 years (Required) Language: English (Required) Location: Kochi, Kerala (Required) Work Location: In person
Posted 3 months ago
10.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Job Title/Role : Senior System Engineer Location : Chennai, Thoraipakkam Experience : 10+ Years Position Summary Executes day-to-day maintenance tasks including problem determination and resolution and root- cause analysis. Plans and coordinates the design, installation, administration, and usage of server, storage, virtualization, and other distributed technologies. Conducts system analysis and development to keep systems current with changing technologies. Coordinates communication and support between user-community and the technical/operations functions of IT in relationship with all Windows/Linux functions. Provides recommendations and technology roadmaps to management in the research, design, and development of effective operating programs, systems, procedures, and practices. Ensures the use of performance data and historical metrics and provides and maintains related technology documentation. Job Duties Executes day-to-day maintenance tasks including problem determination and resolution and root-cause analysis. Responds to live site issues, and executes software, platform, and configuration changes. Ensures the use of performance data and historical metrics to plan effectively for growth needs including plan upgrades and optimizations, migrations, and new implementations; identifies and resolves efficiency issues, and improves functionality. Provides and maintains documentation of systems architecture, troubleshooting and support guidelines, system metrics, project information and plans, and training information. Participates in the development of best practice standards including capacity planning, monitoring, configuration, security, historical metrics, recovery strategies, and migration strategies. Validates and adheres to these defined best-practice standards. Works with Associate manager/ manager to set direction regarding authorized software (operating system and application) installed on servers and workstations. Oversee applications running and identifies and resolves problems; continues performance enhancements with measurable benchmarks. Research software updates and patches to supported applications and various operating systems; assists system engineers with installation and testing, as necessary. Interfaces with various areas of IT staff to support ongoing efforts, and works with external resources and vendors, giving and receiving information. Assists software engineers with complex or more difficult technical support inquiries related to hardware maintenance and/or repairs, as necessary. Provides technology stewardship for distributed technologies such as DNS, SMTP, DHCP domain controllers, active directory applications, printing, mail, web servers and FTP services for the Enterprise. Ensures that the SDLC environments (Development, QA, Production) are properly configured and synchronized. Recognizes and addresses potential areas where existing policies and procedures require change, or where new ones need to be developed; this is especially important when guiding and supporting future business lines and expansion. Education An undergraduate degree from an accredited college or university with a focus in Business Information Systems, Computer Science, Information Technology, or related discipline; or in the absence of a degree, directly-related job experience in planning, and coordinating the design, installation, administration, and usage of server, storage, virtualization, and other distributed technologies, where a number of years and proven knowledge may offset the degree requirement. Experience In addition to the education outlined above, at least 10 years of experience in troubleshooting hardware/software for servers and workstations; at least 3 years of systems engineering experience, designing and implementing VMWare and Microsoft server/workstation technologies. Thorough knowledge of and experience with Windows, VMware Virtualization software* (Lab Manager, ESX) Microsoft Active Directory; TCP/IP / DHCP / WINS / DNS, SharePoint, Email and SAN Technology. A proven track record of executing day-to-day maintenance tasks including problem determination/ resolution, and root-cause analysis. Requires broad technical capabilities to distinguish between hardware/software-related problems as well as effective communication skills with the ability work both independently ad as a member of a team as needed. Prefer a Microsoft Certified Systems Administrator (MCSA); Microsoft Certified Information Technology Professional (MCITP) Enterprise Administrator; however related experience may be substituted for the certification providing with intent and ultimate action to achieve certification. Ability to utilize performance data and historical metrics to plan for future Enterprise growth and to provide and maintain related technology documentation. Travel & Other Considerations Travel is rare; however this position must be available for 24-hour “on-call” service to respond to system emergencies. Discipline Addendum for OEConnection Senior System Engineer Configuration Management Disciplines - Required/Preferred Experience & Skills Management, configuration, and troubleshooting of Windows Server, Windows Desktop, 365 (Exchange, SharePoint, Entra AD, Intune),Active Directory (GPO, ADUC), telephony platform, MDM (Intune, SCCM, Jamf), patch management (SCCM, Azure ARC), mail flow (Exchange, Mimecast), file services (SharePoint, DFS), managing virtual servers using a hypervisor such as VMware or Hyper-V, and SSO/IDP. Writing and modifying PowerShell scripts and batch files, especially as it pertains to managing the 365 platform. Technical documentation, performing self-lead work, recording work in a ticketing platform and project management systems, training team members across regions. Internal Operations Disciplines - Required/Preferred Experience & Skills Linux and/or MacOS experience Microsoft Power Platform experience (PowerApps, Power Automate) creating apps and writing advanced flows. Advanced experience (5+ years) configuring everything above, especially Intune. Previous experience with rolling out RBAC, JITA ,and PIM Experience creating and managing a disaster recovery plan beyond just performing backups. Experience managing servers on a cloud platform such as Azure or AWS. Must-have skillset for the role: Windows Server 365 (Exchange, SharePoint, Entra AD, Intune) Active Directory Hyper-V/VMWare Perks and Benefits: Competitive salary and benefits Group Medical Insurance ICICI Bank Multi Wallet Collaborative workspace Flexible working hours Hybrid working model What Makes Working at OEC Awesome? We have a new OEC Technology Centre of Excellence in Chennai, India! Our team is beyond thrilled to work with the new office, but we’re even more excited for the innovation and creativity that this living space will certainly inspire! We believe in surrounding ourselves with not only the best and the brightest individuals, but those that are unique and purpose-driven in all that they do. OEC India has been selected as one of the ‘Top 25 Safest Workplaces in India’ by KelpHR. OEC provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, colour, religion, creed, gender, sex (including pregnancy, childbirth, and related medical conditions), sexual orientation, gender identity, national origin, age, disability, genetic information or characteristics, marital status, familial status, veteran or military status, status regarding public assistance, membership or activity in a local commission, or any other protected status in accordance with applicable federal, state and local law. Show more Show less
Posted 3 months ago
3.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Deliverability Engineer (Microsoft Dynamics 365 Customer Insights / Marketing) Role Summary This is a mid- to senior-level role responsible for ensuring that Dynamics customers could deliver emails to their customers’ inboxes reliably. As a Deliverability Engineer, you will optimize email delivery and inbox placement rates through expert management of email infrastructure, sender reputation, and content best practices. You’ll act as the subject matter expert on email deliverability within the organization, working closely with engineering and product management teams while strictly adhering to compliance standards. The role emphasizes hands-on deliverability expertise to maintain high sender reputation and legal compliance. Key Responsibilities · Optimize Email Deliverability: Monitor and analyze email performance metrics (delivery rates, bounce rates, open rates, spam complaints) to proactively identify issues and improve inbox placement. Develop and implement strategies (IP warming, throttling, content adjustments) to achieve maximum deliverability and sender reputation. · Troubleshot Deliverability Issues: Diagnose and resolve email delivery problems across major email providers and spam filters. This includes working on inbox placement challenges with top consumer ISPs like Gmail, Outlook.com/Office 365, Yahoo Mail, etc., as well as addressing issues with enterprise email gateways such as Cisco IronPort and Mimecast. Analyze bounce messages and email headers to pinpoint causes (blocks, spam filtering, DNS issues) and adjust sending tactics accordingly. · Infrastructure Management: Manage and tune