Jobs
Interviews

5059 Network Security Jobs - Page 24

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 12.0 years

0 Lacs

noida, uttar pradesh

On-site

As a Senior Manager - IT Infrastructure & Cloud Engineering Subject Matter Expert at Genpact, you will play a crucial role in designing and implementing large-scale IT infrastructure solutions for contact centers. Your responsibilities will include participating in business transition projects, engaging in client discussions to understand IT requirements, translating them into technical designs, creating documentation, and ensuring successful project delivery. You will be expected to take ownership of end-to-end project delivery, create High-Level Design (HLD) and Low-Level Design (LLD) documents, and engage in technical discussions with both clients and internal teams. Collaboration with internal and external resources, troubleshooting issues, identifying risks in the production network, and initiating Lean/Six Sigma projects for process efficiency will be key aspects of your role. Key requirements for this position include: - Hands-on experience in IT infrastructure design and implementation, particularly in network setup for contact centers - Expertise in designing and implementing network solutions for voice and contact center environments - In-depth knowledge of corporate LAN, WAN infrastructure, and the latest technologies such as Cloud, ACI, SDN, and SDWAN - Experience with network security, firewalls implementation, and management (preferably Palo Alto, Juniper, Fortinet) - Proficiency in wireless network design and implementation, including wifi access point functionality - Understanding of voice technology, cloud contact center solutions, and network security best practices - Familiarity with cloud architectures (AWS, Azure, GCP) and multi-cloud network design and implementation - Ability to work in a DevOps environment and ensure security and compliance in network and cloud designs - Strong communication skills for interacting with global teams, clients, and stakeholders Qualifications: - Bachelor's degree in Computer Science, Information Technology, or related field (Advanced degree is a plus) - CCNP certification (highly preferred) - Network certifications (Palo Alto, Juniper, Fortinet) highly preferred - AWS, Azure cloud certifications (highly preferred) - Experience with CI/CD tools (Jenkins, GitLab CI, Azure DevOps) - Excellent written and oral communication skills - Good presentation skills If you are a highly skilled and experienced IT infrastructure design and implementation expert looking to make a meaningful impact in a dynamic and innovative environment, we invite you to join our team at Genpact.,

Posted 1 week ago

Apply

8.0 - 12.0 years

0 Lacs

noida, uttar pradesh

On-site

As a Senior Manager - IT Infrastructure & Cloud Engineering Subject Matter Expert at Genpact, you will play a crucial role in designing and implementing large-scale IT infrastructure solutions for contact centers. Your responsibilities will include participating in business transition projects, engaging in client discussions to understand IT requirements, translating them into technical designs, creating documentation, and ensuring successful project delivery. You will be expected to take ownership of end-to-end project delivery, create High-Level Design (HLD) and Low-Level Design (LLD) documents, and engage in technical discussions with both clients and internal teams. Collaboration with internal and external resources, troubleshooting issues, identifying risks in the production network, and initiating Lean/Six Sigma projects for process efficiency will be key aspects of your role. Key requirements for this position include: - Hands-on experience in IT infrastructure design and implementation, particularly in network setup for contact centers - Expertise in designing and implementing network solutions for voice and contact center environments - In-depth knowledge of corporate LAN, WAN infrastructure, and the latest technologies such as Cloud, ACI, SDN, and SDWAN - Experience with network security, firewalls implementation, and management (preferably Palo Alto, Juniper, Fortinet) - Proficiency in wireless network design and implementation, including wifi access point functionality - Understanding of voice technology, cloud contact center solutions, and network security best practices - Familiarity with cloud architectures (AWS, Azure, GCP) and multi-cloud network design and implementation - Ability to work in a DevOps environment and ensure security and compliance in network and cloud designs - Strong communication skills for interacting with global teams, clients, and stakeholders Qualifications: - Bachelor's degree in Computer Science, Information Technology, or related field (Advanced degree is a plus) - CCNP certification (highly preferred) - Network certifications (Palo Alto, Juniper, Fortinet) highly preferred - AWS, Azure cloud certifications (highly preferred) - Experience with CI/CD tools (Jenkins, GitLab CI, Azure DevOps) - Excellent written and oral communication skills - Good presentation skills If you are a highly skilled and experienced IT infrastructure design and implementation expert looking to make a meaningful impact in a dynamic and innovative environment, we invite you to join our team at Genpact.,

Posted 1 week ago

Apply

5.0 - 10.0 years

15 - 25 Lacs

hyderabad

Hybrid

About the Role: Drive security excellence across our technology stack whilst enabling business innovation. This role demands a generalist mindset with deep expertise, combining hands-on technical capability with strategic thinking to protect and enable Quantium's data-driven business. Key Responsibilities: Security Platform Ownership : end-to-end responsibility for critical security platforms Detection and Response : real-time monitoring of security systems and applications, investigating anomalies, and escalating critical events to senior security and IT staff Risk-based decision making: independently assess, prioritise and remediate security risks aligned to business impact Cross-domain security : impact across multiple domains such as cloud security, application security, infrastructure security initiatives, detection and response etc. Collaborate: Partner with internal stakeholders to improve security outcomes, as well as with internal development teams to build pragmatic security solutions Drive automation of repetitive security tasks Show strong ownership of security issues and work to resolve and escalate where needed Contribute to security strategy and roadmap development\ Experience, Education & Skills: Demonstrated experience across at least 3 security domains (network, cloud, application, identity, AI, offensive, defensive, response, forensics etc.) Five years of experience in cybersecurity Track record of owning security outcomes end-to-end Experience translating technical risks into business language Provide ability to influence without authority Technical breadth Ownership mindset The Following Skills and Experience Would Be an Advantage: Experience with AI Security practices and securing AI/ML systems Experience with Shift Left Security practices, including secure coding, DevSecOps, and security integration in CI/CD pipelines Experience with Cloud (Azure, GCP, AWS) Security configuration, and monitoring Experience with CSPM and CNAPP tools and methodologies Using tools like Terraform, Azure ARM templates, or GCP Deployment Manager What Does Success Look Like? Drive measurable security risk reduction Proactive identification of issues and continuous improvement of security capabilities Help build a strong security culture Ensure operational excellence Key People and Leadership Capabilities: 1. Self-aware - you leverage diversity across people, tasks, and projects, taking responsibility for self and others. 2. Agile and innovative - you possess strong lateral thinking skills. 3. Achieve and perform - you have exceptional execution skills and are achievement focused. 4. Purposeful and aligned - you can set clear, tangible objectives which deliver against your performance objectives. 5. Achievement oriented - you effectively facilitate challenging performance related conversations in a timely and appropriate manner.

Posted 1 week ago

Apply

10.0 - 12.0 years

20 - 25 Lacs

kolkata, mumbai, new delhi

Work from Office

We are seeking to hire a Sr, Network Engineer to develop and maintain functional and secure networks. The ideal candidate will have excellent problem-solving skills, a thorough knowledge of network administration and architecture, an passion for security and data protection. Responsibilities: Design and deploy functional networks (LAN, WLAN, WAN) Configure and install software, servers, routers and other network devices Manage firewalls, Palo Alto Monitor network performance and integrity Resolve issues tiers of support have escalated by troubleshooting cloud and local infrastructure Automate tasks and monitor their effectiveness Mentor team members on technical issues Create, oversee and test security measures (e.g. access authentication and disaster recovery) Communicate with users when needed Maintain complete technical documentation Suggest improvements to network performance, capacity and scalability Qualifications: Bachelors degree or equivalent experience in business, computer science, or management information systems 10-12 or more years of industry-related experience as a Network Engineer or Network Administrator Professional certification preferred (e.g. CCNP, CCDP) Solid background in network administration and architecture In-depth understanding of communication protocols (mainly TCP/IP) and routing protocols (e.g. BGP, OSPF) Familiarity with access control models and network security Knowledge of coding languages for scripting (e.g Python, Perl) Experience with network diagnostic, monitoring and analysis tools (e.g. SolarWinds network tools) Solid understanding of network operating systems (JUNOS, Cisco IOS) Demonstrated verbal and written communication skills

Posted 1 week ago

Apply

1.0 - 6.0 years

1 - 4 Lacs

greater noida

Work from Office

Proven work experience as a Desktop Support Engineer, Technical Support Engineer or similar role Hands-on experience with Windows/Linux/Mac OS environments Working knowledge of office automation products and computer peripherals, like printers and scanners Knowledge of network security practices and anti-virus programs Ability to perform remote troubleshooting and provide clear instructions Excellent problem-solving and multitasking skills Customer-oriented attitude Diploma, B.tech, BSc in Computer Science or relevant field

Posted 1 week ago

Apply

9.0 - 14.0 years

0 - 0 Lacs

mumbai city

On-site

Role: Network Security Engineer Location: Turbhe, Navi Mumbai Qualifications & Certifications: Graduation from a recognized university CCNA (200-120), Fortinet NSE5, Palo Alto PCNSE Jetking Certified Networking Professional Microsoft Azure AZ-900, AZ-700 Key Skills: Strong experience with Palo Alto & Fortinet Firewalls, Array Load Balancers, AMP servers Hands-on with LAN/WAN, VPNs, security policies, and firewall configurations Knowledge of network design (HLD/LLD) and documentation Incident management, RCA/RFO reporting, and ticket handling (Autotask/Datto RMM) Effective communication, coordination, and troubleshooting skills Responsibilities: Implement, configure & support Palo Alto, Fortinet firewalls, FortiSwitches, Wireless controllers, and Array Load Balancers. Manage network security devices (Palo Alto PA-5060/3020/820, FortiGate 80/60/300/1000C, Juniper SRX 240, Cisco Meraki MX 64/65). Configure firewall rules, VPN tunnels, object addresses, and security profiles as per requirements. Monitor and analyze incidents, AV/IPS updates, and logs using tools like FortiAnalyzer. Prepare and submit HLD/LLD documents; coordinate with customers and internal teams for approvals and implementations. Handle customer tickets related to LAN, WAN, and security issues; provide RCA, RFO, and periodic reports. Collaborate with vendors, service managers, and account managers for escalations and resolutions. Maintain and update network inventory and customer documentation.

Posted 1 week ago

Apply

1.0 - 3.0 years

3 - 5 Lacs

basti

Work from Office

[{"Salary":"20k-30k" , "Posting_Title":"Trainer- Cyber Security" , "Is_Locked":false , "City":"Basti" , "Industry":"Education" , "Job_Description":" -Educate cyber training to GiG Workers, Farmers,s and Self-employed -Preparing Study materials for training students via a variety of training methods for improving training deliveries. -Handling student queries effectively and efficiently. -Maintain training related to MIS (attendance, feedback forms, evaluation scores, and certificates issued). -Conduct training sessions on cybersecurity fundamentals, ethical hacking, network security, malware analysis, and related topics. -Stay updated with the latest cybersecurity trends, threats, and best practices. -Conduct and coordinate with the location leader for workshops and awareness sessions on cybersecurity within the District Requirements Bachelor/Masterdegree in Cyber Security, Information Technology, Computer Science, or a related field. -Strong understanding of cybersecurity principles, network security, ethical hacking, firewalls, and intrusion detection systems. -Hands-on experience with security tools, penetration testing, and vulnerability assessments. -Good communication, presentation, and training skills. -Prior experience in training, mentoring, or teaching is an added advantage. Open to travell, having own two wheeler. " , "Work_Experience":"1-3years" , "Job_Type":"Full time" , "Job_Opening_Name":"Trainer- Cyber Security","State":"Uttar Pradesh" , "Country":"India" , "Zip_Code":"272001" , "Formula_1":21 , "id":"54869000006879904" , "Publish":true , "Date_Opened":"2025-08-05" , "Keep_on_Career_Site":false}]

Posted 1 week ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

chennai

Work from Office

Associate, Information Security At BNY, our culture allows us to run our company better and enables employees growth and success. As a leading global financial services company at the heart of the global financial system, we influence nearly 20% of the world s investible assets. Every day, our teams harness cutting-edge AI and breakthrough technologies to collaborate with clients, driving transformative solutions that redefine industries and uplift communities worldwide. Recognized as a top destination for innovators and champions of inclusion, BNY is where bold ideas meet advanced technology and exceptional talent. Together, we power the future of finance and this is what #LifeAtBNY is all about. Join us and be part of something extraordinary. We re seeking a future team member for the role of Vulnerability Management Operations Associate to join our DEFEND Platform (Information Security Division) team. This role is located in Chennai In this role, you ll make an impact in the following ways: Serve as vulnerability management analyst for information systems as primary responsibility Perform information system security vulnerability scanning to discover and analyze vulnerabilities and characterize risks to networks, operating systems, applications, databases, and other information system components. Conduct risk-based assessment on security vulnerabilities and determine impact to various IT infrastructures. Prioritize risks and drive remediation by outlining and providing advice and solutions to technology owners on effective security controls and counter measures. Prioritize remediation activities based upon the results of the Enterprise-wide scanning program, Intel Threat advisories, or internal/external audits. Engage with stakeholders, to include IT professionals, management, and auditors, to facilitate vulnerability discovery and remediation. Communicate security and compliance issues in an effective and appropriate manner Recommend appropriate remedial actions to mitigate risks and ensure information systems employ appropriate level of information security controls Validate remedial actions and ensure compliance with information security policy and regulatory requirements. Stay abreast on new security vulnerabilities and latest advancements in configuration compliance assessments from internal or external threat intelligence sources. Contribute to the review of internal processes and activities and assist in identifying potential opportunities for improvement and automation. Conducts adhoc vulnerability scans if needed and coordinates remediation with appropriate support teams. Collaborate with our IT Stakeholders and LOB application owners. 3- 5 years of experience is required To be successful in this role, we re seeking the following: Bachelors degree in information technology (or related field) with minimum of 5 years experience Possess strong knowledge of various technologies and security topics including operating systems, network security, protocols, application security, infrastructure hardening and security baselines. Knowledge of industry standards relating to Vulnerability Management including Common Vulnerabilities and Exposures (CVE), Common Vulnerability Scoring System (CVSS) and Open Web Application Security Project (OWASP) strongly desired. Practical experience with identifying, analyzing, and communicating cyber threat and vulnerability information. Hold key Cybersecurity Certifications, Security+, CISSP, CEH, SANS etc Experience working with cloud technology (Azure, GCP, AWS.) Strong working knowledge of vulnerability management toolsets (Qualys, Wiz.io, Xray Jfrog etc.) Strong working knowledge of operational baselines hardening Knowledge of sound, industry-accepted server software support practices and methodologies Familiar with International Standards, NIST Special Publications and Cyber Security Frameworks Experience with assessing vulnerability management programs Familiarity with General IT infrastructure and enterprise architecture (e.g., Server, Network, Workstation, Cloud, etc.) Familiarization with patching processes and related technologies (e.g. BladeLogic, SCCM) Familiarity with enterprise risk management and how cyber threats and vulnerabilities integrate into ERM efforts Background and knowledge of general cyber security concepts (e.g. defense-in-depth security architectures, security controls) Exemplary verbal and written communication skills (English business fluent spoken and written) Demonstrated ability to think strategically and perform detailed, complex analysis and data interpretation Effective interpersonal skills, out-of-the-box thinking and ability to interface with all levels of staff Ability to work under pressure and deal with ambiguous situations Ability to read and write scripts in various languages. (php, python, ksh, powershell, SQL, and similar) Experience and proficiency in a various toolsets and best practices. Self-motivated and able to work in an independent manner. At BNY, our culture speaks for itself, check out the latest BNY news at: BNY Newsroom BNY LinkedIn Here s a few of our recent awards: America s Most Innovative Companies, Fortune, 2025 World s Most Admired Companies, Fortune 2025 Most Just Companies , Just Capital and CNBC, 2025

Posted 1 week ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

bengaluru

Work from Office

KPMG entities in India offer services to national and international clients in India across sectors. We strive to provide rapid, performance-based, industry-focused and technology-enabled services, which reflect a shared knowledge of global and local industries and our experience of the Indian business environment . Bachelors or Masters degree in Computer Science, Cybersecurity, Information Technology, or related fields. A minimum of 5+ years of hands-on experience in conducting cyber risk assessments and related security assessments. Industry certifications such as CISSP, CCSP, CISA, CISM, CRISC, ISO/IEC:27001/22301/20000 LI/LA or equivalent are highly valued. Profound knowledge of cybersecurity frameworks, industry standards, and best practices. Proficiency in using various security assessment and techniques. Strong analytical and problem-solving skills, with the ability to think critically and strategically. Excellent communication and presentation skills, capable of effectively communicating technical concepts to both technical and non-technical audiences. Demonstrated experience in project management and handling multiple assessments simultaneously. A proactive and self-motivated approach to work, with a commitment to continuous learning and professional development. Network Security, infrastructure assessment and network architecture design review. Conceptual knowledge of OT Security/ISA 62443 standard is preferable. Conduct thorough and detailed cyber risk assessments for our clients, analyzing their digital infrastructure, systems, and security controls. Collaborate with cross-functional teams to gather essential information and data required for comprehensive risk assessments. Evaluate and interpret assessment results to identify potential vulnerabilities and risks, and provide actionable recommendations for risk mitigation. Stay up-to-date with the latest cyber threats, attack vectors, and industry best practices to enhance the effectiveness of risk assessments. Prepare and deliver clear and concise reports summarizing the findings of risk assessments to clients and internal stakeholders. Provide expert advice and consultancy to clients, guiding them in implementing robust cybersecurity risk management strategies. Mentor and support junior team members to foster their professional growth and skills in cyber risk assessments.

Posted 1 week ago

Apply

5.0 - 8.0 years

7 - 10 Lacs

pune

Work from Office

Experience 5+ We are looking for an experienced L3 Aruba ClearPass Engineer with strong expertise in: Network Access Control (NAC) 802.1X authentication RADIUS Policy configurations Responsibilities: Advanced troubleshooting and issue resolution Integration of ClearPass with Active Directory (AD) and Wireless LAN Controllers (WLC) System upgrades and patching Coordination with OEM/vendors for support and escalations Requirements: In-depth knowledge of Aruba networking solutions Hands-on experience with ClearPass Policy Manager Strong understanding of network security protocols Aruba certification(s) preferred (e.g., ACMP, ACCP)

Posted 1 week ago

Apply

4.0 - 8.0 years

11 - 15 Lacs

gurugram

Work from Office

OrangeMantra is looking for IT Security Lead to join our dynamic team and embark on a rewarding career journey The IT Security Lead is responsible for overseeing the development, implementation, and management of the organization's information security program This role involves identifying security risks, developing strategies to mitigate these risks, and ensuring compliance with relevant regulations and standards The IT Security Lead works closely with other IT professionals, management, and external partners to safeguard the organization's data and systems from potential threats Key Responsibilities:Develop and implement an information security strategy and framework in line with the organization's objectives and industry best practices Conduct regular risk assessments and vulnerability scans to identify potential security threats and weaknesses in the organization's infrastructure, applications, and processes Design and implement security controls, policies, and procedures to protect the organization's data, systems, and networks from unauthorized access, misuse, or damage Monitor security logs and alerts to detect and respond to security incidents, breaches, or anomalies in a timely manner Lead incident response efforts, including investigation, containment, and recovery activities, in collaboration with relevant stakeholders Coordinate with internal teams and external vendors to ensure the timely deployment of security patches, updates, and fixes to mitigate known vulnerabilities Provide guidance and support to IT teams and end-users on security best practices, awareness, and training initiatives Stay abreast of emerging security threats, technologies, and trends to continuously improve the organization's security posture Collaborate with internal auditors, regulators, and external assessors to ensure compliance with relevant laws, regulations, and industry standards (e g , GDPR, PCI DSS, ISO 27001) Prepare and present regular reports, metrics, and findings on the organization's security posture, incidents, and remediation efforts to executive management and relevant stakeholders

Posted 1 week ago

Apply

7.0 - 12.0 years

9 - 14 Lacs

bengaluru

Work from Office

Who We Are As the leader in cloud-managed IT, Cisco connects passionate people to their mission by simplifying the digital workplace. Our impact is driven by the innovative, purposeful, and vibrant people who make up our inclusive community. When technology is intuitive, our customers can focus on what matters! About The team As a member of the Device Trust Assurance team, you will have a substantial impact on the security of millions of Cisco device sall around the world. We are looking for people who are passionate about security and eager to learn the ropes of vulnerability management (reporting, triaging and driving remediation). About The Role The Vulnerability Management Engineer plays a critical role in ensuring the security of our systems by managing and mitigating vulnerabilities. Key responsibilities include reviewing vulnerability scanning reports, assessing severity, and triaging vulnerabilities, along with efficiently managing Jira tickets to facilitate timely remediation or mitigation. This role requires utilizing tools such as Vigiles, yocto CVE scanner to conduct vulnerability scanning and analysis, and implementing a risk-based prioritization method for effective management. Leading process optimization efforts by identifying gaps in the vulnerability management workflow and enhancing program efficiency is also essential. Collaboration with an international security organization as well as engineering teams is necessary to provide guidance on mitigating and remediating vulnerabilities, identify and report automation bugs, and contribute to solutions that reduce manual workload in the vulnerability management lifecycle. The role involves investigating vulnerability alerts, assessing their impact, and calculating severity scores based on attack complexity. Additional duties include maintaining scanning tools, reviewing CVEs for potential risk exceptions, and guiding teams on security best practices and patch management standards. Flexibility to work across different time zones is crucial for effective global collaboration and system security. Qualifications 7+ years in vulnerability management or network security with strong focus on Cisco technologies Experiences in Cisco IOS-XE architecture, including kernel components and security mechanisms In-depth knowledge of common Security vulnerabilities (OWASP Top 10, CWE Top 25) Proficiency with vulnerability scanning tools (Semgrep, blackduck, vigiles, yocto cve scanner) and firmware analysis Ability to trace through Linux kernel configuration systems (KCONFIG) and interpret Makefiles Strong C programming skills and understanding of conditional code compilation Experience with scripting languages (Python, Bash) and network analysis tools (Wireshark) Proven ability to collaborate effectively across global teams and multiple time zones Consistent track record to ship in a dynamic environment Experience using Jira and other Atlassian software Strong documentation skills and ability to present complex technical findings clearly Bonus points for Cisco security certifications (CCNA/CCNP Security) and cybersecurity credentials (CISSP, CEH) preferred Knowledge of networking protocols and security frameworks (NIST, ISO 27001)Bachelors degree in Computer Science, IT, or related field Bachelors degree in computer science, IT or related field Does this sound like youWe would love to hear from you. We encourage you to drop us a line even if you don t have all the points above. That s a lot of different areas of responsibility! We will help you pick them up because we believe that great leaders come from a diverse set of backgrounds. At Cisco Meraki, we re challenging the status quo with the power of diversity, inclusion, and collaboration. When we connect different perspectives, we can imagine new possibilities, inspire innovation, and release the full potential of our people. We re building an employee experience that includes appreciation, belonging, growth, and purpose for everyone. Cisco is an Affirmative Action and Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, genetic information, age, disability, veteran status, or any other legally protected basis. Cisco will consider for employment, on a case by case basis, qualified applicants with arrest and conviction records. Message to applicants applying to work in the U.S. and/or Canada: When available, the salary range posted for this position reflects the projected hiring range for new hire, full-time salaries in U.S. and/or Canada locations, not including equity or benefits. For non-sales roles the hiring ranges reflect base salary only; employees are also eligible to receive annual bonuses. Hiring ranges for sales positions include base and incentive compensation target. Individual pay is determined by the candidates hiring location and additional factors, including but not limited to skillset, experience, and relevant education, certifications, or training. Applicants may not be eligible for the full salary range based on their U.S. or Canada hiring location. The recruiter can share more details about compensation for the role in your location during the hiring process. U.S. employees have access to quality medical, dental and vision insurance, a 401(k) plan with a Cisco matching contribution, short and long-term disability coverage, basic life insurance and numerous wellbeing offerings. Employees receive up to twelve paid holidays per calendar year, which includes one floating holiday (for non-exempt employees), plus a day off for their birthday. Non-Exempt new hires accrue up to 16 days of vacation time off each year, at a rate of 4.92 hours per pay period. Exempt new hires participate in Cisco s flexible Vacation Time Off policy, which does not place a defined limit on how much vacation time eligible employees may use, but is subject to availability and some business limitations. All new hires are eligible for Sick Time Off subject to Cisco s Sick Time Off Policy and will have eighty (80) hours of sick time off provided on their hire date and on January 1st of each year thereafter. Up to 80 hours of unused sick time will be carried forward from one calendar year to the next such that the maximum number of sick time hours an employee may have available is 160 hours. Employees in Illinois have a unique time off program designed specifically with local requirements in mind. All employees also have access to paid time away to deal with critical or emergency issues. We offer additional paid time to volunteer and give back to the community. Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components. For quota-based incentive pay, Cisco typically pays as follows: .75% of incentive target for each 1% of revenue attainment up to 50% of quota; 1.5% of incentive target for each 1% of attainment between 50% and 75%; 1% of incentive target for each 1% of attainment between 75% and 100%; and once performance exceeds 100% attainment, incentive rates are at or above 1% for each 1% of attainment with no cap on incentive compensation. For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid.

Posted 1 week ago

Apply

7.0 - 10.0 years

9 - 12 Lacs

kolkata

Work from Office

Not Applicable Specialism Microsoft & Summary At PwC, our people in infrastructure focus on designing and implementing robust, secure IT systems that support business operations. They enable the smooth functioning of networks, servers, and data centres to optimise performance and minimise downtime. Those in DevSecOps at PwC will focus on minimising software threats by integrating development, operations and security industry leading practices in order to validate secure, consistent and efficient delivery of software and applications. You will work to bridge the gap between these teams for seamless and secure application and software development. Responsibilities Design and implement Landing Zone architectures for cloud environments (Azure preferred). Facilitate cloud onboarding processes and lead onpremises to cloud migration (hybrid cloud) projects. Develop and optimize containerbased solutions using Docker and Kubernetes. Implement DevOps/GitOps practices to enhance development and operational efficiency. Manage high availability, scalability, disaster recovery of enterprise applications in cloud environments. Assess, report and improve security posture of enterprise applications on Azure Cloud (SOC2 compliance, endtoend encryption) Lead initiatives to migrate monolithic applications to microservices architecture. Collaborate with development teams on fullstack applications (.Net, NodeJS, Java) and their migration needs. Utilize Infrastructure as Code (IaC) tools, specifically Terraform and related tools (Bicep/ARM), to automate cloud infrastructure provisioning and management. Deploy and manage configuration management tools such as Ansible, Chef, and Puppet. Extensive experience in Landing Zone architecture design on cloud platforms (Azure preferred). Proven track record of successful cloud onboarding and migration projects. Deep expertise in container technologies, especially Docker and Kubernetes. Solid understanding of DevOps/GitOps practices and their implementation. Experience managing and scaling enterprise applications in cloud environments. Proficient in designing microservices and transitioning legacy monolithic systems to microservices architecture. Familiarity with at least one fullstack development methodology .Net, NodeJS, Java. Strong knowledge of IaC tools (Terraform/Bicep/ARM). Experience with configuration management tools (Ansible/Chef/Puppet). Experience with Azure Blob Storage, File Storage, Disk Storage, and data migration strategies. Familiarity with Azure SQL Database, Cosmos DB, and Azure Data Factory for data integration and ETL processes. Deep understanding of Azure Virtual Network, VPN Gateway, ExpressRoute, traffic management, and DNS Skilled in Azure Monitor, Azure Security Center, and Log Analytics for overseeing system health and performance. Ability to conduct cloud readiness assessments and develop strategic migration plans. Proficiency with Azure Migrate, Azure Site Recovery, and thirdparty migration tools Expertise in Azure Active Directory, Azure AD Connect, and integration with onpremise AD. Strong understanding of hybrid security measures, data encryption, network security, and compliance standards (e.g., GDPR, HIPAA). Mandatory skill sets Fullstack development experience with Python or Golang. Familiarity with GitOps tooling, such as FluxCD or Argo CD. Familiarity with Service Mesh (Istio) and FinOps technologies (Apptio, Cloudability, Opencost) Azure Administrator Associate or Azure Solution Architect certifications. Preferred skill sets Strong analytical and problemsolving skills. Excellent communication and collaboration abilities, with experience working in multidisciplinary teams. Proactive and innovative mindset, with the ability to drive change and optimize processes. Commitment to staying updated with the latest cloud technologies and best practices. Ability to work in flexible hours and experience with client facing roles Years of experience required 710 Years Education qualification B.E./B.Tech Education Degrees/Field of Study required Bachelor Degree Degrees/Field of Study preferred Required Skills Cloud Architectures Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Ansible (OpenSource Tool for Software Provisioning, Configuring, and Deployment), AWS CloudFormation, Azure DevOps Server, Bicep, Cloud Infrastructure, Coaching and Feedback, Communication, Continuous Deployment, Continuous Integration (CI), Creativity, CrowdStrike, Cybersecurity, Deployment Management, Dynatrace APM, Embracing Change, Emotional Regulation, Empathy, GitHub (Version Control Platform), GitLab (DevOps Tool), Google Cloud Platform, Incident Remediation {+ 34 more} Travel Requirements Available for Work Visa Sponsorship

Posted 1 week ago

Apply

7.0 - 11.0 years

9 - 13 Lacs

bengaluru

Work from Office

Education Qualification : Engineer - B.E / B.Tech / MCA Skills : Primary -> Technology | SDN Concepts, Understanding of | Network Monitoring | 2 - Knowledgeable Secondary -> Technology | Networking Technologies | Cloud | 3 - Experienced Secondary -> Technology | Networking Knowledge, Concepts | ITIL Processes | 3 - Experienced Certification : Technology | Networking Certifications | CCNA | CCNA Routing and Switching Job Description: 1) AD-Good Knowledge of AD Roles, Global Catalog Server, AD Group Policy, Knowledge of AD tools. 2) Working knowledge of deploying Windows Group Policies and resolving any issues w.r.t to Group policies. 3) Knowlege on Win 7 /8. Details below: a) Excellent working knowledge of Windows 7 transition planning, Good Working knowledge on Win 7 deployment and Image Engineering. b) Knowledge on MDT 2010 framework deployment Image and SOE creation. c) Working knowledge of Deployment of Win 7 features such as Bit locker / Bit lockers to go (encryption); or 3rd party encryptions as per customer requirement, Direct Access etc. d) Good working knowledge of Windows 7 deployment Process creation and Win 7 rollout using Zero touch deployment (leveraging desktop management tools like SCCM), Lite touch /Manual deployment, Bare-metal deployment. 3) Direct access and Branch Cache-Good working knowledge of Design and Deployment of Direct Access and Branch Cache 4) Knowlege on Desktop Virtualization and MDOP. Details below: a) Excellent working knowledge of Microsoft VDI framework. b) Good Working knowledge of Microsoft Desktop Optimization (MDOP) technologies. c) App-V Application Virtualization technologies (apps sequencing and virtualization). d) MED-V O/S virtualization and provisioning. e) AGPM - Group Policy management for greater control. f) DaRT - Troubleshooting and repairing system failures. g) MBAM - Manage/Recover BitLocker protection keys and compliance monitoring. 5) Assessment tools-Excellent working knowledge of Application compatibility assessment and remediation on Microsoft ACT framework.Good working knowledge on MAP based assessment and validation.

Posted 1 week ago

Apply

8.0 - 13.0 years

25 - 35 Lacs

bengaluru

Work from Office

Job Summary: We are seeking a highly skilled Azure Application Developer with deep expertise in C#/.NET, TypeScript, Azure-native design patterns, and Infrastructure as Code (IaC). The ideal candidate will possess a well-rounded set of technical and soft skills, enabling them to design and develop secure, scalable, and resilient cloud-native applications. This role requires proficiency in building applications using Azure services, as well as a strong understanding of distributed systems, security best practices, performance optimization, and cloud cost management. Key Responsibilities: Design, develop, and deploy cloud-native applications using Azure PaaS services such as App Services, Azure Functions, Logic Apps, API Management, and Azure PostgreSQL Apply Azure design patterns like Retry, Circuit Breaker, Queue-based Load Leveling, Cache-aside, and Event Sourcing to build scalable and resilient systems Build robust APIs and microservices using C#/.NET Core Develop frontend components using TypeScript (e.g., React or Angular) Design and implement asynchronous messaging solutions using Azure Service Bus, Event Grid, and Event Hubs Define and implement Infrastructure as Code (IaC) using ARM templates, Bicep, or Terraform Collaborate with DevOps and infrastructure teams to: Define boundaries between infrastructure and application responsibilities. Align on roles related to provisioning, configuration, security, and scalability. Ensure seamless application deployment via automated pipelines Secure applications using Azure AD, OAuth2, and Key Vault Set up monitoring, alerting, and diagnostics using Azure Monitor, App Insights, and Log Analytics Participate in code reviews, design sessions, and Agile ceremonies * Willingness to work in the 2 PM to 11 PM Shift ** Required Skills & Experience: 8+ years of overall IT experience, including full-stack or backend development 5+ years of experience in Microsoft Azure application development Expert in C#/.NET Core, Azure SDKs, and RESTful API design Proficient in TypeScript and frontend frameworks (React, Angular, or similar) Strong experience with Azure Service Bus, event-driven design, and messaging systems Solid experience with Azure Database for PostgreSQL Hands-on expertise with Infrastructure as Code (IaC): ARM, Bicep, or Terraform Deep understanding of Azure cloud architecture, application security, and DevOps pipelines Proven ability to define and manage infrastructure vs. application development responsibilities Experience working in Agile/Scrum environments Additional Skills & Experience: Distributed Systems Design: Expertise in building scalable, fault-tolerant, and high-availability systems Performance Monitoring & Optimization: Experience using Azure Monitor, Application Insights, and Log Analytics to track, analyze, and resolve performance bottlenecks Cost Management & Optimization: Ability to design cloud-native applications that are cost-efficient using best practices like Autoscaling, Reserved Instances, and Right-Sizing Security Best Practices: Strong knowledge of Azure RBAC, Managed Identities, Network Security, Key Vault, and data protection standards API Design and Governance: Experience in creating and managing API standards, implementing OAuth2, rate limiting, and throttling Automated Testing & Quality Gates: Experience with unit tests, integration tests, and tools like SonarQube, Postman, or Azure Test Plans CI/CD Mastery: Deep experience with DevOps pipelines, including branch strategies, release gates, and blue-green deployments Preferred Qualifications: Microsoft Certified: Azure Developer Associate (AZ-204) or Azure Solutions Architect Experience with AKS, Docker, and containerized deployments Familiarity with Azure Cognitive Services, Logic Apps, and Power Platform Experience with feature management tools like Azure App Configuration Exposure to Service Mesh technologies (e.g., Istio in AKS) Familiarity with message formats like JSON, Avro, XML, or Protocol Buffers

Posted 1 week ago

Apply

8.0 - 10.0 years

25 - 35 Lacs

bengaluru

Work from Office

ZEISS in India ZEISS in India is headquartered in Bengaluru and present in the fields of Industrial Quality Solutions, Research Microscopy Solutions, Medical Technology, Vision Care and Sports & Cine Optics. ZEISS India has 3 production facilities, R&D center, Global IT services and about 40 Sales & Service offices in almost all Tier I and Tier II cities in India. With 2200+ employees and continued investments over 25 years in India, ZEISS success story in India is continuing at a rapid pace. Further information at ZEISS India . Design security controls and help validate that our services, applications, and emerging technologies are designed and implemented to the highest security standards and applicable best practices Analyze the security of applications and services, discovering and addressing security issues, building security automation, and appropriately identifying the action(s) to mitigate emerging threats throughout a full secure development life-cycle (SDLC). Deploying, Migration to and Maintaining solutions in accordance with company security policies and best practices in product security in closely working with the Security Engineers of the Projects respectively Identifying, analyzing, and resolving infrastructure vulnerabilities and product security issues in closely working with the Security Engineers of the Projects respectively o College degree or / equivalent and 8-10 years related work experience, required o Minimum of 5 to 6 years of professional experience with any combination of at least 2 technical disciplines, including the following: cloud security, network security, application security, mobile security, secure development methodologies, software development and coding, identity management, authentication and authorization, network architecture, system administration, and systems engineering o Strong experience in conducting security assessments, including penetration testing o An understanding of networking and communication protocols (such as TCP/IP, UDP, SSL/TLS, IPSEC, HTTP, HTTPS, BGP) o An understanding of cryptography, web service frameworks, mobile application architectures, and service architectures (such as event-driven, service-oriented, or serverless architectures) o Familiarity with reverse engineering or vulnerability research, physical, infrastructure, or hardware security o Experience with one or more programming languages (such as Java, C++, Ruby, Python, Perl) for the purpose of code review o Experience and exposure to threat modeling and design reviews to assess security implications and requirements for introduction of new technologies o Experience representing technical viewpoints to diverse audiences and in making timely and prudent technical risk decisions o Experience with enterprise architecture and working as part of a cross-functional team to implement solutions Your ZEISS Recruiting Team: Sikcha Chhetri, Upasana Sinal

Posted 1 week ago

Apply

10.0 - 15.0 years

40 - 45 Lacs

bengaluru

Work from Office

Our team is growing and were looking for a PKI Architect with 10+ years of IT experience specializing in the PKI domain. This position is highly collaborative and will engage with Solution Architects, Security teams, Engineering, and Development teams to ensure effective implementation of the PKI platform and integration of PKI into various applications across the organization. In this role, you will be responsible for our PKI platform, policies and procedures, dissemination of PKI across the products, PKI operations that include managing cert lifecycle, ensuring compliance with industry standards and best practices, and responding to PKI-related incidents. Roles & Responsibilities Subject Matter Expertise - Act as the PKI SME and provide technical leadership to PKI initiatives / technologies and champion integration across products, core security and IT capability. Develop and manage the Calix PKI Platform for our IoT ecosystem along with end-to-end ownership for robustness, redundancy and maintenance of the platform. PKI Policies and Procedures Develop and manage the Calix PKI policies, procedures and standards to ensure compliance on industry standards and business requirements. Establish guidelines for cryptographic algorithms, certificate lifetime and lifecycle, key material custodial practices, and PKI platform logging & monitoring. PKI Operations Manage the PKI operations that include PKI Platform troubleshooting and support, Certificate lifecycle management, Incident Response, monitoring performance, regulatory compliance, and security auditing. Vendor Management - Communicate with the PKI and platform vendors on solution design, implementation plan, performance updates, feature requests, version upgrades, etc. Monitor vendor communities for latest updates on troubleshooting tools / issues and open support queries with the vendor as necessary. Qualifications 10+ years of experience with a minimum of 5-7 years in PKI domain with expertise in architecting PKI solutions across IoT, cloud and mobile applications. Expertise in implementing and managing PKI infrastructure components such as Certificate authorities, key material storage, key management systems, device keystore provisioning and code signing. Understanding of cryptographic protocols like RSA / ECC, security protocols and standards like TLS/SSL, X.509, S/MIME. Knowledge of Network Security, Microsoft Active Directory, Power Shell Scripting, REST API is desirable. Develop and enforce PKI policies, procedures, and standards to ensure compliance with industry regulations and best practices. Establish guidelines and ensure effective certificate lifecycle management with secure storage, issuance, validation, rotation and revocation of key materials / digital certificates within the organization. Develop processes and maintain PKI configuration and procedure documents along with technical guides / documentation for best practices. Perform gap analysis on the PKI solutions and develop new automation approaches / capability to mitigate PKI lifecycle challenges. Conduct periodic risk assessment on PKI infrastructure, identify potential risks and appropriate mitigation measures. BS/MS degree in computer science engineering, information security, or cryptography. Must have excellent verbal, written and presentation skills. Ability to work in a fast paced and highly collaborative environment. Location India (Flexible hybrid work model - work from Bangalore office for 20 days in a quarter)

Posted 1 week ago

Apply

10.0 - 15.0 years

40 - 45 Lacs

gurugram

Work from Office

[{"SalaryINR 22,00,000 Per Year" , "Remote_Job":false , "Posting_TitleNetwork Security Lead" , "Is_Locked":false , "CityGurgaon Kty.","IndustryIT Services","Job_Description Lead the design, deployment, and maintenance of network security architecture (firewalls, IPS/IDS, NAC, WAF, Load balancer VPNs, proxies, etc.). Monitor and analyze network traffic for suspicious activity, anomalies, and potential threats. Oversee firewall rule management, segmentation policies, and access control standards. Ensure approvals for any new deployment of the tools/policies Knowledge and good understanding of NBAD, NTA, NDR, Proxy Collaborate with SOC and incident response teams during threat detection, investigation, and mitigation. Ensure to Participate in Audit(Internal/External) and respond to any Audit observation Conduct periodic network vulnerability assessments and coordinate remediation efforts. Ensure compliance with RBI, PCI DSS, ISO 27001, and other regulatory frameworks. Lead the implementation and enforcement of secure network practices across branches, data centers, and cloud environments. Develop and maintain network security policies, procedures, and standard operating guidelines. Work with third-party vendors, auditors, and internal teams for security assessments and audits. Lead network security projects and provide guidance to junior team members and analysts. " , "Work_Experience10+years" , "Job_TypeFull time","Job_Opening_NameNetwork Security Lead" , "StateHaryana" , "CurrencyINR" , "CountryIndia" , "Zip_Code122001" , "id65438000012113085" , "Publish":true , "Date_Opened2025-09-01" , "Keep_on_Career_Site":false}]

Posted 1 week ago

Apply

2.0 - 6.0 years

7 - 10 Lacs

new delhi, bengaluru, belgaum

Work from Office

Unified Security Gateway (USG) combines firewall, VPN, and threat protection, while ACE SD-WAN routers offer intelligent link failover and traffic optimization. AnexConnect enables remote monitoring, and AnexHub provides Zero Touch Deployment, with integrated modules like AnexSpot for hotspot AAA and AnexShield for cloud web filtering. Trusted across industries, AnexGate delivers scalable, compliant, and cost-effective network security solutionsdesigned, developed, and supported entirely in India. How does AnexGATE add value to your Network Smart Solutions with Cost Saving We focus on creating smart solutions that add value to your business along with cost saving for advanced networks One Brand Name for all Network Problems AnexGATE creates solutions addressing almost all network issues under one brand to reduce your stress Stable, Seamless and Scalable Solutions Our solutions can easily be scaled as your business grows and yet, have stable sustained networks with minimal investment Dedicated and Direct Support Team. We have a direct contact support team so you can save valuable time finding the right person and use time solving your issue Industry Specific Solutions for Efficient Networks Almost all our solutions are created Industry specific to make it more suited and highly efficient for your business. All AnexGATE solutions are developed in-house, in INDIA keeping in mind the demanding Networks of Indian Businesses

Posted 1 week ago

Apply

3.0 - 5.0 years

15 - 16 Lacs

hyderabad

Work from Office

Monitor patch compliance and system health , generating detailed reports and dashboards for stakeholders. Troubleshoot client and infrastructure issues , ensuring BigFix agents and servers function optimally across environments. Automate patching workflows and reporting using scripting (PowerShell, Shell) and integrate with tools like Kibana or Splunk. Monitor system health and troubleshoot issues related to hardware, OS, Active Directory, and Group Policy. Document system configurations and procedures , and collaborate with teams for system upgrades and disaster recovery planning. What Were Looking For B. Tech or equivalent 3-5 years of relevant experience in the IT industry Excellent initiative, interpersonal skills, and problem solving skills Ability to manage many projects simultaneously, prioritizing appropriately Ability to strongly communicate with other administrators and end users Experience in troubleshooting technical problems involving hardware, operating systems, and applications 24x7 on-call availability Willingness to work in shifts, and weekends.

Posted 1 week ago

Apply

7.0 - 8.0 years

16 - 18 Lacs

mumbai

Work from Office

Responsibilities lOversee the management of AWS cloud and network securityinfrastructure and support team to strengthen the security posture in these areas lManage security alerts and events on network andcloud security tools lEvaluate security tools, products and managedservices for effectiveness, business fit and ROI lReview security rules and configurations and suggestimprovement areas and get them implementedlDrive PoC (Proof of Concept) evaluation to supportprocurement decision based on technical evaluation output lDocument SOPs, playbooks and design document systemenvironments, cloud operations, and security tools lCreate reports, dashboards, metrics, andpresentation on cloud security and network for committee/other purposes Functional competencieslProficient in cloud infrastructure, services, andsecurity toollKnowledge of communication protocols, networking andsecurity toolslknowledge of layered security approach andregulatory requirements (DPDP, IRDAI, CERT-IN)lKnowledge of security best practices, standards and frameworks

Posted 1 week ago

Apply

5.0 - 8.0 years

17 - 19 Lacs

noida

Work from Office

We at Innovaccer are looking for an Security Engineer-II for SecOps whowill be responsible to perform real time monitoring, analysis of the security events and administration of Security tools. This role will encompass the use of a broad range of security domains (Monitoring, Endpoint Security, Data Security, Cloud Security, VAPT). This role would be a great opportunity to learn and grow as you would be exposed to multiple security domains at single time. A Day in the Life Vulnerability Assessment & Penetration Testing. This role requires being available on call during weekends and off hours. Proficiency in Data Security will be preferred. Corporate IT Penetration testing like Wifi, Router, LAN, etc. Familiarization with AWS, Azure & GCP. Perform analysis of events generated by the DLP solution and follow defined process to escalate any potential incidents Triage, Investigate, document, and report on information security events. Partial Administration and Contribution to the configuration and maintenance of security solutions such as Antivirus, Data Leak Prevention, Host Intrusion Detection Systems (HIDS), Network Intrusion Detection Systems (NIDS), and Security Information and Event Management (SIEM). Integration of devices like Linux and Windows machines, Antivirus, Firewalls, IDS/IPS, Web Servers etc. Creation of Use Cases, dashboards based on the requirements. Supervising Continuity & Recovery activity with Cloud Engineering Team Exposure of Data Leak Prevention (DLP) Conduct security assessments on infrastructure and deliver reports detailing assessment observations and associated recommendations for information security program development to meet security and compliance standards. Governance of Cloud Infrastructure (AWS/Azure/GCP) Reviewing IAM roles and performing config audits on cloud infra. Work closely with DevOps, Engineering, Product departments to remediate security related issues and incidents Good to have proficiency in Scripting & Automation CEH, OSCP, OSCE, Security+ and other likewise security certifications is desirable

Posted 1 week ago

Apply

5.0 - 10.0 years

3 - 7 Lacs

hyderabad

Work from Office

Collaborate with Network Security Operations, Engineering, Global ENOC, and Global Build teams to maintain a secure and resilient global network security infrastructure. Provide expert-level engineering and operational support to drive continuous improvement and operational excellence. Conduct ongoing assessments of the network environment to identify gaps, risks, and areas for enhancement, proposing innovative and effective solutions. Stay abreast of industry trends and emerging technologies to strengthen the organization s security posture. Mentor and train team members, fostering a collaborative and knowledge-sharing culture. Deliver high-quality incident management, problem resolution, and change implementation in alignment with ITIL best practices. Ensure compliance with all relevant security control requirements and contribute to audit readiness.

Posted 1 week ago

Apply

4.0 - 9.0 years

16 - 18 Lacs

bengaluru

Work from Office

Conduct security assessments of IT systems, applications, and networks to identify vulnerabilities and risks. Perform risk assessments and gap analyses to evaluate compliance with frameworks such as ISO 27001, NIST CSF, PCI-DSS etc. Working knowledge in one or more security domains such as: Information Technology, Information Security, Regulatory Compliance, Security Governance policies and procedures, Risk Management, Compliance, Access Control, Network Security, Security Architecture Review, IT General Controls, Third Party Risk Management Demonstrates in-depth knowledge of information and cyber security controls and risk management process. Serves as technical lead or subject matter specialist on security and privacy implementation projects, responsible for design, build, testing and deployment of solutions. Demonstrates ability to work independently on projects with limited supervision. Demonstrates understanding of complex business and information technology management processes. Demonstrates working knowledge of firm tools and methodologies that may be suitable for the engagement. Manages day-to-day client relationships at mid and lower levels. Participates in proposal development efforts to sell "add-on" work to clients. Identifies opportunities to improve engagement economics. Plays substantive role in designing and implementing business development plan for the service line. Plays substantive/lead role in retention of professionals and in building staff complement, mix, and recruiting. Undertakes initiatives in people and practice development. Develop and recommend security measures, policies, and procedures to mitigate identified risks. Collaborate with cross-functional teams to implement cybersecurity best practices and resolve vulnerabilities. Stay updated on the latest cyber threats, trends, and regulatory requirements.

Posted 1 week ago

Apply

3.0 - 8.0 years

14 - 16 Lacs

mumbai

Work from Office

PIM/PAM Operati ons: Performing day-to-day administration, monitoring, and support for the ARCON PAM solution. Troubleshooting: Providing L1 support to resolve immediate issues with privileged access, network outages, or system malfunctions reported by users or sensors. Policy Implementation: Deploying and maintaining security and access policies within the ARCON platform to align with organizational and industry standards. Incident & Problem Management: Responding to and resolving issues related to privileged access and credential misuse. Documentation: Creating and maintaining documentation for configurations, procedures, and best practices related to the ARCON PAM system. Compliance Support: Assisting in compliance activities and conducting access reviews to ensure adherence to internal and external standards. Automation & Scripting (Basic): Supporting automation efforts to streamline PIM/PAM operations and help with basic scripting tasks if required. Required Skills & Qualifications Experience: Approximately 3 years of experience in network security, with a specific focus on PIM/PAM solutions. ARCON PAM Knowledge: Product knowledge of the ARCON PAM platform is essential. Technical Skills: Experience in working with Windows and Linux/Unix environments. Core IT Concepts: Understanding of network, transport, and application layers (OSI model) for effective troubleshooting. Communication: Ability to coordinate with users and teams to resolve issues and provide support.

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies