4+ Endpoint protection Jobs in India
Apply to 4+ Endpoint protection Jobs on CutShort.io. Find your next job, effortlessly. Browse Endpoint protection Jobs and apply today!
at BD SOFTWARE DISTRIBUTION PVT LTD
Position: Technical Presales Manager
Job type: Full-time/ Permanent
Total Experience: Minimum 4-5 Years
- Maintain, drive, supervise and implement robust technical standards, systems and processes
- Influence technology strategies and decisions with a high level of expertise and knowledge
- Provide direction and support to ensure compliance with relevant legislative specifications and standards
- Lead a team of staff developing products, and addressing training needs when necessary
- Coordinate the regular testing of products to address faults, and provide evaluations to improve them
- Act as a key contact with customers who have technical issues
- Experience in handling technical support Team
- handling the escalated issues and resolving them over the phone/e-mail/remote meeting.
- Addressing end clients and channel partners/system integrators/solution partners/service providers/consultants.
- Conduct product demos and training
- Should be open to work in general shift.
REQUIRED SKILLS :
- Good communication skills, both written and verbal
- Self-motivated with the ability to work under pressure and own initiative
- Problem-solving skills, analytical skills and the ability to make decisions quickly
- Organisational and team leader skills
- Knowledge of process improvement and validation
- Knowledge of regulatory standards relevant to your industry
- The ability to investigate and identify trends
- Good Knowledge of Hardware and Networking concepts
- Good Knowledge of Windows, Linux and Mac OS, Android and iOS
- Good Knowledge of Antivirus, Endpoint security, DLP, MDM, and Remote technologies.
- Should be capable to handle a team of L1 engineers.
- Prepare documents on technical knowledge.
at Fullness Web Solutions
We are looking for a capable System Administrator to take over all aspects of the configuration and maintenance of computer systems. A System Admin should be able to diagnose and resolve problems quickly and should have the patience to communicate with a variety of interdisciplinary teams and users.
Monitoring and reporting all points mentioned below.
Ensure Security updates are installed:
- Regularly checking whether the Antivirus software is updated for users.
- Regularly monitor platforms like Google to ensure everybody is using up-to-date applications with no security issues.
- Regularly Email users about the security updates that they need to install on their laptops and PCs.
Antivirus
Centrally managed antivirus should be installed on all laptops and mobile devices.
- Adding a purchase request for any additional licence that we might require.
- Pushing new software updates on users’ laptops.
- Keeping up-to-date with antivirus updates so all our devices are secure.
- Miradore user agent
Mobile device and access management
- Set rules and configure settings on personal and organisation-owned devices to access data and networks.
- Deploy and authenticate apps on devices -- on-premises and mobile.
- Protect company data by controlling the way users access and share information.
- Make sure devices and apps are compliant with security requirements.
- Only provide user access to laptops (No admin access, excluding developers)
- All new software installation requests will go through the system admin to make sure nothing is installed on work laptops that poses a security risk.
Vanta compliance-related tickets
- Vanta will continue to monitor and create issues to be compliant with ISO 27K over time. The system administrator must resolve all such system-related tickets.
Access management to different user applications
- Access should be restricted to only what is necessary to perform job duties ("principle of least privilege").
- Technical access to all the company’s networks must be formally documented, including the standard role for approver, grantor, and date.
- Only authorised employees and third parties working off a signed contract or statement of work, with a business need, shall be granted access to the company’s production networks.
- The company’s guests may be granted access to guest networks after registering with office staff without a documented request - guest network management.
Removal media encryption
- Research removable media encryption and figure out if removable media should be implemented and make sure it is always encrypted.
MFA reset and debugging
As we are enabling MFA for more and more applications that we have, more people are likely to have issues with it as the business moves forward.
- Different online applications will have different ways of handling the MFA reset; a system admin should be familiar with all.
Website watcher configuration and email issues
- Software like Website Watcher keeps having email issues, as it sends emails in huge numbers every day. The system administrator must keep an eye on the emails and fix issues promptly as and when they arise.
Office network management
- System admin can help in creating guest networks in the office and making sure that the network is as secure as possible.
Phishing emails
- Finding the optimal solution to prevent phishing emails from getting delivered.
- Verifying emails sent by our staff to check for phishing emails.
Security incidents handling
- System admin must monitor incident and event tickets and assign severity tickets.
- Continuous checks to ensure the security incident policies are being followed and up to date
- A root cause analysis report must be documented and referenced in incident tickets.
- A central "War Room" will be designated for handling security threats. This may be a physical or virtual location (i.e., Slack channel) and managed by the system admin.
- Conducting recurring Incident Response Meetings until the incident is resolved (as per the company's established norms)
Implement password policy
- Password policy must be in place to ensure that users are using secure passwords that are not easily crackable.
Add-ons:
- Devops is a plus point
Desired Skills |
To have skills: · Proven technical expertise in cyber security domains, i.e. endpoint security, application security testing. · Knowledge and experience in public cloud solutions. · Knowledge on network security, networking concepts and architectural implementations. · Knowledge on vulnerability testing and define proper remediation’s. · Shell scripting experience - Shell/Bash/Python. · Working experience of Linux operation.
Desire to have skills: · One or more of the following cyber security certifications: CEH, CISSP, OSCP, SSCP CCSP. · Excellent problem solving, and follow-up skills. · Ability to convey technical security concepts to non-technical audiences. |
Security Monitoring and Operations (SIEM)
Security Solutions design and deployment
IDAM - Identity and Access Management Experience
Network Monitoring and Management Experience
VAPT - Vulnerability Assessment and Penetration Assessment
Experience on DLP and Endpoint Security
Knowledge on Encryption
Experience in performing Maturity Assessment for identifying the security gaps and recommending measures to fix the gaps
Experience in Audit controls and applying security measures (ISO, PCI etc..)
Knowledge in automation and scripting