the email delivery infrastructure. Configure and maintain high-volume email MTAs (e.g., PowerMTA, Halon, KumoMTA) to ensure efficient delivery. Oversee IP address pools, DNS records (SPF, DKIM, DMARC), and feedback loops to maintain a positive sender reputation and quickly remediate any blacklisting or throttling issues. · Authentication & Protocols: Ensure all outbound emails are properly authenticated and comply with technical standards. · Security and Compliance Oversight: Work closely with legal and product teams to guarantee that all email campaigns adhere to relevant laws and regulations (CAN-SPAM, GDPR, and other anti-spam/privacy laws). · Reporting and Communication: Provide regular reports and insights on deliverability performance to stakeholders. Highlight trends, inbox placement rates at major providers, and the health of sender reputation. Communicate any risks or incidents (such as spikes in bounce rates or complaints) promptly and recommend actionable solutions. Educate internal teams on the importance of deliverability and guide them in implementing best practices to maintain high inbox placement. · Abuse protection. Monitor customers’ activity and prevent abuse of the platform by proactively detecting and timely addressing phishing and spam attacks. Work together with engineering teams to continuously improve abuse protection measures. Required Qualifications and Skills · Experience: 3+ years of experience in email deliverability, email infrastructure, or a related field, preferably in high-volume email sending environments. In-depth understanding of how large-scale email campaigns are executed and monitored. · Email Infrastructure Expertise: Proven hands-on expertise with high-performance email delivery systems (MTAs and ESPs) such as PowerMTA, Halon, KumoMTA, Green Arrow. Ability to configure, optimize, and troubleshoot MTA platforms for optimal throughput and inbox success. · Email Protocols & Authentication: Strong knowledge of email protocols (SMTP, POP/IMAP) and deep expertise in email authentication standards (SPF, DKIM, DMARC). Capable of implementing and updating DNS records and policies to ensure outgoing emails are properly authenticated and trusted by receiving domains. · Deliverability & ISP Relations: Understanding of how major mailbox providers (Gmail, Microsoft Outlook/Exchange, Yahoo, etc.) handle inbound email and apply spam filtering. Experience using tools like Google Postmaster Tools and Microsoft SNDS to monitor sender reputation. Ability to manage ISP feedback loops and relationships, and to navigate postmaster support channels to resolve deliverability issues. · Analytical Skills: Strong analytical and problem-solving abilities, with experience interpreting email performance data and logs. Proficiency in analyzing bounce codes, spam reports, open/click metrics, and using that data to drive continuous improvement. Familiarity with deliverability monitoring platforms (e.g., Validity Return Path, 250ok) is a plus. · Technical Acumen: Comfortable with general networking and DNS concepts (IP addresses, DNS, hosting) as they relate to email. The ability to script or use tools (Python, PowerShell, or similar) to automate tasks such as log analysis, data extraction, or monitoring is highly valued. · Communication & Teamwork: Excellent communication skills to clearly explain deliverability concepts and issues to both technical and non-technical stakeholders. Proven ability to work cross-functionally and influence best practices in a collaborative environment. A proactive mindset to educate and inform teams about sender reputation and compliance requirements. Show more Show less
Posted 3 months ago
8.0 - 12.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Our technology services client is seeking multiple Anti Spam Support Engineer to join their team on a contract basis. These positions offer a strong potential for conversion to full-time employment upon completion of the initial contract period. Below are further details about the role: Role: Anti Spam Support Engineer Mandatory Skills : Phishing, Threat Attack, Cyber Security Experience: 8-12 Years Location : Hyderabad Notice Period : Immediate to 15 Days Job Description: Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response: Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation: Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis: Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography: Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security: Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting: Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance: Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs): Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools: Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms: Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions: Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools: Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools If you are interested, share the updated resume to rajesh.s@s3staff.com Show more Show less
Posted 3 months ago
3.0 - 5.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Our technology services client is seeking multiple Anti Spam Support Engineer to join their team on a contract basis. These positions offer a strong potential for conversion to full-time employment upon completion of the initial contract period. Below are further details about the role: Role: Anti Spam Support Engineer Mandatory Skills : Phishing, Threat Attack, Cyber Security Experience: 3 to 5 Years Location : Hyderabad Notice Period : Immediate to 15 Days Job Description: Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response: Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation: Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis: Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography: Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security: Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting: Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance: Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs): Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools: Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms: Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions: Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools: Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools If you are interested, share the updated resume to sushmitha.r@s3staff.com Show more Show less
Posted 3 months ago
8.0 - 12.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Our technology services client is seeking multiple Anti Spam Support Engineer to join their team on a contract basis. These positions offer a strong potential for conversion to full-time employment upon completion of the initial contract period. Below are further details about the role: Role: Anti Spam Support Engineer Mandatory Skills : Phishing, Threat Attack, Cyber Security Experience: 8-12 Years Location : Hyderabad Notice Period : Immediate to 15 Days Job Description: Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response: Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation: Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis: Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography: Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security: Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting: Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance: Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs): Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools: Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms: Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions: Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools: Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools If you are interested, share the updated resume to mukesh.s@s3staff.com Show more Show less
Posted 3 months ago
0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Key Responsibilities: Incident Detection & Response: Monitor security alerts and events through SIEM tools to identify potential threats. Investigate security incidents and respond in a timely and effective manner. Leverage EDR (Endpoint Detection and Response) solutions for threat detection and incident analysis. Threat Analysis & Mitigation: Conduct thorough threat and malware analysis to identify and mitigate risks. Work closely with internal teams to investigate malware, viruses, and ransomware threats. Use CrowdStrike , Defender , and other endpoint security tools to prevent attacks. Email Security Management: Monitor and manage email security systems to prevent phishing, spam, and other malicious email threats. Respond to suspicious email alerts and work with other teams to resolve them. Continuous Monitoring & Alerting: Actively monitor systems, networks, and applications for any signs of suspicious activities. Utilize Endpoint Security solutions to continuously track and protect endpoints across the network. Collaboration & Reporting: Work closely with the IT and security teams to assess, analyze, and resolve security incidents. Maintain detailed documentation of incidents, findings, and responses for future reference. Regularly report on the status of ongoing security incidents and trends to senior management. Research & Knowledge Enhancement: Stay updated with the latest security threats, vulnerabilities, and trends. Participate in security training and development to improve skills in SIEM , EDR , and other security tools. Required Skills and Qualifications: Bachelor’s degree in Cybersecurity, Information Security, Computer Science, or a related field, or equivalent work experience. Strong experience with SIEM (e.g., Splunk, QRadar, ArcSight). Proficient in EDR and Endpoint Security tools (e.g., CrowdStrike, Microsoft Defender). Hands-on experience in threat and malware analysis . Familiarity with email security systems (e.g., Proofpoint, Mimecast). Strong understanding of network protocols, firewalls, and intrusion detection/prevention systems. Knowledge of security frameworks and industry standards (e.g., MITRE ATT&CK, NIST). Excellent analytical and problem-solving skills. Preferred Qualifications: Security certifications like CompTIA Security+ , CISSP , CEH , or GIAC are a plus. Experience with incident response and forensic investigation. Familiarity with cloud security in AWS, Azure, or Google Cloud. Show more Show less
Posted 3 months ago
3.0 - 5.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Our technology services client is seeking multiple Anti Spam Support Engineer to join their team on a contract basis. These positions offer a strong potential for conversion to full-time employment upon completion of the initial contract period. Below are further details about the role: Role: Anti Spam Support Engineer Mandatory Skills : Phishing, Threat Attack, Cyber Security Experience: 3 to 5 Years Location : Hyderabad Notice Period : Immediate to 15 Days Job Description: Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response: Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation: Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis: Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography: Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security: Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting: Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance: Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs): Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools: Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms: Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions: Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools: Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools If you are interested, share the updated resume to madhuri.p@s3staff.com Show more Show less
Posted 3 months ago
5.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
An extraordinarily talented group of individuals work together every day to drive TNS' success, from both professional and personal perspectives. Come join the excellence! Overview Build, manage, maintain, and provide engineering and administrative support for core Microsoft Windows server on premise and cloud infrastructure Responsible for all server hardware and Windows operating systems for supported systems across global infrastructure Support corporate unified communications systems, such as MS Hybrid Exchange, MS Teams, and M365 Responsibilities Implement and operate tactical plans that align with management-defined strategies to meet corporate, divisional, and team goals Continuous improvement of service delivery to internal and external customers Development, configuration, administration, and troubleshooting of Microsoft Windows Servers (Server 2012-current) Patching and support of Windows server systems in all global locations Create, maintain, and improve documentation for processes, architecture, or other infrastructure elements Advance process automation where possible Qualifications 5+ years’ experience managing Windows systems (Server 2012 R2 and later) 2+ years’ experience supporting MS Exchange, Teams and M365 Demonstrated support experience with Active Directory, DNS, DHCP and other core infrastructure services Demonstrated skills in decision making, judgement and initiative Global infrastructure support and project experience preferred Scripting/Coding/Automation experience is preferred Exposure to other IT areas helpful to assist in troubleshooting. Including Networking, Firewalls, Mimecast and VMWare Knowledge of Splunk for reporting purposes Experience working in a secure physical and virtual Windows server environment Knowledge of PCI requirements, vulnerability scan remediation and controls desired Bachelor’s degree or equivalent certificates/experience required ITIL certification preferred If you are passionate about technology, love personal growth and opportunity, come see what TNS is all about! TNS is an equal opportunity employer. TNS evaluates qualified applicants without regard to race, color, religion, gender, national origin, age, sexual orientation, gender identity or expression, protected veteran status, disability/handicap status or any other legally protected characteristic. Show more Show less
Posted 3 months ago
10.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
Role Description Role Summary: As the Collaboration & Mobility Service Owner , you will lead enterprise collaboration tools and mobile communication strategies for BFSI clients. The role focuses on Microsoft 365, Teams (non-voice), SharePoint, Exchange, secure mobility, and ensuring a seamless and compliant user experience. Key Responsibilities Define and implement UCC collaboration and mobility strategy. Manage Microsoft 365 suite (Exchange, Teams, SharePoint) and secure mobile solutions (BYOD, MDM). Oversee compliance tools such as DLP, Mimecast, and encryption services. Coordinate incident resolution, root cause analysis, and continuous service improvements. Promote collaboration innovation using AI-powered tools, hybrid cloud integrations, and automation. Lead cross-functional stakeholder meetings and vendor engagements. Maintain service documentation, SOPs, and governance reports. Ensure mobility policies align with BFSI security and compliance standards. Required Skills & Qualifications 10+ years in IT services; 5+ years in UCC or enterprise collaboration. In-depth knowledge of M365, Teams, SharePoint, Exchange, DLP, and secure mobility platforms. Familiarity with tools like Intune, AirWatch, and other enterprise mobility management systems. Strong leadership and vendor management abilities. Experience with BFSI security and compliance frameworks. Preferred certifications: ITIL, PMP. Performance & KPIs Reduction in recurring incidents and service escalations SLA adherence and backlog management User adoption rates for collaboration tools Audit readiness and compliance effectiveness Completion of service improvement initiatives Skills M365,Microsoft Sharepoint,microsoft teams Show more Show less
Posted 3 months ago
8.0 - 13.0 years
3 - 7 Lacs
Pune, Bengaluru
Work from Office
Job Title:DLP Lead Experience8-14 Years Location:Bangalore /Pune : Technical Skills: Experience in configuring s and creating workflows on Email DLP - Proofpoint Prior experience with CASB Netskope or similar solution Knowledge of security principles including cloud , standards and techniques Understanding of cloud principles ,cloud applications and key cloud service providers Prior experience with Data loss prevention tools, SIEM, network devices and other infrastructure Reviews violations of data security procedures to eliminate violations Strong experience on Mimecast email Security solution for threat Protection, Spoofing, Encryption, Archive, URL Defense Strong understanding of email delivery architecture, email gateway and DNS technologies Strong understanding of networking, SMTP, DNS Experience of compliance requirements for database security (e.g. SOX, HIPAA, PCI etc.) Strong verbal and written communications skills; must be able to effectively communicate technical details and thoughts in non-technical/general terminology to various levels of the organization. Work well in team environments with internal and external resources as well as work independently on tasks Strong organizational, and time management skills Process Skills: Overall management of Email DLP solution - Proofpoint Analyze blocked emails Manage CASB operations ,maintain implemented Netskope CASB solution,respond and resolve incidentsinvestigate and conduct analysis Work on email release/drop as per requests Tune/Amend email DLP policies Perform Daily DLP System Health check and publish health report Update/Add - roles modification, response rules, complex and new policies modifications Email DLP – Microsoft E4 licenses CASB –Netskope Behavioral Skills: Effective interpersonal, team building and communication skills Ability to collaborate; be able to communicate clearly and concisely both to laypeople and peers, be able to follow instructions, make a team stronger for your presence and not weaker. Ability to see the bigger picture and differing perspectives; to compromise, to balance competing priorities, and to prioritize the user. Desire for continuous improvement, of the worthy sort; always be learning and seeking improvement, avoid change aversion and excessive conservatism, equally avoid harmful perfectionism, 'not-invented-here' syndrome and damaging pursuit of the bleeding edge for its own sake. Learn things quickly, while working outside the area of expertise. Analyze a problem and realize exactly what all will be affected by even the smallest of change you make in your design Ability to communicate complex technology to no tech audience in simple and precise manner. Ownership skills. Qualification: Must have 4 Year degree (Computer Science, Information Systems or equivalent) 4+ years overall IT experience.
Posted 3 months ago
3.0 - 4.0 years
0 Lacs
Delhi, India
On-site
Our Company We’re Hitachi Digital, a company at the forefront of digital transformation and the fastest growing division of Hitachi Group. We’re crucial to the company’s strategy and ambition to become a premier global player in the massive and fast-moving digital transformation market. Our group companies, including GlobalLogic, Hitachi Digital Services, Hitachi Vantara and more, offer comprehensive services that span the entire digital lifecycle, from initial idea to full-scale operation and the infrastructure to run it on. Hitachi Digital represents One Hitachi, integrating domain knowledge and digital capabilities, and harnessing the power of the entire portfolio of services, technologies, and partnerships, to accelerate synergy creation and make real-world impact for our customers and society as a whole. Imagine the sheer breadth of talent it takes to unleash a digital future. We don’t expect you to ‘fit’ every requirement – your life experience, character, perspective, and passion for achieving great things in the world are equally as important to us. Meet Our Team We are the Global SOC team, part of Global Information Security at Hitachi Digital. Our mission is to protect the company's and its customers' vital information systems and data while responding to attacks, intrusions, and other security incidents. As passionate advocates of information security, we are a team of out-of-the-box thinkers, innovators, and collaborative problem-solvers. We continuously seek new and better ways to enhance our practices and strive for nothing less than excellence in our cybersecurity operations. We are looking for highly motivated individuals with a positive attitude who want to be part of something exceptional. What You’ll Be Doing As an Email Security Engineer, you will be working as an individual contributor to work with a dynamic team of Threat hunters working 24x7. You should have 3-4 years of experience in cyber security. Your role will include: Act as a Primary contact for Mimecast implementation and operation support work. Strong problem-solving and troubleshooting skills include performing root cause analysis for preventative investigation. Working experience of understanding of email protocols like SMTP, SPF, DKIM and DMARC. Proficient in Header analysis. Administration of Mimecast, creation and modification of email policies, spam rules as per service tickets for specific security requirements Investigation, Triage, remediate and find RCA of Compromised accounts, e-mail threats, and abuse reports from various sources. Ensure Email Security gateway are configured with advanced cyber security features and rules. Investigate, document, and report on information security issues and emerging trends. Experience with GSUITE and O365. What You Bring To The Team At least 4 years of experience in working in a 24x7 Security Operation Center (SOC) environment. Strong knowledge of Email Security protocols, including safe listing, block listing, domain on/off boarding, URL/attachment’s defense and phishing analysis Provide design and configuration support for implementation of Mimecast email security gateway. Provide operational support for tickets related to Email Security. Knowledge of Cloud Infrastructure, and Cloud Security (GCP, AWS, Azure) Knowledge of MITRE ATT&Ck, Cyber Kill Chain, Threat Hunting & Attack Forensics. Knowledge of Security Fundamentals, Security Frameworks and implementation of Security controls. Knowledge of DLP and CASB is a plus Knowledge of various operating system flavors including but not limited to Windows, MacOS, Linux. Certifications: Security certifications such as GSEC, CEH, CySA, are advantageous. Communication and Teamwork: Strong ability to articulate complex concepts clearly, be a collaborative team player, admit mistakes, support your statements with data and analysis, and continuously seek growth opportunities. If you are passionate about cybersecurity and ready to work with a top-tier SOC team, we invite you to join us at Hitachi Digital. About Us We’re a global, 1000-stong, diverse team of professional experts, promoting and delivering Social Innovation through our One Hitachi initiative (OT x IT x Product) and working on projects that have a real-world impact. We’re curious, passionate and empowered, blending our legacy of 110 years of innovation with our shaping our future. Here you’re not just another employee; you’re part of a tradition of excellence and a community working towards creating a digital future. Championing diversity, equity, and inclusion Diversity, equity, and inclusion (DEI) are integral to our culture and identity. Diverse thinking, a commitment to allyship, and a culture of empowerment help us achieve powerful results. We want you to be you, with all the ideas, lived experience, and fresh perspective that brings. We support your uniqueness and encourage people from all backgrounds to apply and realize their full potential as part of our team. How We Look After You We help take care of your today and tomorrow with industry-leading benefits, support, and services that look after your holistic health and wellbeing. We’re also champions of life balance and offer flexible arrangements that work for you (role and location dependent). We’re always looking for new ways of working that bring out our best, which leads to unexpected ideas. So here, you’ll experience a sense of belonging, and discover autonomy, freedom, and ownership as you work alongside talented people you enjoy sharing knowledge with. We’re proud to say we’re an equal opportunity employer and welcome all applicants for employment without attention to race, colour, religion, sex, sexual orientation, gender identity, national origin, veteran, age, disability status or any other protected characteristic. Should you need reasonable accommodations during the recruitment process, please let us know so that we can do our best to set you up for success. Show more Show less
Posted 3 months ago
3.0 - 4.0 years
0 Lacs
Delhi, India
On-site
Our Company We’re Hitachi Digital, a company at the forefront of digital transformation and the fastest growing division of Hitachi Group. We’re crucial to the company’s strategy and ambition to become a premier global player in the massive and fast-moving digital transformation market. Our group companies, including GlobalLogic, Hitachi Digital Services, Hitachi Vantara and more, offer comprehensive services that span the entire digital lifecycle, from initial idea to full-scale operation and the infrastructure to run it on. Hitachi Digital represents One Hitachi, integrating domain knowledge and digital capabilities, and harnessing the power of the entire portfolio of services, technologies, and partnerships, to accelerate synergy creation and make real-world impact for our customers and society as a whole. Imagine the sheer breadth of talent it takes to unleash a digital future. We don’t expect you to ‘fit’ every requirement – your life experience, character, perspective, and passion for achieving great things in the world are equally as important to us. Meet Our Team We are the Global SOC team, part of Global Information Security at Hitachi Digital. Our mission is to protect the company's and its customers' vital information systems and data while responding to attacks, intrusions, and other security incidents. As passionate advocates of information security, we are a team of out-of-the-box thinkers, innovators, and collaborative problem-solvers. We continuously seek new and better ways to enhance our practices and strive for nothing less than excellence in our cybersecurity operations. We are looking for highly motivated individuals with a positive attitude who want to be part of something exceptional. What You’ll Be Doing As an Email Security Engineer, you will be working as an individual contributor to work with a dynamic team of Threat hunters working 24x7. You should have 3-4 years of experience in cyber security. Your role will include: Act as a Primary contact for Mimecast implementation and operation support work. Strong problem-solving and troubleshooting skills include performing root cause analysis for preventative investigation. Working experience of understanding of email protocols like SMTP, SPF, DKIM and DMARC. Proficient in Header analysis. Administration of Mimecast, creation and modification of email policies, spam rules as per service tickets for specific security requirements Investigation, Triage, remediate and find RCA of Compromised accounts, e-mail threats, and abuse reports from various sources. Ensure Email Security gateway are configured with advanced cyber security features and rules. Investigate, document, and report on information security issues and emerging trends. Experience with GSUITE and O365. What You Bring To The Team At least 4 years of experience in working in a 24x7 Security Operation Center (SOC) environment. Strong knowledge of Email Security protocols, including safe listing, block listing, domain on/off boarding, URL/attachment’s defense and phishing analysis Provide design and configuration support for implementation of Mimecast email security gateway. Provide operational support for tickets related to Email Security. Knowledge of Cloud Infrastructure, and Cloud Security (GCP, AWS, Azure) Knowledge of MITRE ATT&Ck, Cyber Kill Chain, Threat Hunting & Attack Forensics. Knowledge of Security Fundamentals, Security Frameworks and implementation of Security controls. Knowledge of DLP and CASB is a plus Knowledge of various operating system flavors including but not limited to Windows, MacOS, Linux. Certifications: Security certifications such as GSEC, CEH, CySA, are advantageous. Communication and Teamwork: Strong ability to articulate complex concepts clearly, be a collaborative team player, admit mistakes, support your statements with data and analysis, and continuously seek growth opportunities. If you are passionate about cybersecurity and ready to work with a top-tier SOC team, we invite you to join us at Hitachi Digital. About Us We’re a global, 1000-stong, diverse team of professional experts, promoting and delivering Social Innovation through our One Hitachi initiative (OT x IT x Product) and working on projects that have a real-world impact. We’re curious, passionate and empowered, blending our legacy of 110 years of innovation with our shaping our future. Here you’re not just another employee; you’re part of a tradition of excellence and a community working towards creating a digital future. Championing diversity, equity, and inclusion Diversity, equity, and inclusion (DEI) are integral to our culture and identity. Diverse thinking, a commitment to allyship, and a culture of empowerment help us achieve powerful results. We want you to be you, with all the ideas, lived experience, and fresh perspective that brings. We support your uniqueness and encourage people from all backgrounds to apply and realize their full potential as part of our team. How We Look After You We help take care of your today and tomorrow with industry-leading benefits, support, and services that look after your holistic health and wellbeing. We’re also champions of life balance and offer flexible arrangements that work for you (role and location dependent). We’re always looking for new ways of working that bring out our best, which leads to unexpected ideas. So here, you’ll experience a sense of belonging, and discover autonomy, freedom, and ownership as you work alongside talented people you enjoy sharing knowledge with. We’re proud to say we’re an equal opportunity employer and welcome all applicants for employment without attention to race, colour, religion, sex, sexual orientation, gender identity, national origin, veteran, age, disability status or any other protected characteristic. Should you need reasonable accommodations during the recruitment process, please let us know so that we can do our best to set you up for success. Show more Show less
Posted 3 months ago
3 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Harness is a high-growth company that is disrupting the software delivery market. Our mission is to enable the 30 million software developers in the world to deliver code to their users reliably, efficiently, securely and quickly, increasing customers’ pace of innovation while improving the developer experience. We offer solutions for every step of the software delivery lifecycle to build, test, secure, deploy and manage reliability, feature flags and cloud costs. The Harness Software Delivery Platform includes modules for CI, CD, Cloud Cost Management, Feature Flags, Service Reliability Management, Security Testing Orchestration, Chaos Engineering, Software Engineering Insights and continues to expand at an incredibly fast pace. Harness is led by technologist and entrepreneur Jyoti Bansal, who founded AppDynamics and sold it to Cisco for $3.7B. We’re backed with $425M in venture financing from top-tier VC and strategic firms, including J.P. Morgan, Capital One Ventures, Citi Ventures, ServiceNow, Splunk Ventures, Norwest Venture Partners, Adage Capital Partners, Balyasny Asset Management, Gaingels, Harmonic Growth Partners, Menlo Ventures, IVP, Unusual Ventures, GV (formerly Google Ventures), Alkeon Capital, Battery Ventures, Sorenson Capital, Thomvest Ventures and Silicon Valley Bank. Position Summary Harness is seeking an IT Support Manager for their Bangalore, India location. In this role, you will lead a team of highly-collaborative and results-oriented individuals tasked with delivering global IT services across the company. This is an in office role. Success in this role hinges on strong technical skills, outstanding customer service capabilities, and the capability to effectively manage a team. Key Responsibilities Manage and scale an IT Support Team to support company needs as a distributed global company. Provide support, administration, maintenance and optimization of key functional areas across applications and services. Audit IT systems, devices, other workspace applications and ensure security of data, network access and IT systems. Manage the full lifecycle of supplying, setting up, implementing endpoint security, and delivery of laptops to our employees in India. Responsible for the Asset Management program for End User Services / End User Service Delivery. Customer service management. Translate ‘lessons learnt’ into continual service improvement. Produce proactive reports, trending analysis, service level reporting, and SLA compliance. Be an escalation point and hold regular 1:1's with direct reports. Provide internal users with technical support and troubleshooting for hardware, software, and network issues. Manage user accounts and access, including onboarding, offboarding, and access management, ensuring compliance with company policies and procedures. Assist with onboarding and offboarding processes, including new hire orientation and equipment procurement. Resolve IT tickets, documenting incidents, service requests, and troubleshooting steps in a timely manner; providing excellent customer service and escalating issues to senior team members or other departments as needed. Provide hardware and software support for desktops, laptops, conference room equipment, and other systems in the corporate IT environment. Create and maintain user-facing documentation, training materials, and knowledge base articles to reduce support tickets and improve user self-service capabilities. Collaborate with the IT team on bi-weekly sprints, managing and assigning tasks, monitoring tasks through completion. Provide clear and concise communication for regular updates and information on system issues, root cause and resolutions with management, peers and stakeholders. Lead and manage key IT projects and initiatives, owning project planning and providing technical expertise, implementation, and testing. Follow and improve established procedures and protocol, and maintain documentation related to asset tracking, systems environments, and processes. Collaborate with other departments to provide support and guidance on upcoming initiatives as needed. Maintain a security-first mentality and comply with company IT security policies and procedures. Stay updated with the latest IT trends and technologies, and proactively contribute to process improvements and optimization. Perform other IT-related duties as assigned by the Head of IT or other team members. Participate in on-call rotation for after-hours support, as required. Manage vendor relationships and purchasing. Qualifications Minimum of 7 years of experience in enterprise IT applications, with at least 3+ years in a leadership role managing support teams. Ability to motivate and lead a team in a fast-paced environment. Strong technical skills in hardware, software, and network troubleshooting. Experience with user account management, access control, and onboarding/offboarding processes. Proficient in using IT ticketing systems and project management tools. Excellent communication and interpersonal skills, with the ability to collaborate effectively through external resources and communicate with both technical and non-technical stakeholders. Strong documentation and organizational skills. Knowledge of IT security best practices and compliance requirements is a plus, but not required. Experience with office buildouts and managing vendors. Strong experience with Okta, Jamf, Meraki, Google Workspace, and Slack. Experience with Asset Panda, Manage Engine Endpoint Central, Carbon Black, Mimecast, FreshService, and LastPass is preferred but not required. Harness In The News Harness Grabs a $150m Line of Credit Welcome Split! SF Business Times - 2024 - 100 Fastest-Growing Private Companies in the Bay Area Forbes - 2024 America's Best Startup Employers SF Business Times - 2024 Fastest Growing Private Companies Awards Fast Co - 2024 100 Best Workplaces for Innovators All qualified applicants will receive consideration for employment without regard to race, color, religion, sex or national origin. Note on Fraudulent Recruiting/Offers We have become aware that there may be fraudulent recruiting attempts being made by people posing as representatives of Harness. These scams may involve fake job postings, unsolicited emails, or messages claiming to be from our recruiters or hiring managers. Please note, we do not ask for sensitive or financial information via chat, text, or social media, and any email communications will come from the domain @harness.io. Additionally, Harness will never ask for any payment, fee to be paid, or purchases to be made by a job applicant. All applicants are encouraged to apply directly to our open jobs via our website. Interviews are generally conducted via Zoom video conference unless the candidate requests other accommodations. If you believe that you have been the target of an interview/offer scam by someone posing as a representative of Harness, please do not provide any personal or financial information and contact us immediately at security@harness.io. You can also find additional information about this type of scam and report any fraudulent employment offers via the Federal Trade Commission’s website (https://consumer.ftc.gov/articles/job-scams), or you can contact your local law enforcement agency. Show more Show less
Posted 3 months ago
3 - 5 years
0 Lacs
Hyderabad, Telangana, India
On-site
Our technology services client is seeking multiple Anti Spam Support Engineer to join their team on a contract basis. These positions offer a strong potential for conversion to full-time employment upon completion of the initial contract period. Below are further details about the role: Role: Anti Spam Support Engineer Mandatory Skills : Phishing, Threat Attack, Cyber Security Experience: 3 to 5 Years Location : Hyderabad Notice Period : Immediate to 15 Days Job Description: Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response: Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation: Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis: Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography: Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security: Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting: Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance: Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs): Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools: Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms: Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions: Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools: Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools If you are interested, share the updated resume to bhavana.m@s3staff.com Show more Show less
Posted 3 months ago
4 - 8 years
7 - 9 Lacs
Bengaluru
Work from Office
Job Summary We are seeking a skilled IT professional with hands-on experience in managing Google Workspace, securing email infrastructure, and handling endpoint/user device management. The ideal candidate will be responsible for ensuring smooth collaboration through Google Workspace, protecting email systems from threats, and maintaining secure and compliant end-user computing environments. Skill Set 4 - 8 years of experience in IT systems administration or similar role. Proven experience managing Google Workspace for a mid-to-large user base. Solid understanding of email security protocols (SPF, DKIM, DMARC). Experience with email security platforms and endpoint management tools. Strong troubleshooting skills and familiarity with ITIL-based service management. Excellent communication and documentation skills . Roles and Responsibilities Google Workspace Administration Manage user accounts, groups, and organizational units. Implement and maintain Google Workspace security and compliance settings (DLP, Vault, SSO, etc.). Automate routine administration tasks using GAM or Google Admin SDK. Email Security & Compliance Deploy and manage email security tools (e.g., Mimecast, Proofpoint, Google Advanced Protection). Monitor and respond to email-based threats such as phishing, spoofing, and malware. Define and enforce SPF, DKIM, DMARC policies. Collaborate with the InfoSec team for email compliance and retention policies. Endpoint/User Device Management Manage and monitor endpoints across operating systems (Windows, macOS, ChromeOS). Deploy and manage MDM/EMM solutions (e.g., Google Endpoint Management, Intune, Jamf). Enforce device compliance policies, encryption, and remote wipe capabilities. Provide Tier 2/3 support for device-related issues. Operational & Security Hygiene Maintain IT asset inventory and ensure timely patching and updates. Document system configurations, procedures, and support materials. Participate in incident response and root cause analysis for device and email-related incidents.
Posted 4 months ago
3 - 5 years
0 Lacs
Hyderabad, Telangana, India
On-site
Our technology services client is seeking multiple Anti Spam Support Engineer to join their team on a contract basis. These positions offer a strong potential for conversion to full-time employment upon completion of the initial contract period. Below are further details about the role: Role: Anti Spam Support EngineerMandatory Skills : Phishing, Threat Attack, Cyber SecurityExperience: 3 to 5 YearsLocation : HyderabadNotice Period : Immediate to 15 Days Job Description:Key ResponsibilitiesConduct email analysis and reverse engineer to identify and mitigate threats.Perform static and dynamic analysisAnalyze network traffic and develop heuristic signatures to detect malicious activities.Investigate security incidents, including data breaches, system intrusions, and policyviolations.Collaborate with cross-functional teams to improve detection capabilities andresponse.Develop and implement incident response plans and coordinate incidentinvestigations.Classify, Maintain and update real-time block lists and URL block lists.Write and review regular expressions for phish, spam and fraud detection.Perform URL and email grading to assess and categorize potential threats.Engage in security response activities to address and resolve security incidents.Conduct threat hunting to proactively identify and address potential detection gaps. Basic QualificationsBachelor's or Master's degree in Computer Science, Computer Engineering,Information Security, or a related field.Strong understanding of computer security, network architecture, and threatlandscape.Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS).Strong knowledge of networking concepts and OSI layers.Understanding of enterprise IT architecture, operating systems, and file systems.Excellent analytical skills and ability to identify patterns and trends.Strong research skills and ability to analyze and present complex data.Good logical reasoning and deep analytical skills.Good communication skills and attention to detail.Ability to perform well under stress, particularly in critical response situations.Basic qualities of a researcher, including curiosity, persistence, and attention todetail. Technical Skills Threat Analysis and Incident Response: Ability to analyze email threats, identifyindicators of compromise (IOCs), and respond to incidents promptly.Phishing Detection and Mitigation: Expertise in identifying and mitigating phishingattacks, including spear-phishing and whaling.Malware Analysis: Skills in analyzing email-borne malware, understanding itsbehavior, and developing countermeasures.Cryptography: Knowledge of encryption techniques to secure emailcommunications and protect sensitive data.Network Security: Understanding of network protocols and security measures todetect and prevent email-based attacks.Programming and Scripting: Proficiency in languages like Kusto, Python,PowerShell, or Bash for automating security tasks and analyzing email logs.Regulatory Compliance: Familiarity with regulations such as GDPR, HIPAA, andothers that impact email security practices. ToolsSecure Email Gateways (SEGs): Tools like Microsoft Defender for Office,Proofpoint, Mimecast, or Barracuda to filter and block malicious emails.Email Encryption Tools: Solutions like PGP (Pretty Good Privacy) or S/MIME(Secure/Multipurpose Internet Mail Extensions) for encrypting email content.Threat Intelligence Platforms: Tools other than VirusTotal, MX Tool box likeThreatConnect or Recorded Future to gather and analyze threat intelligence data.Sandboxing Solutions: Tools like Windows Sandbox, FireEye or Palo AltoNetworks WildFire to safely analyze suspicious email attachments.Anti-Phishing Tools: Solutions like PhishMe or Cofense to detect and respond tophishing attempts.Security Information and Event Management or Incident Response Tools If you are interested, share the updated resume to sohail.s@s3staff.com
Posted 4 months ago
3 - 5 years
0 Lacs
Hyderabad, Telangana, India
On-site
Our technology services client is seeking multiple Anti Spam Support Engineer to join their team on a contract basis. These positions offer a strong potential for conversion to full-time employment upon completion of the initial contract period. Below are further details about the role: Role: Anti Spam Support EngineerMandatory Skills : Phishing, Threat Attack, Cyber SecurityExperience: 3 to 5 YearsLocation : HyderabadNotice Period : Immediate to 15 Days Job Description:Key ResponsibilitiesConduct email analysis and reverse engineer to identify and mitigate threats.Perform static and dynamic analysisAnalyze network traffic and develop heuristic signatures to detect malicious activities.Investigate security incidents, including data breaches, system intrusions, and policyviolations.Collaborate with cross-functional teams to improve detection capabilities andresponse.Develop and implement incident response plans and coordinate incidentinvestigations.Classify, Maintain and update real-time block lists and URL block lists.Write and review regular expressions for phish, spam and fraud detection.Perform URL and email grading to assess and categorize potential threats.Engage in security response activities to address and resolve security incidents.Conduct threat hunting to proactively identify and address potential detection gaps. Basic QualificationsBachelor's or Master's degree in Computer Science, Computer Engineering,Information Security, or a related field.Strong understanding of computer security, network architecture, and threatlandscape.Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS).Strong knowledge of networking concepts and OSI layers.Understanding of enterprise IT architecture, operating systems, and file systems.Excellent analytical skills and ability to identify patterns and trends.Strong research skills and ability to analyze and present complex data.Good logical reasoning and deep analytical skills.Good communication skills and attention to detail.Ability to perform well under stress, particularly in critical response situations.Basic qualities of a researcher, including curiosity, persistence, and attention todetail. Technical Skills Threat Analysis and Incident Response: Ability to analyze email threats, identifyindicators of compromise (IOCs), and respond to incidents promptly.Phishing Detection and Mitigation: Expertise in identifying and mitigating phishingattacks, including spear-phishing and whaling.Malware Analysis: Skills in analyzing email-borne malware, understanding itsbehavior, and developing countermeasures.Cryptography: Knowledge of encryption techniques to secure emailcommunications and protect sensitive data.Network Security: Understanding of network protocols and security measures todetect and prevent email-based attacks.Programming and Scripting: Proficiency in languages like Kusto, Python,PowerShell, or Bash for automating security tasks and analyzing email logs.Regulatory Compliance: Familiarity with regulations such as GDPR, HIPAA, andothers that impact email security practices. ToolsSecure Email Gateways (SEGs): Tools like Microsoft Defender for Office,Proofpoint, Mimecast, or Barracuda to filter and block malicious emails.Email Encryption Tools: Solutions like PGP (Pretty Good Privacy) or S/MIME(Secure/Multipurpose Internet Mail Extensions) for encrypting email content.Threat Intelligence Platforms: Tools other than VirusTotal, MX Tool box likeThreatConnect or Recorded Future to gather and analyze threat intelligence data.Sandboxing Solutions: Tools like Windows Sandbox, FireEye or Palo AltoNetworks WildFire to safely analyze suspicious email attachments.Anti-Phishing Tools: Solutions like PhishMe or Cofense to detect and respond tophishing attempts.Security Information and Event Management or Incident Response Tools If you are interested, share the updated resume to renu.a@s3staff.com
Posted 4 months ago
2 - 5 years
0 Lacs
Mumbai Metropolitan Region
On-site
System Administrator Brennan. Where true performance thrives. At Brennan, we believe that how technology is delivered is every bit as important as what the technology is. We focus on creating real and relevant value for customers with solutions that fit their specific needs and always reflect their true interests. It’s a claim backed by our True Performance System - a way of working engineered to get us closer, and deliver better, for our customers and their actual experience of technology. Why join Brennan True performance for our customers starts with a true belief in our people. It’s why we’ve structured our business to help our teams, and their talents, shine bright. It's why we’ve created a workplace where people of all backgrounds, beliefs and experiences are welcomed and empowered. And it’s why we’ve built an organisation where real innovation makes a genuine impact and generates true rewards for our team members. True rewards In addition to competitive remuneration, Brennan offers extensive benefits, including: Training and certification bonuses Culture Awards that recognise excellence Brennan Daredevils - our annual, all-expenses paid trip awarded to our top performers and outstanding contributors Vibrant, fun social activities Discounted hardware and software An environment that embraces learning and development The Role To provide 1st, 2nd or 3rd level technical support to Brennan IT clients, engineers and staff, 1st level monitoring and technical support to Brennan IT clients and staff. To coordinate, collaborate and escalate incidents within stipulated timelines, maintain existing cloud/infrastructure services and ensure that environment runs in an optimal way. and Continuously Improve the Efficiency and Excellence of Service Delivery as Measured by Client facing Surveys and Ratings in every department you are part of. 2-5 yrs minimum experience in Windows Server Administration / System Administration / Wintel Administration / Hyper V Administration / IT Technical Support role/ for international clients, preferably in Managed Services IT provider / IT Companies. Role Responsibilities Maintaining/contributing to KMS for client and internal team, for both technical & processesServer monitoring using SCOM, N-ABLE, Logic Monitor, Basic Intune / SCCM configurationsUnderstanding of O365, Mimecast, Intune, Azure integrationVendor Management (hardware and Software vendors - HP, Dell, MS, VM, Citrix and others)Storage understanding NAS, SAN e.g., data domain, IBM, Netapp, Hitachi, Fujitsu, HP 3parAdministration of Windows Server, groups, group policies, DNS, DHCPUnderstanding of backups, replications for Veeam, Symantec, Zetro, CommvaultOn premises backup alert management, monitoring and restorationSSL certificate renewal and installation on various roles (IIS, ADFS, ADC-Netscaler, Apache, SQL Reporting Services, WAS, Load Balancers)Smooth and timely customer engagementDisk, CPU, Snapshot management provisioningMonitor, manage experience with ESXI/Hyper-V hosts, Nutanix, Dell, HP SimpliVityManage understand Failover Cluster, NLBCitrix/RDS/WVD knowledge with application publishing, upgrading, managing securelyManage windows update compliance.Antivirus Management, Sophos, Defender.Patching ESXi hosts and vCenter updatesKnowledge of vulnerability management and critical remediationChange management, performing RCA and able to clearly articulate the actions/outcomes Key Competencies and Qualifications required Knowledge of as many more technologies like VMware, Windows Hypervisors, Azure Administrations, O365, Mimecast, SQL Administration, Windows Administration.Should have experience in VM Deployment, VM Migration, managing host clustersExtremely high-level attention to detail with methodical troubleshooting processGood verbal and written communication skillsMust have knowledge of Storage technologies like HP, IBM, Dell, Cisco servers, O365, Azure Administration)Proactive vs Reactive approachITIL Service Management Foundation accreditation Essential Skills Windows Server including 2016/2019, DNS, DHCP, Group PolicyActive Directory 2012 and aboveVMware / Virtualization (Hyper - V, VMware)O365, Azure Administration Desired Skills Exposure to Backup tools like Veeam/Commvault/Backup execWindows Administration certifications 2012 and aboveExposure to SAN /NASMS Azure and Office 365 AdministrationSymantec Endpoint or McAfee or Sophos or Sentinel One or CrowdStrikeExposure to Blade servers and configurationsITIL Foundation and ServiceNow ITSM tool Brennan is an equal opportunity employer
Posted 4 months ago
4 - 9 years
5 - 15 Lacs
Hyderabad, Pune
Work from Office
Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response : Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation : Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis : Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography : Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security : Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting : Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance : Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs) : Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools : Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms : Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions : Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools : Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools
Posted 4 months ago
4 - 9 years
0 Lacs
Hyderabad, Telangana, India
On-site
Experience: 4 to 9 YearsNotice Period: 30 days maxWork Mode: WFOShift: Rotational Shift Key ResponsibilitiesConduct email analysis and reverse engineer to identify and mitigate threats.Perform static and dynamic analysisAnalyze network traffic and develop heuristic signatures to detect malicious activities.Investigate security incidents, including data breaches, system intrusions, and policy violations.Collaborate with cross-functional teams to improve detection capabilities and response.Develop and implement incident response plans and coordinate incident investigations.Classify, Maintain and update real-time block lists and URL block lists.Write and review regular expressions for phish, spam and fraud detection.Perform URL and email grading to assess and categorize potential threats.Engage in security response activities to address and resolve security incidents.Conduct threat hunting to proactively identify and address potential detection gaps. Basic QualificationsBachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field.Strong understanding of computer security, network architecture, and threat landscape.Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS).Strong knowledge of networking concepts and OSI layers.Understanding of enterprise IT architecture, operating systems, and file systems.Excellent analytical skills and ability to identify patterns and trends.Strong research skills and ability to analyze and present complex data.Good logical reasoning and deep analytical skills.Good communication skills and attention to detail.Ability to perform well under stress, particularly in critical response situations.Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response: Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly.Phishing Detection and Mitigation: Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling.Malware Analysis: Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures.Cryptography: Knowledge of encryption techniques to secure email communications and protect sensitive data.Network Security: Understanding of network protocols and security measures to detect and prevent email-based attacks.Programming and Scripting: Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs.Regulatory Compliance: Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. ToolsSecure Email Gateways (SEGs): Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails.Email Encryption Tools: Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content.Threat Intelligence Platforms: Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data.Sandboxing Solutions: Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments.Anti-Phishing Tools: Solutions like PhishMe or Cofense to detect and respond to phishing attempts.Security Information and Event Management or Incident Response Tools
Posted 4 months ago
20.0 - 25.0 years
10 - 15 Lacs
gurugram, bengaluru
Work from Office
What were looking for To support our continued success and deliver a Fanatical Experience to our customers, Rackspace Cyber Defence is looking for an Indian based Security Operations Analyst(L2) to support Rackspaces strategic customers. This role is particularly well-suited to a self-starting, experienced and motivated Sec Ops Analyst, who has a proven record of accomplishment in the cloud security monitoring and incident detection domain. As a Security Operations Analyst(L2), you will be responsible for detecting, analysing, and responding to threats posed across customer on-premises, private cloud, public cloud, and multi-cloud environments. The primary focus will be on triaging alerts and events (incident detection), which may indicate malicious activity, and determining if threats are real or not. You will also be required to liaise closely with the customers key stakeholders, which may include incident response and disaster recovery teams as well as information security. Key Accountabilities Should have experience of 4-7years in SOC. Ensure the Customers operational and production environment remains secure at all the times and any threats are raised and addressed in a timely manner. Critical incident analysis & validation Platform management tasks like checking the health status and basic troubleshooting. Create new runbooks, playbooks and knowledgebase documents. Trend monitoring & analysis Threat and vulnerability impact analysis Reactive discovery of adversaries based on threat advisory or intelligence reports. Compliance reporting Onboarding of log sources Rule and dashboard enhancements Basic threat hunting Created and manage the watchlists. Handling escalations from L1 Analysts Review the L1 handled Incident and prepare individual scorecards. Prepare and review the weekly and monthly reports. Co-ordinate with vendor for issue resolution Use of threat intelligence platforms such as OSINT, to understand latest threats. Researching and analysing the latest threats to better understand an adversarys tactics, techniques, and procedures (TTPs). Automation of security processes and procedures to enhance and streamline monitoring capabilities. Ensure all Zero Day vulnerabilities are resolved within agreed SLA (Service Level Agreement) periods by respective teams which was reported by L2 Analyst team. Maintain close working relationships with relevant teams and individual key stakeholders, such as incident response and disaster recovery teams as well as information security etc. Required to work in 24/7 Rotational shift. Skills & Experience Existing experience as a Security Operations Analyst, or equivalent. Experience of working in large scale, public cloud environments and with using cloud native security monitoring tools such as: - Microsoft Sentinel Microsoft 365 Defender Microsoft Defender for Cloud Endpoint Detection & Response (EDR) tools such as Crowdstrike, Microsoft Defender for Endpoint. Firewalls and network security tools such as Palo Alto, Fortinet, Juniper, and Cisco. Web Application Firewall (WAF) tools such as Cloudflare, Akamai and Azure WAF. Email Security tools such as Proofpoint, Mimecast and Microsoft Defender for Office Data Loss Prevention (DLP) tools such as Microsoft Purview, McAfee and Symantec Nice to have skills/experience includes: Google Cloud Platform (GCP) security tools such as Chronicle and Security Command Centre Amazon Web Services (AWS) security tools such as Security Hub, AWS Guard Duty, AWS Macie, AWS Config and AWS CloudTrail Experience of analysing malware and email headers, and has skills in network security, intrusion detection and prevention systems; operating systems; risk identification and analysis; threat identification and analysis and log analysis. Experience of security controls, such as network access controls; identity, authentication, and access management controls (IAAM); and intrusion detection and prevention controls. Knowledge of security standards (good practice) such as NIST, ISO27001, CIS (Center for Internet Security), OWASP and Cloud Controls Matrix (CCM) etc. Knowledge of scripting and coding with languages such as Terraform, python, javascript, golang, bash and/or powershell. Knowledge of DevOps practices such as CI/CD, Azure DevOps, CircleCI, GitHub Actions, Ansible and/or Jenkins. Computer science, engineering, or information technology related degree (although not a strict requirement) Holds one, or more, of the following certificates (or equivalent): - Certified Information Security Systems Professional (CISSP) Microsoft Certified: Azure Security Engineer Associate (AZ500) Microsoft Certified: Security Operations Analyst Associate (SC-200) CREST Practitioner Intrusion Analyst (CPIA) CREST Registered Intrusion Analyst (CRIA) CREST Certified Network Intrusion Analyst (CCNIA) Systems Security Certified Practitioner (SSCP) Certified Cloud Security Professional (CCSP) GIAC Certified Incident Handler (GCIH)GIAC Security Operations Certified (GSOC) A highly self-motivated and proactive individual who wants to learn and grow and has an attention to detail. A great analyser, trouble-shooter and problem solver who understands security operations, programming languages and security architecture. Highly organised and detail oriented. Ability to prioritise, multitask and work under pressure. An individual who shows a willingness to go beyond in delighting the customer. A good communicator who can explain security concepts to both technical and non-technical audiences.
Posted Date not available
6.0 - 10.0 years
10 - 20 Lacs
pune, chennai, greater noida
Work from Office
Job Title: Senior Security Engineer Email Security Location: G.Noida, Pune ,Chennai Work Hours: 6 AM – 6 PM CST coverage Employment Type: Full-time About the Role We are seeking a highly skilled and experienced Senior Security Engineer with deep expertise in email security to join our global Security Operations Center (SOC). This role is critical in defending our enterprise clients against advanced email-based threats, including phishing, spoofing, business email compromise (BEC), and malware delivery. You will work closely with SOC L2/L3 analysts, incident response teams, and client stakeholders to ensure robust email threat detection, prevention, and remediation strategies are in place. Key Responsibilities Lead and manage email security operations within the SOC, focusing on threat detection, analysis, and mitigation Develop and maintain email security policies, configurations, and playbooks Investigate and respond to email-based incidents, including phishing campaigns, spoofing attempts, and malware-laden messages Collaborate with global SOC teams and clients to ensure timely and effective incident resolution Conduct threat hunting and forensic analysis related to email vectors Provide mentorship and technical guidance to SOC L2/L3 analysts Continuously evaluate and optimize email security tools and technologies (e.g., Proofpoint, Mimecast, Microsoft Defender for Office 365) Generate reports and metrics for email threat trends, incident response effectiveness, and client SLAs Required Qualifications 5+ years of experience in cybersecurity, with a strong focus on email security Prior experience working with global managed SOC providers such as Wipro, TCS, Infosys, HCL, or specialized MSSPs Proven track record in handling US-based client environments , especially during CST business hours Expertise in email security platforms (e.g., Proofpoint, Mimecast, Microsoft Defender, Cisco ESA) Strong understanding of email protocols (SMTP, SPF, DKIM, DMARC) and threat vectors Familiarity with SIEM tools (Splunk, QRadar, etc.) and incident response workflows Excellent communication skills and ability to work independently in a remote setup Preferred Skills Certifications such as CEH, CISSP, CISM, or vendor-specific email security certifications Experience in threat intelligence and malware analysis Exposure to automation and scripting (Python, PowerShell) for email threat detection and response
Posted Date not available
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |