Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5 - 8 years
9 - 13 Lacs
Mumbai
Work from Office
This Role Includes Leading RPA development team with a mandate for new automation opportunity finding, requirement analysis, and Shaping the solution approach for Business process transformation using RPA Responsible for leading design, development and deployment of RPA bots for different clients Supporting different teams for solution life cycle management - on-going operational support, Process change activities etc Assist and drive the team by providing oversight and as a mentor. Requirements Hands-on experience in working with RE Framework Hands-on experience in working with Data tables, argument and variables Hands-on experience in working with selectors Understanding of PDF automation Hands-on experience in working and creation of Libraries Hands-on experience in debugging, breakpoints and watch points Understanding of Orchestrator and deployment process Hands-on experience in error and exception handling Analysis of business requirement and effort estimation. UiPath Developer Certification Understanding of Abbyy Integration Experience in .Net language Understanding of Machine Learning with Python programming Hands-on experience in PDF automation Strong working knowledge of SQL and relational databases Experience in Citrix automation Experience in using Regex Job Description Understanding of integration with APIs Experience in image automation Experience in document understanding Understanding of machine learning models and its capabilities in UiPaths Experience/skills required: Overall 7-8 years of experience with minimum 4-5 years exp in RPA (preferably using UiPath
Posted 4 months ago
5 - 8 years
8 - 15 Lacs
Bengaluru
Hybrid
Relativity Certified Administrator (Relativity Infrastructure Specialist preferred) Minimum of 5 years of Computer Helpdesk/Application Support or relevant IT experience Minimum of 3 years experience supporting hosted Relativity platforms. BS or BA degree in related field or commensurate work experience. Primary Responsibilities:- Support Relativity environments focusing on scalability, monitoring, stability, performance, and security. Collaborate with cross-functional teams to plan, schedule, and implement changes using the change management process. Respond to incidents in Relativity and integrated applications following the incident management process. Remediate items, perform Root Cause Analysis and present findings in Operations Review meetings. Implement Relativity security best practices. Analyze, install, and test Relativity server patches and help create implementation plans. Respond to any Relativity defects by coordinating with relevant teams and creating action plans. Collaborate with development teams to enable high performance, dependable integration of our tools with Relativity. Support Relativity integration with eDiscovery tools such as Nuix, Brainspace, and eCapture. Evaluate and set up third party software that integrates with Relativity and/or RelativityOne. Work with other teams to help create solutions for any custom projects required by clients. Fully document each customer issue/resolution. Create and maintain internal/external support documentation including SOPs, best practices, and knowledge articles. Provide guidance, support and mentoring to the App Support team. Perform on call responsibilities periodically, that may require working outside normal working hours (evenings/weekends).
Posted 4 months ago
15.0 - 20.0 years
13 - 17 Lacs
bengaluru
Work from Office
Project Role :Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As the IR L3 analyst in 24x7 SOC, you will be the escalation point for all complex and high severity security incidents and lead the technical handling of critical security incidents. Youll be responsible for deep-dive analysis, root cause investigation, forensics, and containment using tools such as Sentinal One, Splunk SIEM. This role requires deep expertise in detection, investigation, containment, and remediation, as well as collaboration with multiple teams across security, IT, and compliance. Roles & Responsibilities:-End-to-End Incident Response Ownership:Ability to handle incident lifecycle (detect, contain, remediate)-Subject matter expert for handling the escalated high, critical or actual true positive incidents.-Identify opportunities for automation and work with SIEM Platform Support team for implementing it.-EDR Deep Dive:Using Real Time Response (RTR), Threat Graph, custom IOA rules-Proficiency in writing SPL queries, dashboards, correlation rules, and tuning use cases-Threat Hunting:Behavior-based detection using TTPs-Deep understanding of malware, lateral movement, privilege escalation, and exfiltration patterns-Threat Intel Integration:Automation of IOC lookups and enrichment flows-Forensic Skills: Live host forensics, log correlation, malware behavioral analysis-Deep experience in advanced threat detection and incident response-Scripting Proficiency:Python, PowerShell, Bash for automation or ETL-Proficiency in Sentinal One forensic and incident response capabilities-Playbook Development:Able to define, update, and optimize IR playbooks and workflows -Red team/purple team exposure-Forensic analysis (memory, file systems, logs)-Cloud incident handling (AWS, Azure)-Dashboarding:Advanced visualizations and business-focused metrics in Splunk-Certifications:Splunk Certified Admin/ES Admin, SC-200, or SOAR, Sentinal One EDR vendor training Professional & Technical Skills: -Lead high-severity incident response, coordinating with stakeholders and IT teams-Perform endpoint forensic triage using Sentinal One-Conduct detailed log analysis and anomaly detection in Splunk-Perform log correlation in Splunk to trace attack patterns, scope, and impact.-Conduct deep-dive analysis into suspicious behaviors using SPL and custom dashboards-Use endpoint data, network logs, and threat intel to drive full-lifecycle incident handling-Isolate affected systems, coordinate containment with IT, and oversee recovery steps-Recommend and define automated workflows for triage, enrichment, and response-Perform root cause analysis and support RCA documentation.-Create or optimize Splunk detection logic to improve fidelity and coverage-Mentor L1 and L2 analysts through case walk-throughs and knowledge sharing-Generate post-incident reports and present findings to leadership-Lead investigations and coordinate response for major incidents-Perform root cause analysis and post-incident reviews-Participating in continuous improvement initiatives-Conduct playbook testing, version control, and change documentation-Contribute to executive-level reports, RCA documents, and compliance metrics-Sentinal One:Custom detections, forensic triage, threat graphs-Splunk SIEM (core + ES module):Rule optimization, anomaly detection, ATT&CK mapping-Threat Intelligence:TTP mapping, behavioral correlation-Scripting:Python, regex, shell scripting for ETL workflows-Incident Response and Forensics SME Additional Information:- The candidate should have minimum 5 years of experience in Security Information and Event Management (SIEM).- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted Date not available
15.0 - 20.0 years
13 - 17 Lacs
bengaluru
Work from Office
Project Role :Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Senior Splunk Engineer for Content and Platform Development, you will be responsible for driving end-to-end SIEM engineering efforts, ranging from data onboarding and normalization to advanced detection rule creation and dashboard development. You will play a strategic role in maturing the organizations detection capability, operational visibility, and SOC automation efforts. This role involves significant collaboration with security analysts, threat hunters, compliance teams, and platform administrators to ensure the Splunk ecosystem is optimized, secure, and continuously evolving. Roles & Responsibilities:- overall experience in cybersecurity or IT infrastructure, with 3+ years hands-on Splunk engineering-Deep expertise in Splunk Search Processing Language (SPL) for creating complex queries, dashboards, alerts, and reports-Strong experience in creating, testing, and tuning detection content for security use cases-Experience in onboarding and parsing logs from various sources (e.g., firewalls, EDRs, cloud platforms, applications)-Expertise in data models (CIM), field extractions (regex), and knowledge objects (lookups, macros, tags)-Experience in designing and optimizing index structures, data retention policies, and storage performance-Ability to work with stakeholders from security operations, threat intel, and infrastructure teams-Strong documentation, version control, and lifecycle management for detection rules and dashboards-Experience integrating SOAR platforms with Splunk (e.g., Splunk SOAR, XSOAR)-Familiarity with Splunk Enterprise Security (ES) and its correlation framework-Exposure to MITRE ATT\&CK mapping for content standardization Professional & Technical Skills: -Design, implement, and maintain search queries, correlation rules, and dashboards aligned with business and threat requirements-Tune existing alerts and rules to reduce false positives and improve detection fidelity-Map detection content to frameworks such as MITRE ATT&CK and compliance standards-Onboard new log sources across endpoints, cloud, infrastructure, and applications-Monitor log sources reporting into Splunk SIEM and identify log sources that fail to report in accordance with the security operation runbooks-Log source parsing issues troubleshooting and resolution.-Write and maintain custom field extractions, transforms, and other configurations-Optimize searches, reduce duplication, and ensure compliance with search head clustering best practices-Build real-time and scheduled dashboards to support SOC, compliance, and leadership visibility-Use lookups, macros, and scheduled reports to enrich alerts and enable decision-making-Participate in use case governance processes and maintain runbooks/playbooks-Review and approve content changes submitted by junior team members-Strong foundational understanding of security operations, threat landscapes, and log analysis-Excellent written and verbal communication skills for working with both technical and business stakeholders-Provide Splunk SIEM and SOAR (Tines/ Palo Alto XSOAR) support along with coordinating with Vendor when required.-Splunk SIEM:Rule creation, anomaly detection, ATT&CK mapping-SOAR:Playbook customization, API integrations, dynamic playbook logic-Threat Intelligence:TTP mapping, behavioral correlation-Splunk SIEM:Parser creation, field extraction, correlation rule design-Scripting:Python, regex, shell scripting for ETL workflows-Data Handling:JSON, syslog, Windows Event Logs-Splunk SIEM Detection Engineering, Content development and platform support. Additional Information:- The candidate should have minimum 5 years of experience in Security Information and Event Management (SIEM).- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted Date not available
15.0 - 20.0 years
13 - 17 Lacs
bengaluru
Work from Office
Project Role :Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and facilitating the transition to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, all while adapting to the evolving landscape of cloud security challenges. Roles & Responsibilities:-Experience in cybersecurity or IT infrastructure, with 2+ years hands-on Splunk engineering-Good experience in Splunk Search Processing Language (SPL) for creating complex queries, dashboards, alerts, and reports-Good experience in creating, testing, and tuning detection content for security use cases-Experience in onboarding and parsing logs from various sources (e.g., firewalls, EDRs, cloud platforms, applications)-Experience in data models (CIM), field extractions (regex), and knowledge objects (lookups, macros, tags)-Experience in designing and optimizing index structures, data retention policies, and storage performance-Ability to work with stakeholders from security operations, threat intel, and infrastructure teams-Strong documentation, version control, and lifecycle management for detection rules and dashboards-Experience integrating SOAR platforms with Splunk (e.g., Splunk SOAR, XSOAR)-Familiarity with Splunk Enterprise Security (ES) and its correlation framework-Exposure to MITRE ATT\&CK mapping for content standardization Professional & Technical Skills: -Design, implement, and maintain search queries, correlation rules, and dashboards aligned with business and threat requirements-Tune existing alerts and rules to reduce false positives and improve detection fidelity-Map detection content to frameworks such as MITRE ATT&CK and compliance standards-Onboard new log sources across endpoints, cloud, infrastructure, and applications-Monitor log sources reporting into Splunk SIEM and identify log sources that fail to report in accordance with the security operation runbooks-Log source parsing issues troubleshooting and resolution.-Write and maintain custom field extractions, transforms, and other configurations-Optimize searches, reduce duplication, and ensure compliance with search head clustering best practices-Build real-time and scheduled dashboards to support SOC, compliance, and leadership visibility-Use lookups, macros, and scheduled reports to enrich alerts and enable decision-making-Participate in use case governance processes and maintain runbooks/playbooks-Review and approve content changes submitted by junior team members-Strong foundational understanding of security operations, threat landscapes, and log analysis-Excellent written and verbal communication skills for working with both technical and business stakeholders-Provide Splunk SIEM and SOAR (Tines/ Palo Alto XSOAR) support along with coordinating with Vendor when required.-Splunk SIEM:Rule creation, anomaly detection, ATT&CK mapping-SOAR:Playbook customization, API integrations, dynamic playbook logic-Threat Intelligence:TTP mapping, behavioral correlation-Splunk SIEM:Parser creation, field extraction, correlation rule design-Scripting:Python, regex, shell scripting for ETL workflows-Data Handling:JSON, syslog, Windows Event Logs-Splunk SIEM Detection Engineering, Content development and platform support-EXp in SOC including 2+ in SIEM Content Engineering /Platform Support. Additional Information:- The candidate should have minimum 3 years of experience in Security Information and Event Management (SIEM).- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted Date not available
15.0 - 20.0 years
10 - 14 Lacs
bengaluru
Work from Office
Project Role :Application Lead Project Role Description : Lead the effort to design, build and configure applications, acting as the primary point of contact. Must have skills : API Management Good to have skills : Microsoft Azure IaaSMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Lead, you will lead the effort to design, build, and configure applications, acting as the primary point of contact. A typical day involves collaborating with various teams to ensure project milestones are met, addressing any challenges that arise, and providing guidance to team members to foster a productive work environment. You will also engage in strategic discussions to align project goals with organizational objectives, ensuring that the applications developed meet the needs of stakeholders and users alike. Your role will require a balance of technical expertise and leadership skills to drive successful project outcomes. Roles & Responsibilities:-Setting up and Configuring Azure APIM, design and implement scalable & secure API solutions using Azure APIM-Leading the project independently and managing end to end tasks-Ability to understand API requirements, design API operations and implement the APIs-Support on API Lifecycle managementTroubleshoot issues when reported.-Define API Governance process-Managing communication among different stakeholders Professional & Technical Skills: -More than 7 years of experience in designing, developing services and supporting using Azure APIM-Must have lead experience of handling project independently and leading project task end to end-Experience in Design multiple services based on standards for REST, web services, data integration techniques, messaging-Hands on experience in Azure APIM, knowledge on Developer Portal-Strong knowledge working with API, Microservice-Understanding HTTP, HTTPS protocols, HTTP headers, XML, JSON, SOAP, REST services -Experience with XPath, RegEx, HTTP status codes, CRUD operations Additional Information:- The candidate should have minimum 7.5 years of experience in API Management.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted Date not available
15.0 - 20.0 years
13 - 17 Lacs
bengaluru
Work from Office
Project Role :Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Senior Splunk Engineer for Content and Platform Development, you will be responsible for driving end-to-end SIEM engineering efforts, ranging from data onboarding and normalization to advanced detection rule creation and dashboard development. You will play a strategic role in maturing the organizations detection capability, operational visibility, and SOC automation efforts. This role involves significant collaboration with security analysts, threat hunters, compliance teams, and platform administrators to ensure the Splunk ecosystem is optimized, secure, and continuously evolving. Roles & Responsibilities:- overall experience in cybersecurity or IT infrastructure, with 3+ years hands-on Splunk engineering-Deep expertise in Splunk Search Processing Language (SPL) for creating complex queries, dashboards, alerts, and reports-Strong experience in creating, testing, and tuning detection content for security use cases-Experience in onboarding and parsing logs from various sources (e.g., firewalls, EDRs, cloud platforms, applications)-Expertise in data models (CIM), field extractions (regex), and knowledge objects (lookups, macros, tags)-Experience in designing and optimizing index structures, data retention policies, and storage performance-Ability to work with stakeholders from security operations, threat intel, and infrastructure teams-Strong documentation, version control, and lifecycle management for detection rules and dashboards-Experience integrating SOAR platforms with Splunk (e.g., Splunk SOAR, XSOAR)-Familiarity with Splunk Enterprise Security (ES) and its correlation framework-Exposure to MITRE ATT\&CK mapping for content standardization Professional & Technical Skills: -Design, implement, and maintain search queries, correlation rules, and dashboards aligned with business and threat requirements-Tune existing alerts and rules to reduce false positives and improve detection fidelity-Map detection content to frameworks such as MITRE ATT&CK and compliance standards-Onboard new log sources across endpoints, cloud, infrastructure, and applications-Monitor log sources reporting into Splunk SIEM and identify log sources that fail to report in accordance with the security operation runbooks-Log source parsing issues troubleshooting and resolution.-Write and maintain custom field extractions, transforms, and other configurations-Optimize searches, reduce duplication, and ensure compliance with search head clustering best practices-Build real-time and scheduled dashboards to support SOC, compliance, and leadership visibility-Use lookups, macros, and scheduled reports to enrich alerts and enable decision-making-Participate in use case governance processes and maintain runbooks/playbooks-Review and approve content changes submitted by junior team members-Strong foundational understanding of security operations, threat landscapes, and log analysis-Excellent written and verbal communication skills for working with both technical and business stakeholders-Provide Splunk SIEM and SOAR (Tines/ Palo Alto XSOAR) support along with coordinating with Vendor when required.-Splunk SIEM:Rule creation, anomaly detection, ATT&CK mapping-SOAR:Playbook customization, API integrations, dynamic playbook logic-Threat Intelligence:TTP mapping, behavioral correlation-Splunk SIEM:Parser creation, field extraction, correlation rule design-Scripting:Python, regex, shell scripting for ETL workflows-Data Handling:JSON, syslog, Windows Event Logs-Splunk SIEM Detection Engineering, Content development and platform support. Additional Information:- The candidate should have minimum 5 years of experience in Security Information and Event Management (SIEM).- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted Date not available
3.0 - 8.0 years
13 - 17 Lacs
bengaluru
Work from Office
About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Senior Splunk Engineer for Content and Platform Development, you will be responsible for driving end-to-end SIEM engineering efforts, ranging from data onboarding and normalization to advanced detection rule creation and dashboard development. You will play a strategic role in maturing the organizations detection capability, operational visibility, and SOC automation efforts. This role involves significant collaboration with security analysts, threat hunters, compliance teams, and platform administrators to ensure the Splunk ecosystem is optimized, secure, and continuously evolving Roles & Responsibilities:-Experience in cybersecurity or IT infrastructure, with 3+ years hands-on Splunk engineering-Deep expertise in Splunk Search Processing Language (SPL) for creating complex queries, dashboards, alerts, and reports-Strong experience in creating, testing, and tuning detection content for security use cases-Experience in onboarding and parsing logs from various sources (e.g., firewalls, EDRs, cloud platforms, applications)-Expertise in data models (CIM), field extractions (regex), and knowledge objects (lookups, macros, tags)-Experience in designing and optimizing index structures, data retention policies, and storage performance-Ability to work with stakeholders from security operations, threat intel, and infrastructure teams-Strong documentation, version control, and lifecycle management for detection rules and dashboards-Experience integrating SOAR platforms with Splunk (e.g., Splunk SOAR, XSOAR)-Familiarity with Splunk Enterprise Security (ES) and its correlation framework-Exposure to MITRE ATT\&CK mapping for content standardization-Splunk SIEM:Rule creation, anomaly detection, ATT&CK mapping-SOAR:Playbook customization, API integrations, dynamic playbook logic-Threat Intelligence:TTP mapping, behavioral correlation-Splunk SIEM:Parser creation, field extraction, correlation rule design-Scripting:Python, regex, shell scripting for ETL workflows-Data Handling:JSON, syslog, Windows Event Logs-Splunk SIEM Detection Engineering, Content development and platform support. Professional & Technical Skills: -Design, implement, and maintain search queries, correlation rules, and dashboards aligned with business and threat requirements-Tune existing alerts and rules to reduce false positives and improve detection fidelity-Map detection content to frameworks such as MITRE ATT&CK and compliance standards-Onboard new log sources across endpoints, cloud, infrastructure, and applications-Monitor log sources reporting into Splunk SIEM and identify log sources that fail to report in accordance with the security operation runbooks-Log source parsing issues troubleshooting and resolution.-Write and maintain custom field extractions, transforms, and other configurations-Optimize searches, reduce duplication, and ensure compliance with search head clustering best practices-Build real-time and scheduled dashboards to support SOC, compliance, and leadership visibility-Use lookups, macros, and scheduled reports to enrich alerts and enable decision-making-Participate in use case governance processes and maintain runbooks/playbooks-Review and approve content changes submitted by junior team members-Strong foundational understanding of security operations, threat landscapes, and log analysis-Excellent written and verbal communication skills for working with both technical and business stakeholders-Provide Splunk SIEM and SOAR (Tines/ Palo Alto XSOAR) support along with coordinating with Vendor when required. Additional Information:- The candidate should have minimum 5 years of experience in Security Information and Event Management (SIEM).- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted Date not available
5.0 - 10.0 years
4 - 6 Lacs
hyderabad
Work from Office
Description: GlobalLogic is seeking a candidate responsible for analyzing spatial data received from various vendors to assess its alignment with client requirements. The role involves evaluating whether the data enhances the client’s maps by adding value or introducing new records. Based on this analysis, the candidate will provide recommendations to the client on whether to accept or reject the vendor data. Requirements: 3+ years previous experience in a similar role / industry Technical Skills: Understanding of GIS map components and its terminology Work with geographical information systems (GIS) to see, model and analyze linear and Non Linear features Exposure to systematization of rendering and visualization techniques to check the vector data. Understanding of new approaches design of map-related representations in the Tool Skilled in preparing/ converting / extracting GIS data & shape files Experience of GIS Navigation projects Knowledge in Javascript and SQL is a plus/optional Software Skills: FME / ArcGIS/ QGIS/ AutoCAD (Not Mandatory) Skills & Experience: Diagnoses the gaps in the existing process, identifies opportunities and implements the initiatives in order to meet client and internal commitments on a continuous basis Implement the corrective and preventive actions in order to reach customer satisfaction Prepare process level requirements for self-assessment to ensure delivery predictability for specific process Accessing and using aerial photographs, satellite images & vector data Researching, collecting, storing, retrieving and evaluating the MAPS data Designing maps, Checking the accuracy of maps Detail oriented with excellent analytical skills Demonstrated track record of strategic decision-making and good judgment Strong written and verbal communication skills and ability to present to senior leaders Excellent interpersonal skills with the ability to motivate and inspire Excellent problem solving, critical thinking, meticulous attention to detail and dedication to quality Qualifications Graduate degree from a reputed institution Department/Project Description Job Responsibilities: Ability to QA with an understanding of all mapping processes such as POI’s ,AOI’s and Linear features Record and escalate any deficiencies in modeling real-world features and suggestions for improvement Evaluate the search results using the search queries on the Maps/GIS domain. Participates as a part of the transition team to prepare/review the process definition and documentation for a specific process Co-ordinates training for the team in order to ensure right skilling and competency development across domain operational and behavior Process compliance – Monitor / ensure process compliance and periodically update Guidelines changes as part of the adherence to process steps Download files by using postman (rest web services) Understand and perform preprocessing of vendor data (.csv/JSON files) using different tools if required Uploading vendor files to server location & remote location Path detections & identifying the field projection version Creating configuration for a dataset in proprietary tools (SAR). Standardize some of the fields by using javascript Creating reports in tools and filtering required data using SQL-based tools. Perform in-depth analysis on data record level using regular expressions, analyze results of forwarding geocoding, reverse geocoding, data matching. Creating subreports by using SQL filter conditions Delivering detailed report with data summary/In-depth analysis What We Offer: Exciting Projects: We focus on industries like High-Tech, communication, media, healthcare, retail and telecom. Our customer list is full of fantastic global brands and leaders who love what we build for them. Collaborative Environment: You Can expand your skills by collaborating with a diverse team of highly talented people in an open, laidback environment — or even abroad in one of our global centers or client facilities! Work-Life Balance: GlobalLogic prioritizes work-life balance, which is why we offer flexible work schedules, opportunities to work from home, and paid time off and holidays. Professional Development: Our dedicated Learning & Development team regularly organizes Communication skills training(GL Vantage, Toast Master),Stress Management program, professional certifications, and technical and soft skill trainings. Excellent Benefits: We provide our employees with competitive salaries, family medical insurance, Group Term Life Insurance, Group Personal Accident Insurance , NPS(National Pension Scheme ), Periodic health awareness program, extended maternity leave, annual performance bonuses, and referral bonuses. Fun Perks: We want you to love where you work, which is why we host sports events, cultural activities, offer food on subsidies rates, Corporate parties. Our vibrant offices also include dedicated GL Zones, rooftop decks and GL Club where you can drink coffee or tea with your colleagues over a game of table and offer discounts for popular stores and restaurants!
Posted Date not available
3.0 - 8.0 years
11 - 15 Lacs
gurugram
Work from Office
Project Role : Technology Platform Engineer Project Role Description : Creates production and non-production cloud environments using the proper software tools such as a platform for a project or product. Deploys the automation pipeline and automates environment creation and configuration. Must have skills : Email Security Good to have skills : Microsoft 365 Security & ComplianceMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Technology Platform Engineer, you will be responsible for creating production and non-production cloud environments using the proper software tools. Your role involves deploying the automation pipeline and automating environment creation and configuration. Roles & Responsibilities:-Deploy and manage Proofpoint Email Security solutions to protect against phishing, malware, and other email threats.-Assist in configuring security policies tailored to individual user needs.-Configure recipient verification processes to ensure the authenticity of email communications.-Manage whitelisting and blacklisting of domains, IP addresses, and email addresses to strengthen security.-Develop and modify security rules based on service requests to address specific threats.-Analyze and refine quarantine policies to enhance threat detection and email filtering.-Diagnose and resolve inbound/outbound email delays and routing issues for seamless communication.-Categorize emails for whitelisting and blacklisting to maintain a secure email environment.-Continuously monitor and analyze email traffic to detect and mitigate potential threats.-Collaborate with Registration, DNS, and M365 teams to integrate new or acquired domains into the existing setup.-Configure external email banners and manage exceptions for vendors/partners.-Expertise in creating and modifying Regular Expressions based on security requirements.-Understand URL rewriting scenarios and manage exceptions as needed.-Hands-on experience in diagnosing and resolving URL isolation issues.-Define and implement email security policies to ensure compliance and protect sensitive data.-Conduct training sessions to educate employees on email security best practices and risk mitigation.-Experience in managing security awareness training platforms and initiate related training and take initiative to train users via email or assigning new training on ongoing threats.-Work closely with relevant teams to integrate email security measures with broader security strategies.-Generate reports on security incidents, trends, and the effectiveness of implemented measures.-Stay updated on emerging email security threats and recommend improvements to strengthen the security posture.-Deep understanding of SPF, DKIM, DMARC, and hands-on expertise with EFD to enhance domain security against phishing and malware threats.- Hands on Experience in TAP, TRAP, CTR, PhishAlarm, Email DLP- Experience in Proofpoint IMD for the protection from Phish, Malware, Spam etc. Professional & Technical Skills: - Must To Have Skills: Proficiency in Email Security.- Good To Have Skills: Experience with Microsoft 365 Security & Compliance.- Strong understanding of cloud security principles.- Knowledge of email security protocols and encryption methods.- Experience in configuring and managing email security solutions.- Ability to analyze and respond to email security incidents. Additional Information:- The candidate should have a minimum of 3 years of experience in Email Security.- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education
Posted Date not available
4.0 - 9.0 years
10 - 20 Lacs
noida
Hybrid
Application log/ production issues analysis, documentation, splunk queries (RegEx Expression), SQL Queries. Exposure to Python is a plus. Reviews, analyzes, and evaluates information technology systems operations. Determines user needs and requirements and recommends ways to improve systems. Serves as the primary point of contact between users and engineering/development staff. Identifies, documents, reports and tracks system issues. Supports the process of translating business needs into formal technical requirement deliverables.
Posted Date not available
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |