Jobs
Interviews

23 Proof Point Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 5.0 years

4 - 7 Lacs

Gurugram

Work from Office

Role & responsibilities Design, implement, and maintain enterprise-grade email security solutions. Configure, manage, and troubleshoot Trend Micro CAS (Cloud App Security) for protection across email platforms (Microsoft 365, G Suite, etc.). Maintain and optimize Cisco Umbrella (DNS Security) policies and deployments to protect against phishing, malware, and other email-borne threats. Monitor, investigate, and respond to security incidents related to email and DNS. Collaborate with cross-functional teams to assess and mitigate email and web-based threats. Maintain and update threat detection and prevention rulesets, policies, and standards. Stay up to date with the latest trends and best practices in email and DNS security. Perform root cause analysis for incidents and implement preventive measures. Maintain documentation and provide regular reports and dashboards related to security incidents and threat activity.

Posted 3 days ago

Apply

5.0 - 7.0 years

5 - 5 Lacs

Kochi, Thiruvananthapuram

Work from Office

Role Overview The Anti-Phishing Specialist leads the organization's efforts to detect, prevent, and respond to phishing attacks and other email-based threats. This role is pivotal in developing robust anti-phishing strategies, managing email security technologies, responding to incidents, and educating users to enhance organizational resilience against cyber threats. Key Responsibilities - Identify and facilitate takedown of phishing websites and rogue applications. - Proactively address a broad spectrum of cyber threats including DDoS, ransomware, business email compromise (BEC), spear phishing, whaling, vishing, and other social engineering attacks. - Monitor and analyze inbound emails to detect malicious content and recommend rule adjustments to reduce email-borne threats. - Design, implement, and maintain anti-phishing strategies, policies, and procedures. - Manage and optimize anti-phishing tools and platforms, including DMARC, DKIM, SPF, and secure email gateways. - Develop advanced detection rules and filters to counter evolving phishing tactics. - Lead phishing-related incident response efforts--containment, eradication, recovery, and post-incident review. - Deliver regular employee training and awareness programs on phishing prevention. - Collaborate with security teams to provide guidance on email security best practices. - Evaluate emerging anti-phishing technologies and recommend improvements. - Stay abreast of current phishing trends, attack methods, and mitigation techniques. - Produce detailed reports on phishing incidents, metrics, and defensive performance. Qualifications - Bachelor's degree in Computer Science, Information Security, or a related field. - 5+ years of hands-on experience in anti-phishing, email security, or a similar domain. - Strong expertise in email protocols (SMTP, etc.) and security standards (DMARC, DKIM, SPF). - Proven experience with enterprise email security solutions (e.g., Proofpoint, Mimecast, Ironscales). - Deep understanding of phishing tactics, social engineering, and email-based threat vectors. - Strong analytical, problem-solving, and communication skills. - Demonstrated leadership in mentoring or guiding security teams. - Preferred certifications: CISSP, Certified Email Security Manager (CESM), or equivalent. Required Skills SOC L2, Cyber Security, Phishing

Posted 3 days ago

Apply

5.0 - 10.0 years

9 - 17 Lacs

Noida

Work from Office

Lead Consultant (Cyber Security) Job Summary: The Lead consultant for Cyber Security (B2B SOC MSS) provides the advance level of support for Product Implementation & Services in the Security Operations. In this position, the consultant will be to lead the project (technical) consultants team for successful migration/ implementation of the Cyber Security Products (and Services). Mini.2years of experience implementation & operations. The resource should have implemented at least 4-5 projects in customer environment. Working Knowledge of SOC/ SIEM tools and operational understanding Must have lead team of Security Consultants/ Analysts Should have sound knowledge of products & should be able to carry out the POCs, Implementation and Operations support Should lead the delivery of multiple projects at customer locations Should have knowledge of following products (with Operations and Implementation) DLP/ Proxy Forcepoint, Symantec, Cisco, McAfee Email Security Symantec, Forcepoint, Cisco NAC Solutions – Cisco ISE, Forcescout EDR/ XDR Solution – Trend Micro, Crowdstrike SOC SIEM Solution (Arcsight, Qradar, RSA or Seceon) ( Must have hands-on experience from any two of above) Product certification from any of the above products will be added advantage Must be able to execute strategic and tactical direction for solutions offerings Experience in supporting a multiple customer base systems and network environments Provides timely and adequate response to threats/alerts, including off-hour support. Develop functional specifications for integrating/ adopting requirements into enterprise target state architecture or specific application Collaborate with business groups to help them to identify, classify, and secure high value data Provide feedback via periodic reports based on rule parameters; Ability to write regular expressions Ability to self- direct and work independently when necessary, and clearly articulate technical concepts/ issues to both technical and non- technical peers and management The ability to assess security events to drive to a resolution. Demonstrate Understand Critical Data Types such as PII, NPI, PCI, HIPAA, etc Demonstrate Understanding of Mass Storage, USB, Removable Media, for example allow charge but do not allow data copy Excellent English communication skills mandatory Excellent documentation skills mandatory Understand reporting capabilities Required Technical Expertise Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host based firewalls, Anti-Malware, HIDS General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows NT Good to have industry certifications on SIEM Platform, CCNA, CEH, MCSE & Others Bachelor’s Degree in Computer Science or equivalent required Good communication skills Strong level of customer service required

Posted 1 week ago

Apply

6.0 - 8.0 years

27 - 42 Lacs

Chennai

Work from Office

Job Responsibilities - Investigate, document, and report on information security issues and emerging trends - Notify clients of incidents and required mitigation works - Understand logs from various sources like firewalls, IDS, Windows DC, Cisco appliances, AV and antimalware software, and email security - Fine-tune SIEM rules to reduce false positives and remove false negatives - Perform threat intel research and vulnerability analysis Required Skills and Experience - Experience: 5-7 years in roles related to information security or similar fields - Skills: Expertise in Cloudstrike, Proofpoint, LogRhythm, and Rapid 7 - Knowledge of ITIL disciplines like Incident, Problem, and Change Management

Posted 1 week ago

Apply

6.0 - 11.0 years

10 - 20 Lacs

Hyderabad, Pune, Greater Noida

Work from Office

Job Title: Email Security Analyst Location: Gr.Noida, Hyderabad , Pune 1. Proofpoint / Mimecast Platform Administration: Configure and manage the Mimecast or Proof point platform, including email security, archiving, and continuity feat ures. Monitor the platform for performance, security, and availability, and promptly address any issues that arise. Implement and enforce Mimecast policies, including email filtering rules, security settings, and archiving policies. Collaborate with the IT team to integrate Mimecast with existing email systems and ensure seamless email flow. 2. Email Security and Threat Management: Maintain a strong understanding of email security best practices and emerging threats. Monitor and analyze email security logs and reports to identify and mitigate potential risks. Respond to email security incidents, investigate and resolve email-based threats, such as spam, phishing, and malware. Stay updated with Mimecast product releases, patches, and updates, and proactively apply them to enhance email security. 3. User Support and Training: Provide technical support and assistance to end-users regarding Proofpoint features, functionalities, and troubleshooting. Conduct user training sessions and create documentation to educate users on Mimecast usage, best practices, and self-service options. Collaborate with the help desk team to address Mimecast-related support tickets and ensure timely resolution. 4. Reporting and Documentation: Generate regular reports on Mimecast performance, email security metrics, and archiving status. Maintain accurate documentation of Mimecast configurations, policies, and procedures. Keep abreast of industry trends and developments in email security and archiving and make recommendations for improvements. Requirements: Bachelor's degree in a relevant field or equivalent work experience. Strong experience in administering Proofpoint or similar email security and archiving platforms. Proficient understanding of email protocols, DNS, S

Posted 2 weeks ago

Apply

5.0 - 7.0 years

10 - 12 Lacs

Chennai

Work from Office

Job Title: Security Analyst DLP & Alert Management Maintain Proofpoint DLP security operations by reviewing alerts, manage false-positives and coordinate with SOC for incident response. Monitor policies in CASB and cloud native security tools , make recommendations to improve cloud security posture. Improve DLP program by reviewing alerts, monitoring policies and make recommendations to improve data protection security posture. Required Skills: 5-7 years of total experience in Cybersecurity , with DLP and alert management . Strong hands-on experience with Proofpoint DLP , CASB solutions , and cloud security tools . In-depth understanding of incident response processes and threat alert handling. Excellent communication and collaboration skills . Shift- 2.00pm to 11.00pm IST Location- Chennai Notice- Immediate Joiners preferred.

Posted 3 weeks ago

Apply

3.0 - 8.0 years

13 - 17 Lacs

Bengaluru

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and transitioning to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, all while adapting to the evolving landscape of cloud security challenges. Roles & Responsibilities:-Monitor, analyze security alerts from SIEM platforms and other threat detection systems to identify potential security incidents by following established processes.-Design and optimize complex search queries; create and maintain custom dashboards, alerts, and reports to improve visibility and detection capabilities.-Collaborate with IT, infrastructure, and application teams to manage and resolve security incidents effectively.-Lead and participate in security incident response activities, ensuring accurate documentation and closure of incidents.-Improve SOC operations by enhancing processes, developing playbooks, and updating standard operating procedures (SOPs).-Mentor and support junior analysts by providing guidance and resolving escalated alerts.-Conduct deep-dive investigations into advanced or persistent threats and track incidents through to resolution.-Actively participate in and lead client meetings, providing technical input and updates on ongoing incidents or improvements.-Identify and reduce false positives through alert fine-tuning and continuous rule optimization.-Apply knowledge of threat models, threat intelligence, and attacker techniques (e.g., MITRE ATT&CK) to enhance detection strategies.-Administer core SIEM components, including deployment servers and indexers, ensuring high availability and performance.-Contribute to building and enhancing detection content, such as correlation rules and threat detection logic. Professional & Technical Skills: -Experience working as SOC analyst.- Strong Understanding of tools like SIEM, CrowdStrike, MS Defender, Proofpoint, Azure, IDS/IPS.- Strong Understanding of TCP/IP, DNS, DHCP, HTTP/HTTPs, VPN- Basic understanding of Windows/Linux command line tools.- Log analysis from operating systems, firewalls, etc.- SIEM/SOC operations experience for very large enterprises.- Knowledge on MITRE/CKC framework. Additional Information:- The candidate should have minimum 3 years of experience in Security Information and Event Management (SIEM).- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 3 weeks ago

Apply

15.0 - 20.0 years

13 - 17 Lacs

Bengaluru

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and facilitating the transition to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, all while adapting to the evolving landscape of cloud security challenges. Roles & Responsibilities:-Monitor, analyze security alerts from SIEM platforms and other threat detection systems to identify potential security incidents by following established processes.-Collaborate with IT, infrastructure, and application teams to manage and resolve security incidents effectively.-Participate in security incident response activities, ensuring accurate documentation and closure of incidents.-Improve SOC operations by enhancing processes and updating standard operating procedures (SOPs).-Actively participate in client meetings, providing technical input and updates on ongoing incidents or improvements.-Identify false positives through alert fine-tuning and continuous rule optimization.-Apply knowledge of threat intelligence, and attacker techniques (e.g., MITRE ATT&CK) to enhance detection strategies.-Contribute to enhancing detection content, such as correlation rules and threat detection logic. Professional & Technical Skills: - Experience working as SOC analyst.- Good Understanding of tools like SIEM, CrowdStrike, MS Defender, Proofpoint, Azure, IDS/IPS.- Strong Understanding of TCP/IP, DNS, DHCP, HTTP/HTTPs, VPN- Basic understanding of Windows/Linux command line tools.- Log analysis from operating systems, firewalls, etc.- SIEM/SOC operations experience for very large enterprises.- Knowledge on MITRE/CKC framework. Additional Information:- The candidate should have minimum 2 years of experience in Security Information and Event Management (SIEM).- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 3 weeks ago

Apply

2.0 - 6.0 years

1 - 5 Lacs

Bengaluru

Work from Office

Roles and Responsibilities : Conduct regular audits to identify potential data loss risks and develop strategies to mitigate them. Collaborate with IT teams to implement DLP solutions, ensuring compliance with industry regulations. Develop and maintain proof points for data protection policies, procedures, and controls. Provide training on data loss prevention best practices to employees across the organization. Job Requirements : 2-6 years of experience in Data Loss Prevention (DLP) or related field. Strong understanding of email security, ServiceNow, and other relevant technologies. Proven track record in conducting audits and developing effective risk management plans.

Posted 3 weeks ago

Apply

12.0 - 15.0 years

15 - 20 Lacs

Chennai

Work from Office

The Lead Analyst, Cybersecurity Operations will be part of the Cybersecurity team that analyzes, implements, monitors, troubleshoots, and audits the cybersecurity of the Frontier network infrastructure. The analyst provides timely and comprehensive intelligence on internal/external threats for detection, monitoring, threat hunting, and incident response. The scope of environment includes system-monitoring platforms, anti-virus, DLP, URL filtering, and PCI environments. The analyst will be responsible for performing alert analysis, incident response, digital forensics, and supporting penetration remediation on applications/systems. Essential Functions Monitor, investigate, analyze, respond, and report to cyber incidents identified through detection/response platforms. Lead support to Management in detecting and responding to cybersecurity alerts and incident activity. Responsible for engaging and escalating incidents to Cyber Operations Management and other Cyber Incident Response Team members. Actively support incident response activities, efforts, and training exercises (e.g., incidents, tabletops, threat simulations) and be the lead incident response analyst. Actively drive risk reduction efforts for known cyber security vulnerabilities and known attack traffic patterns/indicators of compromise (IOC). Actively monitor security threats and risks, provide in-depth incident analysis, evaluate security incidents, provide proactive threat research, and recommend mitigation strategies. Evaluate and determine if/when cybersecurity violations have occurred through examination of network/application logs, open-source research, vulnerability and configuration scan data, and user provided reports. Proactively conduct investigations, analysis, and evaluation of projects to determine cybersecurity risk and feasibility as required. Administer, maintain, tune, and perform heath checks on cybersecurity products and services (such as: secure mail gateway, SIEM, IDS/IPS, EDR, vulnerability management, brand monitoring, threat intelligence, security rating, DDoS, web proxy, file integrity monitoring (FIM), data loss prevention (DLP), User Entity Behavioral Analytics (UEBA), and other). Provide and implement recommendations for new technical controls to help mitigate security vulnerabilities. Responsible for leading the vulnerability management program functions including hosting weekly meetings with Stakeholders and the operations team, creating and tracking tickets for all vulnerabilities, holding stakeholder teams to meet SLAs, and reporting to the Manager of Cybersecurity on a weekly basis. Actively perform threat hunting activities in the environment to detect cyber threats in the network. Coordinate and support purple, red, and blue team engagements. Provide cybersecurity technical assistance when needed by system/application owners. Support multiple day-to-day cybersecurity tasks and projects efforts. Provide regular status updates to Management on projects and remediation efforts. Solid understanding of cybersecurity policies and procedures, ability to draft, modify and create standard operating procedures (SOPs) for use of other team members. Support organizational Security Awareness Training efforts (suggest training topics, coordinate phishing campaigns, enable awareness to end-users in support of incidents). Support vulnerability assessments functions (such as: enterprise pen testing, application pen testing, static/dynamic testing, scorecard assessments). Participate and support afterhours/on-call rotation requirements for cybersecurity incidents. Responsible for developing, monitoring, and tracking cyber security metrics on a recurring basis, including creating Powerpoint slide decks for presentations. Coordinate response and remediation efforts across various departments in a cooperative and beneficial manner. Responsible for maintaining Incident Response documentation and auditing member contact information on at least a semi-annual basis or as needed. Responsible for attending all vendor meetings and acts as the point of contact for our Cybersecurity vendors. Demonstrate ownership and understanding of tasks when engaging with other team members. Provide leadership, guidance and partnership to Analyst(s) and Senior Analyst(s). Responsible for the onboarding and training of new analysts to the Cybersecurity Operations team. Provide support to management team. Qualifications Bachelors degree in computer science, technology, or equivalent combination of education and relevant experience (required). 6+ years of relevant IT/Cybersecurity experience (required). 5+ years in security operations with hands-on experience with enterprise cybersecurity products, such as Qualys, SentinelOne, Proofpoint, Office365, Microsoft Defender for Cloud, Microsoft Defender for Identity (required). 5+ years of SIEM (security information and event management) platform experience (required). 4+ years supporting adversary tactics and techniques based on MITRE attack framework (required). Knowledge of cyber security standards and frameworks such as ISO 27001, NIST CSF, NIST-800- 53, PCI DSS ASV (highly desired). Hands-on experience with tools like PowerShell, Vulnerability Management suite, Wireshark, and NMAP (required). Position Description Industry cybersecurity certification: CompTIA: Security+ or Pentest+, CEH, CISSP, OCSP, SANS: GCIH or GSEC, CISSP, ISACA: CISA or CISM, Security+, SSCP, or CCNA (required, or willing to attain within 3 months of start date). Hands-on Cloud infrastructure (Azure/AWS/GCP) cybersecurity remediation experience (desirable). Hands-on experience with next-gen endpoint detection/response (EDR), Enterprise Firewall, IPS, Log Management, Cisco, and Checkpoint experience (desirable). URL Filtering (web proxy) and troubleshooting experience (desirable). Solid

Posted 1 month ago

Apply

3.0 - 7.0 years

3 - 8 Lacs

Noida

Work from Office

Deep knowledge of the email stack Have 3+ years of email systems experience: SMTP, POP, DNS, SPF, DKIM, DMARC, RBL, CAN-SPAM Knowledge of email deliverability, IP reputation, blocklists Experience with deployment and in structure management tools Exp with cloud-first monitoring, logging, and alerting infrastructure that support 24/7 enterprise platforms. Like working on small, autonomous agile teams Knowledge of advanced email features Experience 3 - 7 Years Industry IT Software - Others Qualification Other Bachelor Degree Key Skills SMTP DNS POP IP Email Engineer Verp Email Support Executive Email Support

Posted 1 month ago

Apply

15.0 - 20.0 years

3 - 7 Lacs

Coimbatore

Work from Office

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Data Loss Prevention (DLP) Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. A typical day involves collaborating with various teams to implement security measures, conducting assessments to identify vulnerabilities, and ensuring that all systems are fortified against potential cyber threats. You will also engage in continuous monitoring and improvement of security protocols to safeguard sensitive information and maintain compliance with industry standards. Roles & Responsibilities:- Expected to be an SME in DLP and Data masking solution implementation and support.- Collaborate and manage the team to perform.- Demonstrates excellent problem-solving skills and the ability to collaborate effectively with diverse stakeholders- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Conduct regular security assessments and audits to identify vulnerabilities and recommend improvements.- Develop and implement security policies and procedures to ensure compliance with industry standards. Professional & Technical Skills: - Must Have Skills: Proficiency in Proofpoint and Microsoft Purview Data Loss Prevention (DLP) tools, Varonis Data Discovery and Data masking.- Creation of DLP detection and prevention policies- DLP agents compliance and incident monitoring- DLP agent upgradation- Design and implementation of Data masking solution across enterprise-wide applications- Perform Sensitive Data Discovery and analysis across enterprise data repositories- Create Technical documentation and installation/administration manuals- Strong understanding of risk management and mitigation strategies.- Experience with security frameworks and compliance standards such as ISO 27001, NIST, or GDPR, HIPAA, HiTrust- Familiarity with incident response and threat intelligence processes.- Knowledge of network security protocols and technologies. Additional Information:- The candidate should have minimum 8 years of experience in Data Loss Prevention (DLP) and Data Discovery- Good to have experience in Health care industry - Certifications on Proofpoint, Varonis is preferred.- This position is based in Coimbatore.- Willing to work in US shifts including support in late IST hours. Willing to work in office adhering to current HR policies.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 month ago

Apply

15.0 - 20.0 years

3 - 7 Lacs

Chennai

Work from Office

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Data Loss Prevention (DLP) Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. A typical day involves collaborating with various teams to implement security measures, conducting assessments to identify vulnerabilities, and ensuring that all systems are fortified against potential cyber threats. You will also engage in continuous monitoring and improvement of security protocols to safeguard sensitive information and maintain compliance with industry standards. Roles & Responsibilities:- Expected to be an SME in DLP and Data masking solution implementation and support.- Collaborate and manage the team to perform.- Demonstrates excellent problem-solving skills and the ability to collaborate effectively with diverse stakeholders- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Conduct regular security assessments and audits to identify vulnerabilities and recommend improvements.- Develop and implement security policies and procedures to ensure compliance with industry standards. Professional & Technical Skills: - Must Have Skills: Proficiency in Proofpoint and Microsoft Purview Data Loss Prevention (DLP) tools, Varonis Data Discovery and Data masking.- Creation of DLP detection and prevention policies- DLP agents compliance and incident monitoring- DLP agent upgradation- Design and implementation of Data masking solution across enterprise-wide applications- Perform Sensitive Data Discovery and analysis across enterprise data repositories- Create Technical documentation and installation/administration manuals- Strong understanding of risk management and mitigation strategies.- Experience with security frameworks and compliance standards such as ISO 27001, NIST, or GDPR, HIPAA, HiTrust- Familiarity with incident response and threat intelligence processes.- Knowledge of network security protocols and technologies. Additional Information:- The candidate should have minimum 8 years of experience in Data Loss Prevention (DLP) and Data Discovery- Good to have experience in Health care industry - Certifications on Proofpoint, Varonis is preferred.- This position is based in Coimbatore.- Willing to work in US shifts including support in late IST hours. Willing to work in office adhering to current HR policies.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 month ago

Apply

4.0 - 5.0 years

6 - 7 Lacs

Hyderabad

Work from Office

Lead the management of major incidents in IT environments, ensuring swift resolution, effective communication, and detailed root cause analysis. Focus on OWA, M365, and troubleshooting strategies.

Posted 1 month ago

Apply

5.0 - 10.0 years

15 - 25 Lacs

Hyderabad, Chennai

Hybrid

JD 1. Hands-on experience on Insider Threat/Risk Tools like Microsoft Purview Insider Risk Management or its competitors (like Proofpoint Insider Threat Management, Splunk User Behavior Analytics, Securonix UEBA, QRadar User Behavior Analytics) 2. Experience in triaging Insider Threat/Risk alerts 3. Working in the Insider Threat team of the Security department. 4. Experience producing Insider Threat reports for C-level leaders. 5. Experience in setting up IRM policies and monitoring them. 6. Understanding of AI, Large Language models, prompt engineering is a plus.

Posted 1 month ago

Apply

7.0 - 12.0 years

14 - 18 Lacs

Noida, Pune, Bengaluru

Work from Office

Role : Technical Services Engineer Expert(Email Security & Exchange Online) Exp :7+years Shift : 11:30 AM to 8:30 PM IST Mode : Hybrid Job Location : Bangalore, Chennai, Hyderabad, Noida, Pune Kindly upload your CV to complete your application process: https://www.jobs.global.fujitsu.com/job/Technical-Services-Engineer-Expert%28Email-Security-&-MS-Defender-for-O365-&-EXO%29/1763-en_US/ Job Description: Occupy at least 7+years of experience in Exchange Online & defender for O365. Must possess strong technical knowledge of Email security Have exposure on office 365 and Email security feature. Strong experience on Advanced Threat Protection as Spoofing, Phishing, Malware preventions. Strong understanding of email delivery architecture, email gateway and DNS technologies. Strong understanding of SMTP, Mail relay services. Experience with email security solutions in large, distributed environments. Experience working with email threat prevention platforms in complex email delivery systems. In depth knowledge of MX, DMARC, DKIM, and SPF is mandatory Strong knowledge on Cloud based Email Filtering Services. Basic Cloud architecture experience. In depth knowledge of email messaging systems system administration in email gateways. Real-time Malware detection, remediation, and quarantine. Accountable for setting a standardized framework (tags, policies, configuration settings, etc.) Basic knowledge on DNS reputation policy handling. Check for periodically reports & take necessary action. Inspection Email Header and configuration and troubleshooting. Configuring and creating workflows on email security Platform. Make this pointer wise.

Posted 2 months ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead for Proofpoint Implementation, you will spearhead the end-to-end delivery of Proofpoint solutions across enterprise environments. You will lead technical planning, solution design, and hands-on implementation of email security controls, ensuring seamless integration with client infrastructure. This role demands close collaboration with cross-functional teams and stakeholders to drive the successful execution of build-phase activities aligned with cybersecurity goals. Roles & Responsibilities:-Serve as the Subject Matter Expert (SME) for Proofpoint architecture and implementation.-Drive end-to-end delivery of Proofpoint deployment projects, from requirements gathering to go-live.-Collaborate with solution architects and engineering teams to define and validate implementation blueprints.-Lead design sessions and actively contribute to solution architecture decisions.-Ensure configurations align with security and compliance standards.-Guide and mentor junior engineers on deployment best practices.-Prepare implementation documents, HLD/LLDs, and provide input into transition plans for support handoff.-Track project milestones, identify risks, and implement mitigation strategies to meet delivery timelines. Professional & Technical Skills: -Experience in Proofpoint solution delivery.-Experience with modules such as TAP, TRAP, Email protection, and Threat Response is preferred. Additional Information:- The candidate should have minimum 7.5 years of experience- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 months ago

Apply

8.0 - 13.0 years

15 - 30 Lacs

Bengaluru

Work from Office

Strong expertise in AWS Security Services, XDR, CrowdStrike, Zscaler, Proofpoint, Defender, WAF, API Security. Knowledge of network security, IAM, SIEM, & automation tools. Certifications as CISSP, CHFI, GCIH, AWS Security Specialty are preferred.

Posted 2 months ago

Apply

7.0 - 10.0 years

9 - 12 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Req ID: 126276 Remote Position: Hybrid Region: Asia Country: India State/Province: Chennai City: Guindy, Chennai Summary Manages a team of resources focused on the design, delivery, support and optimization of Celestica's IT infrastructure, including network, computing, storage, telecommunication, and mobile devices The Manager, IT Infrastructure collaborates with business and IT partners to plan and deliver strategic projects, enhancement work and baseline requests according to established service levels, budgets, and compliance standards The Manager, IT Infrastructure has a solid understanding of the IT operations framework and solution lifecycle, and extensive hands-on experience with infrastructure technologies The Manager, IT Infrastructure also fosters a service management culture rooted in continuous improvement, and focuses on building organizational strength by leading change and leveraging Celestica's HR processes, Detailed Description Performs tasks such as, but not limited to, the following: Leading the change management activities within a structured process framework, Designing the strategic approach to managing change and support operations that fall within the domain of change management, Evaluating the change impact and organizational readiness to limit potential risk, Supporting training and communication as part of change management Activities may include designing or delivering specialized training resources to appropriate user base, Evaluating the risk of change and providing actionable guidelines on reducing the impact, Evaluating resistance in adopting the change at the user, process, and technology level, Managing the change portfolio, which allows the organization to prepare for and successfully adopt the change, Authorize minor change requests and coordinate with the Change Advisory Board for changes presenting higher risk, Conduct post-implementation reviews to assess the decisions and performance related to the change request, The change process owner can have overlapping responsibilities with the ITIL Process Owner, specifically within the function of change management The change process owner is responsible for defining and supporting the overall process involved in change management, Supporting the change manager in decisions for major changes, Evaluating Requests for Change (RFCs), the available resources, impact of change, and organizational readiness, Validating that appropriate tests and evaluation are performed before high-risk changes are approved, Documenting relevant processes and activities, Supporting the design of change implementation scheduling, Reviewing a change implementation process, Supporting the design and approving new change process models, Using the diverse knowledgebase, skills, and expertise of each CAB member to provide a unique perspective before a decision is finalized, Knowledge/Skills/Competencies ServiceNow platform experience with a focus on ITSM, ITAM and ITOM Specific experience evaluating, recommending and implementing infrastructure solutions, Knowledge of the following technologies with specific experience with at least one vendor under each domain: Compute (Cisco, Dell, HP, IBM including blade servers) Collaboration (Cisco, IBM, Microsoft), database (Oracle, SQL Server, DB2) III Data protection (CA Technologies Arcserve, IBM Tivoli Storage Manager NetApp Syncsort, Symantec Backup Exec & NetBackup) Mobile device management (Airwatch, BoxTone, Fiberlink MaaS360, Zenprise/XenMobile) Networking (Brocade, Cisco, Juniper, Palo Alto Networks, Proofpoint) VII Operating systems (Windows for desktops, Windows Server, HPUX, Linux) VIII Storage (EMC, Hitachi Data Systems, IBM, NetApp) Virtualization (Citrix, Microsoft Hyper-V, VMware) Experience evaluating or implementing public and private cloud solutions, Experience in scoping, planning and managing complex and concurrent technical activities supported by a strong understanding of IT project management, Experience with business requirements gathering and analysis, Understanding of information processing principles and practices, Experience with the Information Technology Infrastructure Library (ITIL) and IT Service Management ITIL Foundations v3 certification a plus, Physical Demands Duties of this position are performed in a normal office environment, Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data Repetitive manual movements (e-g , data entry, using a computer mouse, using a calculator, etc ) are frequently required, Typical Experience Eight Plus Years working in the IT industry, Typical Education Bachelors Degree in Computer Science, Information Technology, Engineering or Business Administration, ITIL Certification Personal Attributes Proven ability to translate business requirements into technical solutions, Strong analytical and problem-solving skills; resourceful and capable of working in the abstract, with the ability to understand multiple facets of complex technologies, Experience leading the deployment of complex solutions involving multiple vendor technologies, Effective facilitator of technical decisions; comfortable with working through ambiguous initiatives to develop effective solutions, Excellent written, presentation, and verbal communication skills with experience communicating complex, technical concepts to all levels, Solid relationship management skills interacting horizontally and vertically across organizations, Ability to effectively prioritize and execute tasks in high-pressure environment, Exceptional customer service orientation, Notes This job description is not intended to be an exhaustive list of all duties and responsibilities of the position Employees are held accountable for all duties of the job Job duties and the % of time identified for any function are subject to change at any time, Celestica is an equal opportunity employer All qualified applicants will receive consideration for employment and will not be discriminated against on any protected status (including race, religion, national origin, gender, sexual orientation, age, marital status, veteran or disability status or other characteristics protected by law), At Celestica we are committed to fostering an inclusive, accessible environment, where all employees and customers feel valued, respected and supported Special arrangements can be made for candidates who need it throughout the hiring process Please indicate your needs and we will work with you to meet them, Company Overview Celestica (NYSE, TSX: CLS) enables the worlds best brands Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers, Celestica would like to thank all applicants, however, only qualified applicants will be contacted, Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services,

Posted 2 months ago

Apply

3.0 - 7.0 years

2 - 6 Lacs

Bengaluru

Work from Office

Drive projects and initiatives to improve and expand existing DLP platform capabilities. Implement and manage DLP solutions, including data labeling technologies. Work directly with stakeholders to define requirements and develop security solutions. Ensure the security of endpoint devices, including data protection and behavior analysis. Deploy and manage endpoint DLP solutions, such as those offered by Proofpoint. Manage email security policies and configurations, including DLP for email. Detect and prevent data loss through email channels, such as by identifying sensitive content and usebehavior. Gain deep knowledge of the Proofpoint platform, including its various modules (e.g., Endpoint DLP, Email DLP) Be proficient in using the Proofpoint console to manage alerts, investigate incidents, and analyze user behavior. Primary Skills DLP Endpoint Security Email Security Secondary Skills Data Labeling Behavior Analysis Incident Response

Posted 2 months ago

Apply

2 - 7 years

0 - 1 Lacs

Noida

Work from Office

Role & responsibilities Mini. 2 years of experience implementation & operations. The resource should have implemented at least 4-5 projects in customer environment. Should be able to create HLD & LLD documents and should be able to draw architecture as per customer need Working Knowledge of SOC/ SIEM tools and operational understanding Must have lead team of Security Cons ultants/ Analysts Should have sound knowledge of products & should be able to carry out the POCs, Implementation and Operations support Should lead the delivery of multiple projects at customer locations Should have knowledge of following products (with Operations and Implementation) DLP/ Proxy Forcepoint, Symantec, Cisco, McAfee , Zscaler Email Security – Symantec, Forcepoint, Cisco NAC Solutions – Cisco ISE, Forcescout EDR/ XDR Solution – Trend Micro, Crowdstrike SOC SIEM Solution (Arcsight, Qradar, RSA or Seceon) ( Must have hands-on experience from any two of above) Excellent English communication skills mandatory Excellent documentation skills mandatory Understand reporting capabilities Preferred candidate profile Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host based firewalls, Anti-Malware, HIDS General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows NT Good to have industry certifications on SIEM Platform, CCNA, CEH, MCSE & Others Bachelor’s Degree in Computer Science or equivalent required 5-10 years’ experience in IT security Good communication skills Strong level of customer service required

Posted 2 months ago

Apply

4 - 8 years

7 - 9 Lacs

Bengaluru

Work from Office

Job Summary We are seeking a skilled IT professional with hands-on experience in managing Google Workspace, securing email infrastructure, and handling endpoint/user device management. The ideal candidate will be responsible for ensuring smooth collaboration through Google Workspace, protecting email systems from threats, and maintaining secure and compliant end-user computing environments. Skill Set 4 - 8 years of experience in IT systems administration or similar role. Proven experience managing Google Workspace for a mid-to-large user base. Solid understanding of email security protocols (SPF, DKIM, DMARC). Experience with email security platforms and endpoint management tools. Strong troubleshooting skills and familiarity with ITIL-based service management. Excellent communication and documentation skills . Roles and Responsibilities Google Workspace Administration Manage user accounts, groups, and organizational units. Implement and maintain Google Workspace security and compliance settings (DLP, Vault, SSO, etc.). Automate routine administration tasks using GAM or Google Admin SDK. Email Security & Compliance Deploy and manage email security tools (e.g., Mimecast, Proofpoint, Google Advanced Protection). Monitor and respond to email-based threats such as phishing, spoofing, and malware. Define and enforce SPF, DKIM, DMARC policies. Collaborate with the InfoSec team for email compliance and retention policies. Endpoint/User Device Management Manage and monitor endpoints across operating systems (Windows, macOS, ChromeOS). Deploy and manage MDM/EMM solutions (e.g., Google Endpoint Management, Intune, Jamf). Enforce device compliance policies, encryption, and remote wipe capabilities. Provide Tier 2/3 support for device-related issues. Operational & Security Hygiene Maintain IT asset inventory and ensure timely patching and updates. Document system configurations, procedures, and support materials. Participate in incident response and root cause analysis for device and email-related incidents.

Posted 2 months ago

Apply

4 - 9 years

5 - 15 Lacs

Hyderabad, Pune

Work from Office

Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response : Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation : Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis : Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography : Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security : Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting : Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance : Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs) : Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools : Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms : Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions : Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools : Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies