Jobs
Interviews

32 Proof Point Jobs - Page 2

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 13.0 years

15 - 30 Lacs

Bengaluru

Work from Office

Strong expertise in AWS Security Services, XDR, CrowdStrike, Zscaler, Proofpoint, Defender, WAF, API Security. Knowledge of network security, IAM, SIEM, & automation tools. Certifications as CISSP, CHFI, GCIH, AWS Security Specialty are preferred.

Posted 3 months ago

Apply

7.0 - 10.0 years

9 - 12 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Req ID: 126276 Remote Position: Hybrid Region: Asia Country: India State/Province: Chennai City: Guindy, Chennai Summary Manages a team of resources focused on the design, delivery, support and optimization of Celestica's IT infrastructure, including network, computing, storage, telecommunication, and mobile devices The Manager, IT Infrastructure collaborates with business and IT partners to plan and deliver strategic projects, enhancement work and baseline requests according to established service levels, budgets, and compliance standards The Manager, IT Infrastructure has a solid understanding of the IT operations framework and solution lifecycle, and extensive hands-on experience with infrastructure technologies The Manager, IT Infrastructure also fosters a service management culture rooted in continuous improvement, and focuses on building organizational strength by leading change and leveraging Celestica's HR processes, Detailed Description Performs tasks such as, but not limited to, the following: Leading the change management activities within a structured process framework, Designing the strategic approach to managing change and support operations that fall within the domain of change management, Evaluating the change impact and organizational readiness to limit potential risk, Supporting training and communication as part of change management Activities may include designing or delivering specialized training resources to appropriate user base, Evaluating the risk of change and providing actionable guidelines on reducing the impact, Evaluating resistance in adopting the change at the user, process, and technology level, Managing the change portfolio, which allows the organization to prepare for and successfully adopt the change, Authorize minor change requests and coordinate with the Change Advisory Board for changes presenting higher risk, Conduct post-implementation reviews to assess the decisions and performance related to the change request, The change process owner can have overlapping responsibilities with the ITIL Process Owner, specifically within the function of change management The change process owner is responsible for defining and supporting the overall process involved in change management, Supporting the change manager in decisions for major changes, Evaluating Requests for Change (RFCs), the available resources, impact of change, and organizational readiness, Validating that appropriate tests and evaluation are performed before high-risk changes are approved, Documenting relevant processes and activities, Supporting the design of change implementation scheduling, Reviewing a change implementation process, Supporting the design and approving new change process models, Using the diverse knowledgebase, skills, and expertise of each CAB member to provide a unique perspective before a decision is finalized, Knowledge/Skills/Competencies ServiceNow platform experience with a focus on ITSM, ITAM and ITOM Specific experience evaluating, recommending and implementing infrastructure solutions, Knowledge of the following technologies with specific experience with at least one vendor under each domain: Compute (Cisco, Dell, HP, IBM including blade servers) Collaboration (Cisco, IBM, Microsoft), database (Oracle, SQL Server, DB2) III Data protection (CA Technologies Arcserve, IBM Tivoli Storage Manager NetApp Syncsort, Symantec Backup Exec & NetBackup) Mobile device management (Airwatch, BoxTone, Fiberlink MaaS360, Zenprise/XenMobile) Networking (Brocade, Cisco, Juniper, Palo Alto Networks, Proofpoint) VII Operating systems (Windows for desktops, Windows Server, HPUX, Linux) VIII Storage (EMC, Hitachi Data Systems, IBM, NetApp) Virtualization (Citrix, Microsoft Hyper-V, VMware) Experience evaluating or implementing public and private cloud solutions, Experience in scoping, planning and managing complex and concurrent technical activities supported by a strong understanding of IT project management, Experience with business requirements gathering and analysis, Understanding of information processing principles and practices, Experience with the Information Technology Infrastructure Library (ITIL) and IT Service Management ITIL Foundations v3 certification a plus, Physical Demands Duties of this position are performed in a normal office environment, Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data Repetitive manual movements (e-g , data entry, using a computer mouse, using a calculator, etc ) are frequently required, Typical Experience Eight Plus Years working in the IT industry, Typical Education Bachelors Degree in Computer Science, Information Technology, Engineering or Business Administration, ITIL Certification Personal Attributes Proven ability to translate business requirements into technical solutions, Strong analytical and problem-solving skills; resourceful and capable of working in the abstract, with the ability to understand multiple facets of complex technologies, Experience leading the deployment of complex solutions involving multiple vendor technologies, Effective facilitator of technical decisions; comfortable with working through ambiguous initiatives to develop effective solutions, Excellent written, presentation, and verbal communication skills with experience communicating complex, technical concepts to all levels, Solid relationship management skills interacting horizontally and vertically across organizations, Ability to effectively prioritize and execute tasks in high-pressure environment, Exceptional customer service orientation, Notes This job description is not intended to be an exhaustive list of all duties and responsibilities of the position Employees are held accountable for all duties of the job Job duties and the % of time identified for any function are subject to change at any time, Celestica is an equal opportunity employer All qualified applicants will receive consideration for employment and will not be discriminated against on any protected status (including race, religion, national origin, gender, sexual orientation, age, marital status, veteran or disability status or other characteristics protected by law), At Celestica we are committed to fostering an inclusive, accessible environment, where all employees and customers feel valued, respected and supported Special arrangements can be made for candidates who need it throughout the hiring process Please indicate your needs and we will work with you to meet them, Company Overview Celestica (NYSE, TSX: CLS) enables the worlds best brands Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers, Celestica would like to thank all applicants, however, only qualified applicants will be contacted, Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services,

Posted 3 months ago

Apply

3.0 - 7.0 years

2 - 6 Lacs

Bengaluru

Work from Office

Drive projects and initiatives to improve and expand existing DLP platform capabilities. Implement and manage DLP solutions, including data labeling technologies. Work directly with stakeholders to define requirements and develop security solutions. Ensure the security of endpoint devices, including data protection and behavior analysis. Deploy and manage endpoint DLP solutions, such as those offered by Proofpoint. Manage email security policies and configurations, including DLP for email. Detect and prevent data loss through email channels, such as by identifying sensitive content and usebehavior. Gain deep knowledge of the Proofpoint platform, including its various modules (e.g., Endpoint DLP, Email DLP) Be proficient in using the Proofpoint console to manage alerts, investigate incidents, and analyze user behavior. Primary Skills DLP Endpoint Security Email Security Secondary Skills Data Labeling Behavior Analysis Incident Response

Posted 3 months ago

Apply

2 - 7 years

0 - 1 Lacs

Noida

Work from Office

Role & responsibilities Mini. 2 years of experience implementation & operations. The resource should have implemented at least 4-5 projects in customer environment. Should be able to create HLD & LLD documents and should be able to draw architecture as per customer need Working Knowledge of SOC/ SIEM tools and operational understanding Must have lead team of Security Cons ultants/ Analysts Should have sound knowledge of products & should be able to carry out the POCs, Implementation and Operations support Should lead the delivery of multiple projects at customer locations Should have knowledge of following products (with Operations and Implementation) DLP/ Proxy Forcepoint, Symantec, Cisco, McAfee , Zscaler Email Security – Symantec, Forcepoint, Cisco NAC Solutions – Cisco ISE, Forcescout EDR/ XDR Solution – Trend Micro, Crowdstrike SOC SIEM Solution (Arcsight, Qradar, RSA or Seceon) ( Must have hands-on experience from any two of above) Excellent English communication skills mandatory Excellent documentation skills mandatory Understand reporting capabilities Preferred candidate profile Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host based firewalls, Anti-Malware, HIDS General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows NT Good to have industry certifications on SIEM Platform, CCNA, CEH, MCSE & Others Bachelor’s Degree in Computer Science or equivalent required 5-10 years’ experience in IT security Good communication skills Strong level of customer service required

Posted 4 months ago

Apply

4 - 8 years

7 - 9 Lacs

Bengaluru

Work from Office

Job Summary We are seeking a skilled IT professional with hands-on experience in managing Google Workspace, securing email infrastructure, and handling endpoint/user device management. The ideal candidate will be responsible for ensuring smooth collaboration through Google Workspace, protecting email systems from threats, and maintaining secure and compliant end-user computing environments. Skill Set 4 - 8 years of experience in IT systems administration or similar role. Proven experience managing Google Workspace for a mid-to-large user base. Solid understanding of email security protocols (SPF, DKIM, DMARC). Experience with email security platforms and endpoint management tools. Strong troubleshooting skills and familiarity with ITIL-based service management. Excellent communication and documentation skills . Roles and Responsibilities Google Workspace Administration Manage user accounts, groups, and organizational units. Implement and maintain Google Workspace security and compliance settings (DLP, Vault, SSO, etc.). Automate routine administration tasks using GAM or Google Admin SDK. Email Security & Compliance Deploy and manage email security tools (e.g., Mimecast, Proofpoint, Google Advanced Protection). Monitor and respond to email-based threats such as phishing, spoofing, and malware. Define and enforce SPF, DKIM, DMARC policies. Collaborate with the InfoSec team for email compliance and retention policies. Endpoint/User Device Management Manage and monitor endpoints across operating systems (Windows, macOS, ChromeOS). Deploy and manage MDM/EMM solutions (e.g., Google Endpoint Management, Intune, Jamf). Enforce device compliance policies, encryption, and remote wipe capabilities. Provide Tier 2/3 support for device-related issues. Operational & Security Hygiene Maintain IT asset inventory and ensure timely patching and updates. Document system configurations, procedures, and support materials. Participate in incident response and root cause analysis for device and email-related incidents.

Posted 4 months ago

Apply

4 - 9 years

5 - 15 Lacs

Hyderabad, Pune

Work from Office

Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response : Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation : Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis : Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography : Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security : Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting : Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance : Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs) : Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools : Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms : Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions : Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools : Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools

Posted 4 months ago

Apply

20.0 - 25.0 years

10 - 15 Lacs

gurugram, bengaluru

Work from Office

What were looking for To support our continued success and deliver a Fanatical Experience to our customers, Rackspace Cyber Defence is looking for an Indian based Security Operations Analyst(L2) to support Rackspaces strategic customers. This role is particularly well-suited to a self-starting, experienced and motivated Sec Ops Analyst, who has a proven record of accomplishment in the cloud security monitoring and incident detection domain. As a Security Operations Analyst(L2), you will be responsible for detecting, analysing, and responding to threats posed across customer on-premises, private cloud, public cloud, and multi-cloud environments. The primary focus will be on triaging alerts and events (incident detection), which may indicate malicious activity, and determining if threats are real or not. You will also be required to liaise closely with the customers key stakeholders, which may include incident response and disaster recovery teams as well as information security. Key Accountabilities Should have experience of 4-7years in SOC. Ensure the Customers operational and production environment remains secure at all the times and any threats are raised and addressed in a timely manner. Critical incident analysis & validation Platform management tasks like checking the health status and basic troubleshooting. Create new runbooks, playbooks and knowledgebase documents. Trend monitoring & analysis Threat and vulnerability impact analysis Reactive discovery of adversaries based on threat advisory or intelligence reports. Compliance reporting Onboarding of log sources Rule and dashboard enhancements Basic threat hunting Created and manage the watchlists. Handling escalations from L1 Analysts Review the L1 handled Incident and prepare individual scorecards. Prepare and review the weekly and monthly reports. Co-ordinate with vendor for issue resolution Use of threat intelligence platforms such as OSINT, to understand latest threats. Researching and analysing the latest threats to better understand an adversarys tactics, techniques, and procedures (TTPs). Automation of security processes and procedures to enhance and streamline monitoring capabilities. Ensure all Zero Day vulnerabilities are resolved within agreed SLA (Service Level Agreement) periods by respective teams which was reported by L2 Analyst team. Maintain close working relationships with relevant teams and individual key stakeholders, such as incident response and disaster recovery teams as well as information security etc. Required to work in 24/7 Rotational shift. Skills & Experience Existing experience as a Security Operations Analyst, or equivalent. Experience of working in large scale, public cloud environments and with using cloud native security monitoring tools such as: - Microsoft Sentinel Microsoft 365 Defender Microsoft Defender for Cloud Endpoint Detection & Response (EDR) tools such as Crowdstrike, Microsoft Defender for Endpoint. Firewalls and network security tools such as Palo Alto, Fortinet, Juniper, and Cisco. Web Application Firewall (WAF) tools such as Cloudflare, Akamai and Azure WAF. Email Security tools such as Proofpoint, Mimecast and Microsoft Defender for Office Data Loss Prevention (DLP) tools such as Microsoft Purview, McAfee and Symantec Nice to have skills/experience includes: Google Cloud Platform (GCP) security tools such as Chronicle and Security Command Centre Amazon Web Services (AWS) security tools such as Security Hub, AWS Guard Duty, AWS Macie, AWS Config and AWS CloudTrail Experience of analysing malware and email headers, and has skills in network security, intrusion detection and prevention systems; operating systems; risk identification and analysis; threat identification and analysis and log analysis. Experience of security controls, such as network access controls; identity, authentication, and access management controls (IAAM); and intrusion detection and prevention controls. Knowledge of security standards (good practice) such as NIST, ISO27001, CIS (Center for Internet Security), OWASP and Cloud Controls Matrix (CCM) etc. Knowledge of scripting and coding with languages such as Terraform, python, javascript, golang, bash and/or powershell. Knowledge of DevOps practices such as CI/CD, Azure DevOps, CircleCI, GitHub Actions, Ansible and/or Jenkins. Computer science, engineering, or information technology related degree (although not a strict requirement) Holds one, or more, of the following certificates (or equivalent): - Certified Information Security Systems Professional (CISSP) Microsoft Certified: Azure Security Engineer Associate (AZ500) Microsoft Certified: Security Operations Analyst Associate (SC-200) CREST Practitioner Intrusion Analyst (CPIA) CREST Registered Intrusion Analyst (CRIA) CREST Certified Network Intrusion Analyst (CCNIA) Systems Security Certified Practitioner (SSCP) Certified Cloud Security Professional (CCSP) GIAC Certified Incident Handler (GCIH)GIAC Security Operations Certified (GSOC) A highly self-motivated and proactive individual who wants to learn and grow and has an attention to detail. A great analyser, trouble-shooter and problem solver who understands security operations, programming languages and security architecture. Highly organised and detail oriented. Ability to prioritise, multitask and work under pressure. An individual who shows a willingness to go beyond in delighting the customer. A good communicator who can explain security concepts to both technical and non-technical audiences.

Posted Date not available

Apply
Page 2 of 2
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies