Jobs
Interviews
7 Job openings at Optiv
Sr Quality Assurance Analyst I On-site, Bangalore

Bengaluru, Karnataka, India

0 years

Not disclosed

Remote

Full Time

The Sr. QA Analyst will provide deep level analysis for client investigations utilizing customer provided data sources, audit, and monitoring tools at both the government and enterprise level. The Sr. Threat Analyst will work closely with our Technology Engineers, Architects, and Threat Analysts to service customers. How You’ll Make An Impact High level professional writing experience regarding documenting and reporting on potential security incidents identified in customer environments to include timeline of events. Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets. Provide analysis on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc. Perform knowledge transfers, document, and train clients regarding mitigation of identified threats. Provide ongoing recommendations to peers and customers on tuning and best practices. Actively research current threats and attack vectors being exploited in the wild Actively work with analysts and perform investigations on escalations. Ability to discuss security posture with multiple clients and make recommendations to better their holistic security approach. Provide gap analysis for clients to better their security posture. Maintain and develop SOPs for threat analyst team. Develop and maintain Playbooks and runbooks. Work with internal teams to increase efficiency and effectiveness of security analysis provided by the threat analysis team. Training of new analysts on security and tools Create and maintain Content Catalog based on security essentials and the evolving threat landscape. Provide quality assurance (QA) review of security alerts handled by Team members. Conduct regular security audits to ensure compliance with industry standards and regulations. Evaluate security controls, policies, and procedures. Identify vulnerabilities and enhance remediation actions. What We’re Looking For Five years of full-time professional experience in the Information Security field Experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment as a point of escalation. Excellent time management, reporting, and communication skills including customer interactions and executive presentations. Data analysis using SIEM, Database tools, and Excel. Experience troubleshooting security devices and SIEM. Ability to create and maintain content within SIEM environments and make recommendations to clients to better their visibility. IDS monitoring/analysis with tools such as Sourcefire and Snort Experience with SIEM platforms preferred (QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk) a plus. Experience with audit tools, MS office, Power BI Knowledge of security information and event management (SIEM) systems. Understanding of cloud security and virtualization. Direct (E.g., SQL Injection) versus indirect (E.g., cross-site scripting) attacks Experience with the following attacks: Web Based Attacks and the OWASP Top 10, Network Based DoS, Brute force, HTTP Based DoS, Denial of Service, Network Based / System Based Attacks. Familiarity with SANS top 20 critical security controls Understand the foundations of enterprise Windows security including Active Directory, Windows security architecture and terminology, Privilege escalation techniques, Common mitigation controls and system hardening. Anti-Virus (AV) and Host Based Intrusion Prevention (HIPS) Experience in monitoring at least one commercial AV solution such as (but not limited to) McAfee/Intel, Symantec, Sophos, or Trend Micro Ability to identify common false positives and make suggestions on tuning. Understanding of root causes of malware and proactive mitigation Propagation of malware in enterprise environments Familiarity with web-based exploit kits and the methods employed by web-based exploit kits. Familiarity with concepts associated with Advanced Persistent Threats and “targeted malware.” Experience and understanding of malware protection tools (FireEye) and controls in an enterprise environment. Covert channels, egress, and data exfiltration techniques Familiarity with vulnerability scoring systems such as CVSS. Basic understanding of vulnerability assessment tools such as vulnerability scanners and exploitation frameworks This team provides 24/7 support. This role requires shift flexibility, including the ability to rotate between days, mids, and nights. What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer (EEO). All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, status as an individual with a disability, veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time. Show more Show less

Sr. Engineer - Network Security I On-site, Bangalore

Bengaluru, Karnataka, India

0 years

None Not disclosed

Remote

Full Time

As a member of the Optiv Security Operations Department, an MSS TAC Engineer position provides frontline maintenance, remote support, and appliance/OS management and health monitoring to customers in a 24x7x365 TAC (Technical Assistance Center) environment. We’re looking for knowledge-seeking candidates who will be eager to dive into new things in a fast-paced and ever-changing environment. This role is fitting for those looking to trailblaze their career in network security. Operating as the first impression for Optiv clients in many cases, engineers deliver both third-party Authorized Support and Technology Management service lines and directly assist Optiv clients with their network and/or security-related issues and needs. These two service lines are often part of a much larger client-focused services agenda. Therefore, this position often plays a crucial part in helping to keep overall Optiv/client relationships successful. How You’ll Make An Impact Troubleshoot technical issues over the phone and via secure screen share. Host troubleshooting conference calls bridging multiple individuals from vendors, clients, third parties, etc. Responsible for initial triage of incoming client issues. Facilitate customer communication over the phone and email via a ticketing system. Document actions in ticketing systems to effectively communicate information to both internal resources and external customers. Respond in a timely manner (with published SLA) to incidents and support requests. Perform basic troubleshooting to diagnose common Network problems using fundamental TCP/IP network skills. Assist engineering staff with lab systems configuration. Update open ticket status for engineers and other technicians within the ticketing system. What We’re Looking For A minimum of Associate’s degree or equivalent from a two-year college or technical school in Information Technology, Information Security/Assurance, Network Administration, Engineering, or related area of study. Related experience and/or training in a technology environment or equivalent combination of education and experience. Fundamental knowledge and exposure to TCP/IP networking and security concepts. Entry-level desktop/networking experience, systems administration, and IT helpdesk experience, with exposure to Microsoft and UNIX/Linux-based operating systems. Strong soft skills. An active CCST (Cisco) or CCNA (Cisco) or Net+ (CompTIA) certification. Experience in one or more of the following is beneficial: Cato Networks, Juniper Networks, Check Point, Cisco Systems, Netskope, F5 Networks, Palo Alto Networks, Fortinet, HPE Aruba Networks, Ivanti (Connect Secure), Juniper Networks, Tanium, Zscaler A passion for information, network, and data security. Shift flexibility, including the ability to provide on-call support when needed. Demonstrated experience and success in a customer-focused satisfaction environment. Ability to work greater than 40 hours per week as needed. Ability to travel up to 10 percent of the time. What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Sr. Engineer - Crowdstrike | Onsite, Bangalore

Bengaluru

6 years

INR 6.0 - 7.925 Lacs P.A.

Remote

Part Time

About the job At Optiv, we’re on a mission to help our clients make their businesses more secure. We’re one of the fastest-growing companies in a truly essential industry. In your role at Optiv, you’ll be inspired by a team of the brightest business and technical minds in cybersecurity. We are passionate champions for our clients and know from experience that the best solutions for our clients’ needs come from working hard together. As part of our team, your voice matters, and you will do important work that has an impact, on people, businesses, and nations. Our industry and our company move fast, and you can be sure that you will always have room to learn and grow. We’re proud of our team and the important work we do to build confidence for a more connected world. How You'll Make An Impact Experience in Endpoint Security Platforms e.g. AV, EDR, XDR, DLP, Encryption, etc. Perform end to end platform engineering management for Security tools Good knowledge on Malware / Threats Working knowledge on endpoint security technologies like Antivirus, EDR, XDR, DLP, Encryption Performing regular checks on synchronization, monitoring and health checks Provide recommendation to Customer security team on changes to global policies. Analyze application & Configuration settings, Policies & custom rule sets, historical performance data & provide recommendations. Working knowledge of triaging malware alerts Working knowledge of security technologies such as SIEM, DLP, UEBA and hybrid/Cloud Security environments. What We're Looking For 6+ years of experience, hands on experience in tools like Crowdstrike, MS Defender for Endpoint. Flexible to work in Fixed Night shifts. Understanding of security by design principles and architecture level security concepts Knowledge of and experience with related Workstation and Server technologies. Knowledge on deployment tools and MDM tools Sound security engineering knowledge ( technical) to work collaboratively with the Tech Leads and software/products architects to ensure secure Products Good Knowledge on ITIL, Incident management, Change Management and Problem Management including analysis and response Understand and manage the requirements of being part of a 24x7 on-call operation, including but not limited to, shift hand-over, operational advice, guidance, support and escalation Good knowledge on reporting, documentation etc. What you can expect from Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups . Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice . If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Associate Engineer | On-site, Bangalore

Bengaluru

1 - 3 years

INR 6.0 - 7.925 Lacs P.A.

Remote

Part Time

The Associate Engineer - Security Automation/SOAR will be responsible for updating customer work requests and following operating procedures to perform AFC support tasks including health checks, reporting, work ticket acknowledgment and assignment, basic troubleshooting and other tasks as required for AFC service health and operation. The Associate Engineer will contribute to the development of knowledge base and troubleshooting information to expand the efficiency and performance of AFC services. This role requires the ability to develop skills on multiple security products and work closely with the staff of higher tiers, Service Delivery, and clients to provide ongoing communication of status and timely response to deliverables. How you'll make an impact: Hands on opportunity of implementation and development of SOAR solutions like Swimlane, Cortex XSOAR, Tines, devo, Exabeam SOAR, Splunk SOAR etc The primary purpose of this role is to act as the orchestration strategist in identifying incident response activity where mitigating controls would be automated. Identify mitigating controls through repetitive manual processes within the SOC Analyst community that complies with client security policy and industry best practices In concert with Senior Developers , within the "Proactive Hunting" process, translate complex, and non-complex Incident Response event patterns into an automated process mitigating control In coordination with SOC Operations, Service Delivery Manager, and Application Development Engineers, produce the requirements necessary to translate manual Incident Response events into automated mitigating controls using several industry standard platforms, research patterns to gain decision making criteria, and coding languages. What we're looking for: BE / BTech / ME / MTech/MCA in Computer Science or technology-related degree or equivalent work experience. 1 to 3 years of progressive software development or web development or security automation experience Understanding of security automation and development using opensource technologies Hands-on coding experience in the implementation of complex programming custom workflows. In-depth knowledge of algorithms, data structures, design patterns, and their applications. Solid programming background in Python, NodeJS, TypeScript, JavaScript, or other object-oriented languages. Strong NoSQL database and SQL knowledge including MongoDB, Postgres, or MySQL. Hands-on experience in any one of cloud platforms such as AWS, Azure or GCP and DevOps technologies including Kubernetes, Docker, and Terraform. Experience in an Agile DevOps engineering environment that effectively uses CI/CD pipelines (Jenkins, GitLab, Github). Experience on SOAR tools like Swimlane, Splunk SOAR, XSOAR is good to have. The candidate will most likely have spent time in every role of the SOC Operations, operating model Understand the computational decision making process in automating complex scenarios Strong collaboration skills that in turn translates efficient processes into automated decision making functions and determinations through the use of a wide range of industry standard platforms, data mining strategies, and investigative tools Excellent written and oral communicating skills Unrivalled ability to work with highly complex, technical individuals to translate computing technology into everyday communication topics Ability to explain highly technical standards, and solutions to junior personnel, and senior leadership Comprehend complex data sets, and create own algorithms if necessary to accomplish tasks Experienced in writing requirements documentation for data programming solutions Focus is developing automation scripts to interconnect security systems using a proprietary platform that uses python code to configure automation actions Security background preferred Experience in REST APIs, Data storage What you can expect from Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups . Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice . If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Associate Analyst - SOC, On-Site, Bangalore

Bengaluru

1 - 2 years

INR 6.0 - 8.0 Lacs P.A.

Remote

Full Time

The Associate Analyst will provide intrusion/incident monitoring and detection utilizing customer provided data sources, audit and monitoring tools at both the government and enterprise level. An Associate Threat Analyst is required to be flexible and adapt to change quickly. The Associate Threat Analyst will work closely with our Threat Analyst to service customers through our Managed Detection and Response offering. How you’ll make an impact Analyze, document and report on potential security incidents identified in customer environments. Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets. Provide triage on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc. Perform knowledge transfers, document, and triage client’s issues regarding mitigation of identified threats Provide ongoing recommendations customers on best practices Actively research current threats and attack vectors being exploited in the wild Utilize defined SOP’s and KB’s Performs other duties as assigned Complies with all policies and standards What we’re looking for 1-2 years of working with Incident Ticketing Systems (i.e. ServiceNow, Remedy, Remedy Force, Heat, etc.). required Desire to gain full-time professional experience in the Information Security field Excellent time management, reporting, communication skills, and ability to prioritize work Ability to generate comprehensive written reports and recommendations Write professional emails Previous experience as a point of escalation in a technical environment Customer interactions and working through various issues Base knowledge of contemporary security architectures/devices such as firewalls, routers, switches, load balancers, remote access technologies, anti-malware, SIEM, and AV Ability to work customer’s environments to report on critical security events Ability to troubleshoot technical problems and ask probing questions to find the root cause or a problem Queue management Data analysis using SIEM, Database tools such as Elastic, and Excel Experience troubleshooting security, network, and or endpoints IDS monitoring/analysis with tools such as Sourcefire and Snort Experience with SIEM platforms preferred (QRadar, LogRhythm, Exabeam, Securonix, and Splunk) Familiarity with web-based attacks and the OWASP Top 10 at a minimum Attack vectors and exploitation Mitigation, Active Directory Direct (E.g. SQL Injection) versus indirect (E.g. cross-site scripting) attacks Familiarity with SANS top 20 critical security controls Understand the foundations of enterprise Windows security including: Windows security architecture and terminology Common system hardening best practices Anti-Virus (AV) and Host Based Intrusion Prevention (HIPS) Experience in monitoring at least one commercial AV solution such as (but not limited to) Carbon Black, CrowdStrike, McAfee/Intel, Symantec, Sophos or Trend Micro Ability to identify common false positives and make suggestions on tuning Malware, Denial of Service Attacks, Brute force attacks Understanding of base malware propagation and attack vectors Propagation of malware in enterprise environments Experience with malware protection tools such as FireEye a plus. Understanding of malware mitigation controls in an enterprise environment. Network Based Attacks / System Based Attacks Familiarity with vulnerability scoring systems such as CVSS Basic understanding of vulnerability assessment tools such as vulnerability scanners and exploitation frameworks Eligibility to obtain security clearance Shift flexibility, including the ability to provide on call support when needed Ability to work greater than 40 hours per week as needed This role is Work from Office role What you can expect from Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups . Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice . If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Engineer - SIEM | On-site, Bangalore

Bengaluru

3 years

INR 6.0 - 7.925 Lacs P.A.

Remote

Part Time

The Security Engineer will be responsible for creation of procedures, implementation of processes and development of staff for managing and maintaining security systems across internal and client environments. Experience and knowledge of SIEM or Situational Awareness are essential. The Security Engineer will work closely with Management, Senior Engineers, Threat Analysts, Solution Architects, other Security Engineers and clients to complete high profile, critical services to existing Managed Security Service clients. Serve as a primary responder for Managed Security customer systems, taking ownership of client configuration issues and tracking through resolution. How you'll make an impact 3+ years professional experience supporting and maintaining SIEM systems (Splunk). 2-3 years professional experience working with networks and network architecture. Experience with basic tuning of SIEM(Splunk) content. College degree or equivalent training with experience working in a Security Operations Center, Managed Security, or client network environment. Information security knowledge in one or more areas such as Enterprise end-point security products (i.e. McAfee e-Policy Orchestrator, Virus Scan, Anti-Spyware, Host Data Loss Protection, Endpoint Encryption, etc.) Security Information and Event Manager (SIEM), Firewall, Web Proxy, E-Mail and Web Gateway etc. to include Palo Alto / Checkpoint / Juniper / McAfee / Cisco / Blue Coat / Imperva etc. Understanding of network operations a must; ideal candidate will have worked with network engineering or network security analysis. Experience with SIEM(Splunk) content creation and reporting. Excellent time management, reporting, and communication skills. Superior IT problem-solving skills. Experience with Linux OS. Strong technical writing skills and the ability to explain complex problems to nontechnical teams. Experience working with clients in a service delivery function. Shift flexibility, including the ability to provide after-hours support when needed. Ability to work greater than 40 hours per week as needed. What we are looking for Bachelor of Science degree in Computer Science or related field is required. Experience working with Internal and client Ticketing and Knowledge Base Systems for Incident and Problem tracking as well as procedures. (i.e. Service Now, Jira, Confluence, etc.). General security knowledge (GIAC, CISSP, CCSE, CISA, HBSS, NSA, CEH, Cisco Security, Security +, or other security certifications). Knowledge of Linux and Windows Operating Systems. An understanding of a wide array of server grade applications such as: DBMS, Exchange, DNS, SMTP, IIS, Apache, SharePoint, Active Directory, Identity Management, Patch Management, LDAP, SQL, and others. Experience with SIEM security products: Splunk, Sentinel and infrastructure components such as proxies, firewalls, IDS/IPS, DLP etc. Hold Splunk Certifications (Architect) Excellent interpersonal skills Excellent communication skills - written, verbal and listening. The role demands the availability for US working hours (5PM (IST) to 2AM (IST)) This role is Work From Office role. What you can expect from Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups . Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice . If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Sr. Engineer- CrowdStrike | On-Site, Bangalore

Bengaluru, Karnataka, India

5 - 8 years

None Not disclosed

Remote

Full Time

Endpoint Senior Engineer, Cyber Operations is responsible for post-sales product and service implementation. Sr. Endpoint Engineers are responsible for completing assigned projects in a manner consistent with the team’s Operational Standard, which emphasizes the importance of providing exceptional customer service. They are also responsible for meeting consulting billing objectives. How You'll Make An Impact Experience in Endpoint Security Platforms e.g. AV, EDR, XDR, DLP, Encryption, etc. Good knowledge on Malware / Threats Working knowledge on endpoint security technologies like Antivirus, EDR, XDR (CrowdStrike, MS Defender, Sentinel One, Endgame), DLP, Encryption Performing regular checks on synchronization, monitoring and health checks Provide recommendation to Customer security team on changes to global policies. Analyze application & Configuration settings, Policies & custom rule sets, historical performance data & provide recommendations. Working knowledge of triaging malware alerts Working knowledge of security technologies such as SIEM, DLP, UEBA and hybrid/Cloud Security environments Understanding of security by design principles and architecture level security concepts Knowledge of and experience with related Workstation and Server technologies. Knowledge on deployment tools and MDM tools Sound security engineering knowledge (technical) so as to work collaboratively with the Tech Leads and software/products architects to ensure secure Products. Good Knowledge on ITIL, Incident Management, Change Management and Problem Management including analysis and response. Understand and manage the requirements of being part of a 24x7 on-call operation, including but not limited to, shift hand-over, operational advice, guidance, support and escalation. Good knowledge on reporting, documentation etc What We're Looking For Bachelor of Science degree in Computer Science or related field is required. Expertise with one or more of our core Technology Areas: Security Event Management, Content Protection (DLP, Encryption, Access Control), Endpoint Security typically obtained in 5-8 years. Thorough understanding of large-scale environments Strong presentation and verbal communication skills Process-oriented individual with strong attention to detail, and strong organizational skills. Excellent, detailed writing skills Expert knowledge of using Microsoft Office. Ability to build relationships with and influence other functional areas. Well-developed negotiation skills. Ability to build consensus. Strong interpersonal skills Ability to manage multiple tasks in parallel. This role demands the availability during US working hours(5PM(IST) to 2AM(IST)) This role is Work from Office role. What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Optiv logo

Optiv

7 Jobs

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Job Titles Overview